Hay
Date
July 3, 2025, 10:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   61.128073] ==================================================================
[   61.135387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   61.142883] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   61.150375] 
[   61.151902] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   61.151931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.151938] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.151949] Call trace:
[   61.151955]  show_stack+0x20/0x38 (C)
[   61.151972]  dump_stack_lvl+0x8c/0xd0
[   61.151991]  print_report+0x118/0x608
[   61.152010]  kasan_report+0xdc/0x128
[   61.152029]  __asan_report_store4_noabort+0x20/0x30
[   61.152046]  kasan_atomics_helper+0x3f94/0x4858
[   61.152065]  kasan_atomics+0x198/0x2e0
[   61.152082]  kunit_try_run_case+0x170/0x3f0
[   61.152099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.152120]  kthread+0x328/0x630
[   61.152133]  ret_from_fork+0x10/0x20
[   61.152150] 
[   61.222060] Allocated by task 374:
[   61.225518]  kasan_save_stack+0x3c/0x68
[   61.229418]  kasan_save_track+0x20/0x40
[   61.233316]  kasan_save_alloc_info+0x40/0x58
[   61.237655]  __kasan_kmalloc+0xd4/0xd8
[   61.241467]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.246072]  kasan_atomics+0xb8/0x2e0
[   61.249795]  kunit_try_run_case+0x170/0x3f0
[   61.254051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.259623]  kthread+0x328/0x630
[   61.262909]  ret_from_fork+0x10/0x20
[   61.266547] 
[   61.268071] The buggy address belongs to the object at ffff000081814300
[   61.268071]  which belongs to the cache kmalloc-64 of size 64
[   61.280553] The buggy address is located 0 bytes to the right of
[   61.280553]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   61.293560] 
[   61.295085] The buggy address belongs to the physical page:
[   61.300735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   61.308836] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.315794] page_type: f5(slab)
[   61.318995] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   61.326836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.334671] page dumped because: kasan: bad access detected
[   61.340321] 
[   61.341846] Memory state around the buggy address:
[   61.346703]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.354019]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.361332] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.368643]                                      ^
[   61.373503]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.380820]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.388134] ==================================================================
[   61.395515] ==================================================================
[   61.402829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   61.410236] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   61.417727] 
[   61.419255] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   61.419285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.419293] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.419305] Call trace:
[   61.419311]  show_stack+0x20/0x38 (C)
[   61.419330]  dump_stack_lvl+0x8c/0xd0
[   61.419350]  print_report+0x118/0x608
[   61.419369]  kasan_report+0xdc/0x128
[   61.419388]  kasan_check_range+0x100/0x1a8
[   61.419409]  __kasan_check_write+0x20/0x30
[   61.419425]  kasan_atomics_helper+0x3ac/0x4858
[   61.419444]  kasan_atomics+0x198/0x2e0
[   61.419462]  kunit_try_run_case+0x170/0x3f0
[   61.419480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.419502]  kthread+0x328/0x630
[   61.419516]  ret_from_fork+0x10/0x20
[   61.419534] 
[   61.492710] Allocated by task 374:
[   61.496169]  kasan_save_stack+0x3c/0x68
[   61.500069]  kasan_save_track+0x20/0x40
[   61.503967]  kasan_save_alloc_info+0x40/0x58
[   61.508309]  __kasan_kmalloc+0xd4/0xd8
[   61.512120]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.516725]  kasan_atomics+0xb8/0x2e0
[   61.520449]  kunit_try_run_case+0x170/0x3f0
[   61.524706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.530265]  kthread+0x328/0x630
[   61.533554]  ret_from_fork+0x10/0x20
[   61.537191] 
[   61.538716] The buggy address belongs to the object at ffff000081814300
[   61.538716]  which belongs to the cache kmalloc-64 of size 64
[   61.551198] The buggy address is located 0 bytes to the right of
[   61.551198]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   61.564205] 
[   61.565730] The buggy address belongs to the physical page:
[   61.571378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   61.579478] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.586437] page_type: f5(slab)
[   61.589638] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   61.597480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.605315] page dumped because: kasan: bad access detected
[   61.610965] 
[   61.612489] Memory state around the buggy address:
[   61.617347]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.624661]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.631979] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.639291]                                      ^
[   61.644149]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.651465]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.658778] ==================================================================
[   63.560409] ==================================================================
[   63.567724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   63.575132] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   63.582623] 
[   63.584149] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   63.584179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.584188] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.584199] Call trace:
[   63.584205]  show_stack+0x20/0x38 (C)
[   63.584223]  dump_stack_lvl+0x8c/0xd0
[   63.584243]  print_report+0x118/0x608
[   63.584262]  kasan_report+0xdc/0x128
[   63.584280]  kasan_check_range+0x100/0x1a8
[   63.584300]  __kasan_check_write+0x20/0x30
[   63.584315]  kasan_atomics_helper+0x6ec/0x4858
[   63.584335]  kasan_atomics+0x198/0x2e0
[   63.584353]  kunit_try_run_case+0x170/0x3f0
[   63.584370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.584392]  kthread+0x328/0x630
[   63.584406]  ret_from_fork+0x10/0x20
[   63.584422] 
[   63.657598] Allocated by task 374:
[   63.661055]  kasan_save_stack+0x3c/0x68
[   63.664956]  kasan_save_track+0x20/0x40
[   63.668855]  kasan_save_alloc_info+0x40/0x58
[   63.673196]  __kasan_kmalloc+0xd4/0xd8
[   63.677007]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.681610]  kasan_atomics+0xb8/0x2e0
[   63.685334]  kunit_try_run_case+0x170/0x3f0
[   63.689588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.695160]  kthread+0x328/0x630
[   63.698447]  ret_from_fork+0x10/0x20
[   63.702083] 
[   63.703608] The buggy address belongs to the object at ffff000081814300
[   63.703608]  which belongs to the cache kmalloc-64 of size 64
[   63.716091] The buggy address is located 0 bytes to the right of
[   63.716091]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   63.729097] 
[   63.730623] The buggy address belongs to the physical page:
[   63.736271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   63.744371] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.751330] page_type: f5(slab)
[   63.754531] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   63.762371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.770207] page dumped because: kasan: bad access detected
[   63.775855] 
[   63.777381] Memory state around the buggy address:
[   63.782238]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.789555]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.796870] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.804182]                                      ^
[   63.809042]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.816357]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.823670] ==================================================================
[   60.857444] ==================================================================
[   60.864758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   60.872166] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   60.879657] 
[   60.881184] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   60.881213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.881220] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.881231] Call trace:
[   60.881238]  show_stack+0x20/0x38 (C)
[   60.881255]  dump_stack_lvl+0x8c/0xd0
[   60.881274]  print_report+0x118/0x608
[   60.881292]  kasan_report+0xdc/0x128
[   60.881310]  kasan_check_range+0x100/0x1a8
[   60.881330]  __kasan_check_write+0x20/0x30
[   60.881346]  kasan_atomics_helper+0x32c/0x4858
[   60.881363]  kasan_atomics+0x198/0x2e0
[   60.881382]  kunit_try_run_case+0x170/0x3f0
[   60.881399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.881420]  kthread+0x328/0x630
[   60.881435]  ret_from_fork+0x10/0x20
[   60.881452] 
[   60.954631] Allocated by task 374:
[   60.958090]  kasan_save_stack+0x3c/0x68
[   60.961990]  kasan_save_track+0x20/0x40
[   60.965891]  kasan_save_alloc_info+0x40/0x58
[   60.970231]  __kasan_kmalloc+0xd4/0xd8
[   60.974041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.978646]  kasan_atomics+0xb8/0x2e0
[   60.982371]  kunit_try_run_case+0x170/0x3f0
[   60.986626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.992197]  kthread+0x328/0x630
[   60.995484]  ret_from_fork+0x10/0x20
[   60.999120] 
[   61.000644] The buggy address belongs to the object at ffff000081814300
[   61.000644]  which belongs to the cache kmalloc-64 of size 64
[   61.013128] The buggy address is located 0 bytes to the right of
[   61.013128]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   61.026135] 
[   61.027660] The buggy address belongs to the physical page:
[   61.033308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   61.041405] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.048363] page_type: f5(slab)
[   61.051566] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   61.059406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.067242] page dumped because: kasan: bad access detected
[   61.072892] 
[   61.074415] Memory state around the buggy address:
[   61.079272]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.086589]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.093904] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.101217]                                      ^
[   61.106076]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.113392]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.120705] ==================================================================
[   59.234906] ==================================================================
[   59.249978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   59.257484] Read of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   59.264892] 
[   59.266429] CPU: 3 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   59.266459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.266469] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.266484] Call trace:
[   59.266491]  show_stack+0x20/0x38 (C)
[   59.266511]  dump_stack_lvl+0x8c/0xd0
[   59.266534]  print_report+0x118/0x608
[   59.266556]  kasan_report+0xdc/0x128
[   59.266575]  __asan_report_load4_noabort+0x20/0x30
[   59.266594]  kasan_atomics_helper+0x40a8/0x4858
[   59.266614]  kasan_atomics+0x198/0x2e0
[   59.266632]  kunit_try_run_case+0x170/0x3f0
[   59.266652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.266674]  kthread+0x328/0x630
[   59.266690]  ret_from_fork+0x10/0x20
[   59.266709] 
[   59.336543] Allocated by task 374:
[   59.340005]  kasan_save_stack+0x3c/0x68
[   59.343919]  kasan_save_track+0x20/0x40
[   59.347830]  kasan_save_alloc_info+0x40/0x58
[   59.352172]  __kasan_kmalloc+0xd4/0xd8
[   59.355995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.360600]  kasan_atomics+0xb8/0x2e0
[   59.364327]  kunit_try_run_case+0x170/0x3f0
[   59.368583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.374160]  kthread+0x328/0x630
[   59.377453]  ret_from_fork+0x10/0x20
[   59.381092] 
[   59.382626] The buggy address belongs to the object at ffff000081814300
[   59.382626]  which belongs to the cache kmalloc-64 of size 64
[   59.395109] The buggy address is located 0 bytes to the right of
[   59.395109]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   59.408122] 
[   59.409654] The buggy address belongs to the physical page:
[   59.415303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   59.423410] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.430383] page_type: f5(slab)
[   59.433591] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   59.441439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.449282] page dumped because: kasan: bad access detected
[   59.454933] 
[   59.456471] Memory state around the buggy address:
[   59.461335]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.468652]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.475970] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.483286]                                      ^
[   59.488150]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.495471]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.502787] ==================================================================
[   60.049140] ==================================================================
[   60.056462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   60.063875] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   60.071371] 
[   60.072899] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   60.072930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.072940] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.072950] Call trace:
[   60.072956]  show_stack+0x20/0x38 (C)
[   60.072975]  dump_stack_lvl+0x8c/0xd0
[   60.072994]  print_report+0x118/0x608
[   60.073014]  kasan_report+0xdc/0x128
[   60.073034]  kasan_check_range+0x100/0x1a8
[   60.073057]  __kasan_check_write+0x20/0x30
[   60.073072]  kasan_atomics_helper+0x24c/0x4858
[   60.073090]  kasan_atomics+0x198/0x2e0
[   60.073107]  kunit_try_run_case+0x170/0x3f0
[   60.073126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.073148]  kthread+0x328/0x630
[   60.073161]  ret_from_fork+0x10/0x20
[   60.073178] 
[   60.146339] Allocated by task 374:
[   60.149792]  kasan_save_stack+0x3c/0x68
[   60.153699]  kasan_save_track+0x20/0x40
[   60.157606]  kasan_save_alloc_info+0x40/0x58
[   60.161943]  __kasan_kmalloc+0xd4/0xd8
[   60.165761]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.170362]  kasan_atomics+0xb8/0x2e0
[   60.174083]  kunit_try_run_case+0x170/0x3f0
[   60.178336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.183900]  kthread+0x328/0x630
[   60.187184]  ret_from_fork+0x10/0x20
[   60.190818] 
[   60.192348] The buggy address belongs to the object at ffff000081814300
[   60.192348]  which belongs to the cache kmalloc-64 of size 64
[   60.204831] The buggy address is located 0 bytes to the right of
[   60.204831]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   60.217837] 
[   60.219369] The buggy address belongs to the physical page:
[   60.225014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   60.233116] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.240078] page_type: f5(slab)
[   60.243277] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   60.251120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.258957] page dumped because: kasan: bad access detected
[   60.264599] 
[   60.266122] Memory state around the buggy address:
[   60.270974]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.278283]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.285599] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.292904]                                      ^
[   60.297758]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.305065]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.312370] ==================================================================
[   59.778720] ==================================================================
[   59.786041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   59.793459] Read of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   59.800859] 
[   59.802389] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   59.802421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.802430] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.802442] Call trace:
[   59.802449]  show_stack+0x20/0x38 (C)
[   59.802469]  dump_stack_lvl+0x8c/0xd0
[   59.802490]  print_report+0x118/0x608
[   59.802509]  kasan_report+0xdc/0x128
[   59.802529]  kasan_check_range+0x100/0x1a8
[   59.802550]  __kasan_check_read+0x20/0x30
[   59.802567]  kasan_atomics_helper+0x1ec/0x4858
[   59.802585]  kasan_atomics+0x198/0x2e0
[   59.802602]  kunit_try_run_case+0x170/0x3f0
[   59.802621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.802642]  kthread+0x328/0x630
[   59.802656]  ret_from_fork+0x10/0x20
[   59.802672] 
[   59.875760] Allocated by task 374:
[   59.879219]  kasan_save_stack+0x3c/0x68
[   59.883118]  kasan_save_track+0x20/0x40
[   59.887013]  kasan_save_alloc_info+0x40/0x58
[   59.891347]  __kasan_kmalloc+0xd4/0xd8
[   59.895156]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.899754]  kasan_atomics+0xb8/0x2e0
[   59.903476]  kunit_try_run_case+0x170/0x3f0
[   59.907729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.913297]  kthread+0x328/0x630
[   59.916580]  ret_from_fork+0x10/0x20
[   59.920213] 
[   59.921737] The buggy address belongs to the object at ffff000081814300
[   59.921737]  which belongs to the cache kmalloc-64 of size 64
[   59.934220] The buggy address is located 0 bytes to the right of
[   59.934220]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   59.947229] 
[   59.948753] The buggy address belongs to the physical page:
[   59.954399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   59.962502] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.969466] page_type: f5(slab)
[   59.972663] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   59.980508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.988346] page dumped because: kasan: bad access detected
[   59.993991] 
[   59.995521] Memory state around the buggy address:
[   60.000375]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.007686]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.014997] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.022303]                                      ^
[   60.027157]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.034466]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.041771] ==================================================================
[   60.590189] ==================================================================
[   60.597507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   60.605001] Read of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   60.612407] 
[   60.613934] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   60.613963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.613973] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.613983] Call trace:
[   60.613990]  show_stack+0x20/0x38 (C)
[   60.614006]  dump_stack_lvl+0x8c/0xd0
[   60.614025]  print_report+0x118/0x608
[   60.614044]  kasan_report+0xdc/0x128
[   60.614062]  __asan_report_load4_noabort+0x20/0x30
[   60.614079]  kasan_atomics_helper+0x40fc/0x4858
[   60.614098]  kasan_atomics+0x198/0x2e0
[   60.614116]  kunit_try_run_case+0x170/0x3f0
[   60.614134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.614156]  kthread+0x328/0x630
[   60.614170]  ret_from_fork+0x10/0x20
[   60.614188] 
[   60.684000] Allocated by task 374:
[   60.687458]  kasan_save_stack+0x3c/0x68
[   60.691357]  kasan_save_track+0x20/0x40
[   60.695256]  kasan_save_alloc_info+0x40/0x58
[   60.699596]  __kasan_kmalloc+0xd4/0xd8
[   60.703408]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.708010]  kasan_atomics+0xb8/0x2e0
[   60.711733]  kunit_try_run_case+0x170/0x3f0
[   60.715988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.721558]  kthread+0x328/0x630
[   60.724845]  ret_from_fork+0x10/0x20
[   60.728481] 
[   60.730006] The buggy address belongs to the object at ffff000081814300
[   60.730006]  which belongs to the cache kmalloc-64 of size 64
[   60.742488] The buggy address is located 0 bytes to the right of
[   60.742488]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   60.755492] 
[   60.757018] The buggy address belongs to the physical page:
[   60.762666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   60.770765] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.777723] page_type: f5(slab)
[   60.780925] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   60.788766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.796601] page dumped because: kasan: bad access detected
[   60.802249] 
[   60.803774] Memory state around the buggy address:
[   60.808631]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.815945]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.823259] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.830575]                                      ^
[   60.835433]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.842747]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.850060] ==================================================================
[   63.019186] ==================================================================
[   63.026500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   63.033906] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   63.041397] 
[   63.042924] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   63.042953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.042962] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.042972] Call trace:
[   63.042978]  show_stack+0x20/0x38 (C)
[   63.042996]  dump_stack_lvl+0x8c/0xd0
[   63.043014]  print_report+0x118/0x608
[   63.043033]  kasan_report+0xdc/0x128
[   63.043055]  kasan_check_range+0x100/0x1a8
[   63.043075]  __kasan_check_write+0x20/0x30
[   63.043092]  kasan_atomics_helper+0x61c/0x4858
[   63.043111]  kasan_atomics+0x198/0x2e0
[   63.043128]  kunit_try_run_case+0x170/0x3f0
[   63.043147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.043168]  kthread+0x328/0x630
[   63.043181]  ret_from_fork+0x10/0x20
[   63.043197] 
[   63.116363] Allocated by task 374:
[   63.119820]  kasan_save_stack+0x3c/0x68
[   63.123723]  kasan_save_track+0x20/0x40
[   63.127621]  kasan_save_alloc_info+0x40/0x58
[   63.131962]  __kasan_kmalloc+0xd4/0xd8
[   63.135773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.140376]  kasan_atomics+0xb8/0x2e0
[   63.144098]  kunit_try_run_case+0x170/0x3f0
[   63.148354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.153915]  kthread+0x328/0x630
[   63.157203]  ret_from_fork+0x10/0x20
[   63.160840] 
[   63.162365] The buggy address belongs to the object at ffff000081814300
[   63.162365]  which belongs to the cache kmalloc-64 of size 64
[   63.174848] The buggy address is located 0 bytes to the right of
[   63.174848]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   63.187858] 
[   63.189382] The buggy address belongs to the physical page:
[   63.195031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   63.203130] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.210089] page_type: f5(slab)
[   63.213288] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   63.221129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.228963] page dumped because: kasan: bad access detected
[   63.234612] 
[   63.236136] Memory state around the buggy address:
[   63.240994]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.248309]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.255624] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.262939]                                      ^
[   63.267797]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.275113]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.282426] ==================================================================
[   61.666143] ==================================================================
[   61.673456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   61.680863] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   61.688353] 
[   61.689878] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   61.689908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.689916] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.689926] Call trace:
[   61.689931]  show_stack+0x20/0x38 (C)
[   61.689948]  dump_stack_lvl+0x8c/0xd0
[   61.689971]  print_report+0x118/0x608
[   61.689991]  kasan_report+0xdc/0x128
[   61.690009]  kasan_check_range+0x100/0x1a8
[   61.690029]  __kasan_check_write+0x20/0x30
[   61.690044]  kasan_atomics_helper+0x414/0x4858
[   61.690063]  kasan_atomics+0x198/0x2e0
[   61.690082]  kunit_try_run_case+0x170/0x3f0
[   61.690100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.690121]  kthread+0x328/0x630
[   61.690136]  ret_from_fork+0x10/0x20
[   61.690153] 
[   61.763307] Allocated by task 374:
[   61.766764]  kasan_save_stack+0x3c/0x68
[   61.770663]  kasan_save_track+0x20/0x40
[   61.774563]  kasan_save_alloc_info+0x40/0x58
[   61.778901]  __kasan_kmalloc+0xd4/0xd8
[   61.782713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.787317]  kasan_atomics+0xb8/0x2e0
[   61.791039]  kunit_try_run_case+0x170/0x3f0
[   61.795297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.800868]  kthread+0x328/0x630
[   61.804156]  ret_from_fork+0x10/0x20
[   61.807793] 
[   61.809318] The buggy address belongs to the object at ffff000081814300
[   61.809318]  which belongs to the cache kmalloc-64 of size 64
[   61.821800] The buggy address is located 0 bytes to the right of
[   61.821800]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   61.834807] 
[   61.836331] The buggy address belongs to the physical page:
[   61.841979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   61.850079] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.857038] page_type: f5(slab)
[   61.860239] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   61.868080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.875917] page dumped because: kasan: bad access detected
[   61.881567] 
[   61.883090] Memory state around the buggy address:
[   61.887949]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.895266]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.902582] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.909897]                                      ^
[   61.914754]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.922070]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.929385] ==================================================================
[   62.207363] ==================================================================
[   62.214679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   62.222086] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   62.229578] 
[   62.231104] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   62.231133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.231141] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.231151] Call trace:
[   62.231157]  show_stack+0x20/0x38 (C)
[   62.231174]  dump_stack_lvl+0x8c/0xd0
[   62.231193]  print_report+0x118/0x608
[   62.231211]  kasan_report+0xdc/0x128
[   62.231230]  kasan_check_range+0x100/0x1a8
[   62.231249]  __kasan_check_write+0x20/0x30
[   62.231264]  kasan_atomics_helper+0x4e4/0x4858
[   62.231282]  kasan_atomics+0x198/0x2e0
[   62.231299]  kunit_try_run_case+0x170/0x3f0
[   62.231317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.231337]  kthread+0x328/0x630
[   62.231350]  ret_from_fork+0x10/0x20
[   62.231367] 
[   62.304525] Allocated by task 374:
[   62.307982]  kasan_save_stack+0x3c/0x68
[   62.311881]  kasan_save_track+0x20/0x40
[   62.315782]  kasan_save_alloc_info+0x40/0x58
[   62.320122]  __kasan_kmalloc+0xd4/0xd8
[   62.323933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.328537]  kasan_atomics+0xb8/0x2e0
[   62.332261]  kunit_try_run_case+0x170/0x3f0
[   62.336515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.342075]  kthread+0x328/0x630
[   62.345363]  ret_from_fork+0x10/0x20
[   62.349000] 
[   62.350524] The buggy address belongs to the object at ffff000081814300
[   62.350524]  which belongs to the cache kmalloc-64 of size 64
[   62.363006] The buggy address is located 0 bytes to the right of
[   62.363006]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   62.376010] 
[   62.377534] The buggy address belongs to the physical page:
[   62.383184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   62.391282] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.398240] page_type: f5(slab)
[   62.401441] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   62.409281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.417117] page dumped because: kasan: bad access detected
[   62.422767] 
[   62.424291] Memory state around the buggy address:
[   62.429150]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.436466]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.443782] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.451095]                                      ^
[   62.455952]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.463265]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.470578] ==================================================================
[   60.319739] ==================================================================
[   60.327049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   60.334449] Read of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   60.341857] 
[   60.343383] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   60.343413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.343422] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.343434] Call trace:
[   60.343440]  show_stack+0x20/0x38 (C)
[   60.343457]  dump_stack_lvl+0x8c/0xd0
[   60.343477]  print_report+0x118/0x608
[   60.343495]  kasan_report+0xdc/0x128
[   60.343515]  kasan_check_range+0x100/0x1a8
[   60.343534]  __kasan_check_read+0x20/0x30
[   60.343550]  kasan_atomics_helper+0x2b0/0x4858
[   60.343569]  kasan_atomics+0x198/0x2e0
[   60.343587]  kunit_try_run_case+0x170/0x3f0
[   60.343606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.343628]  kthread+0x328/0x630
[   60.343642]  ret_from_fork+0x10/0x20
[   60.343659] 
[   60.416744] Allocated by task 374:
[   60.420202]  kasan_save_stack+0x3c/0x68
[   60.424103]  kasan_save_track+0x20/0x40
[   60.428003]  kasan_save_alloc_info+0x40/0x58
[   60.432344]  __kasan_kmalloc+0xd4/0xd8
[   60.436158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.440762]  kasan_atomics+0xb8/0x2e0
[   60.444487]  kunit_try_run_case+0x170/0x3f0
[   60.448744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.454304]  kthread+0x328/0x630
[   60.457592]  ret_from_fork+0x10/0x20
[   60.461228] 
[   60.462753] The buggy address belongs to the object at ffff000081814300
[   60.462753]  which belongs to the cache kmalloc-64 of size 64
[   60.475235] The buggy address is located 0 bytes to the right of
[   60.475235]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   60.488239] 
[   60.489763] The buggy address belongs to the physical page:
[   60.495413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   60.503513] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.510472] page_type: f5(slab)
[   60.513674] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   60.521513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.529349] page dumped because: kasan: bad access detected
[   60.534999] 
[   60.536523] Memory state around the buggy address:
[   60.541380]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.548695]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.556011] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.563324]                                      ^
[   60.568182]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.575496]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.582809] ==================================================================
[   62.477958] ==================================================================
[   62.485272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   62.492679] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   62.500172] 
[   62.501698] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   62.501727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.501735] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.501745] Call trace:
[   62.501752]  show_stack+0x20/0x38 (C)
[   62.501769]  dump_stack_lvl+0x8c/0xd0
[   62.501788]  print_report+0x118/0x608
[   62.501806]  kasan_report+0xdc/0x128
[   62.501824]  kasan_check_range+0x100/0x1a8
[   62.501844]  __kasan_check_write+0x20/0x30
[   62.501861]  kasan_atomics_helper+0x54c/0x4858
[   62.501880]  kasan_atomics+0x198/0x2e0
[   62.501897]  kunit_try_run_case+0x170/0x3f0
[   62.501916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.501938]  kthread+0x328/0x630
[   62.501952]  ret_from_fork+0x10/0x20
[   62.501969] 
[   62.575144] Allocated by task 374:
[   62.578601]  kasan_save_stack+0x3c/0x68
[   62.582502]  kasan_save_track+0x20/0x40
[   62.586399]  kasan_save_alloc_info+0x40/0x58
[   62.590738]  __kasan_kmalloc+0xd4/0xd8
[   62.594549]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.599153]  kasan_atomics+0xb8/0x2e0
[   62.602877]  kunit_try_run_case+0x170/0x3f0
[   62.607133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.612695]  kthread+0x328/0x630
[   62.615983]  ret_from_fork+0x10/0x20
[   62.619620] 
[   62.621144] The buggy address belongs to the object at ffff000081814300
[   62.621144]  which belongs to the cache kmalloc-64 of size 64
[   62.633626] The buggy address is located 0 bytes to the right of
[   62.633626]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   62.646634] 
[   62.648159] The buggy address belongs to the physical page:
[   62.653806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   62.661905] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.668864] page_type: f5(slab)
[   62.672066] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   62.679905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.687741] page dumped because: kasan: bad access detected
[   62.693390] 
[   62.694914] Memory state around the buggy address:
[   62.699772]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.707088]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.714405] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.721719]                                      ^
[   62.726578]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.733891]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.741205] ==================================================================
[   62.748571] ==================================================================
[   62.755885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   62.763293] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   62.770784] 
[   62.772309] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   62.772338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.772346] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.772356] Call trace:
[   62.772362]  show_stack+0x20/0x38 (C)
[   62.772380]  dump_stack_lvl+0x8c/0xd0
[   62.772398]  print_report+0x118/0x608
[   62.772418]  kasan_report+0xdc/0x128
[   62.772436]  kasan_check_range+0x100/0x1a8
[   62.772456]  __kasan_check_write+0x20/0x30
[   62.772472]  kasan_atomics_helper+0x5b4/0x4858
[   62.772490]  kasan_atomics+0x198/0x2e0
[   62.772507]  kunit_try_run_case+0x170/0x3f0
[   62.772526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.772548]  kthread+0x328/0x630
[   62.772561]  ret_from_fork+0x10/0x20
[   62.772578] 
[   62.845742] Allocated by task 374:
[   62.849200]  kasan_save_stack+0x3c/0x68
[   62.853100]  kasan_save_track+0x20/0x40
[   62.857000]  kasan_save_alloc_info+0x40/0x58
[   62.861341]  __kasan_kmalloc+0xd4/0xd8
[   62.865152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.869754]  kasan_atomics+0xb8/0x2e0
[   62.873476]  kunit_try_run_case+0x170/0x3f0
[   62.877731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.883302]  kthread+0x328/0x630
[   62.886588]  ret_from_fork+0x10/0x20
[   62.890223] 
[   62.891747] The buggy address belongs to the object at ffff000081814300
[   62.891747]  which belongs to the cache kmalloc-64 of size 64
[   62.904230] The buggy address is located 0 bytes to the right of
[   62.904230]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   62.917235] 
[   62.918761] The buggy address belongs to the physical page:
[   62.924411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   62.932510] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.939468] page_type: f5(slab)
[   62.942668] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   62.950508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.958343] page dumped because: kasan: bad access detected
[   62.963993] 
[   62.965518] Memory state around the buggy address:
[   62.970375]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.977693]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.985008] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.992321]                                      ^
[   62.997179]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.004493]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.011808] ==================================================================
[   63.289792] ==================================================================
[   63.297106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   63.304513] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   63.312006] 
[   63.313532] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   63.313561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.313570] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.313581] Call trace:
[   63.313587]  show_stack+0x20/0x38 (C)
[   63.313603]  dump_stack_lvl+0x8c/0xd0
[   63.313621]  print_report+0x118/0x608
[   63.313639]  kasan_report+0xdc/0x128
[   63.313658]  kasan_check_range+0x100/0x1a8
[   63.313678]  __kasan_check_write+0x20/0x30
[   63.313695]  kasan_atomics_helper+0x684/0x4858
[   63.313713]  kasan_atomics+0x198/0x2e0
[   63.313731]  kunit_try_run_case+0x170/0x3f0
[   63.313749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.313770]  kthread+0x328/0x630
[   63.313784]  ret_from_fork+0x10/0x20
[   63.313802] 
[   63.386957] Allocated by task 374:
[   63.390417]  kasan_save_stack+0x3c/0x68
[   63.394315]  kasan_save_track+0x20/0x40
[   63.398216]  kasan_save_alloc_info+0x40/0x58
[   63.402558]  __kasan_kmalloc+0xd4/0xd8
[   63.406369]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.410974]  kasan_atomics+0xb8/0x2e0
[   63.414699]  kunit_try_run_case+0x170/0x3f0
[   63.418955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.424517]  kthread+0x328/0x630
[   63.427804]  ret_from_fork+0x10/0x20
[   63.431440] 
[   63.432964] The buggy address belongs to the object at ffff000081814300
[   63.432964]  which belongs to the cache kmalloc-64 of size 64
[   63.445448] The buggy address is located 0 bytes to the right of
[   63.445448]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   63.458456] 
[   63.459981] The buggy address belongs to the physical page:
[   63.465629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   63.473729] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.480687] page_type: f5(slab)
[   63.483888] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   63.491729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.499566] page dumped because: kasan: bad access detected
[   63.505216] 
[   63.506740] Memory state around the buggy address:
[   63.511597]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.518913]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.526231] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.533543]                                      ^
[   63.538401]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.545717]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.553032] ==================================================================
[   61.936763] ==================================================================
[   61.944079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   61.951488] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   61.958979] 
[   61.960506] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   61.960536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.960543] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.960555] Call trace:
[   61.960561]  show_stack+0x20/0x38 (C)
[   61.960578]  dump_stack_lvl+0x8c/0xd0
[   61.960598]  print_report+0x118/0x608
[   61.960617]  kasan_report+0xdc/0x128
[   61.960636]  kasan_check_range+0x100/0x1a8
[   61.960656]  __kasan_check_write+0x20/0x30
[   61.960671]  kasan_atomics_helper+0x47c/0x4858
[   61.960692]  kasan_atomics+0x198/0x2e0
[   61.960709]  kunit_try_run_case+0x170/0x3f0
[   61.960727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.960749]  kthread+0x328/0x630
[   61.960764]  ret_from_fork+0x10/0x20
[   61.960781] 
[   62.033945] Allocated by task 374:
[   62.037404]  kasan_save_stack+0x3c/0x68
[   62.041305]  kasan_save_track+0x20/0x40
[   62.045202]  kasan_save_alloc_info+0x40/0x58
[   62.049541]  __kasan_kmalloc+0xd4/0xd8
[   62.053353]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.057955]  kasan_atomics+0xb8/0x2e0
[   62.061678]  kunit_try_run_case+0x170/0x3f0
[   62.065932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.071493]  kthread+0x328/0x630
[   62.074780]  ret_from_fork+0x10/0x20
[   62.078416] 
[   62.079940] The buggy address belongs to the object at ffff000081814300
[   62.079940]  which belongs to the cache kmalloc-64 of size 64
[   62.092423] The buggy address is located 0 bytes to the right of
[   62.092423]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   62.105430] 
[   62.106954] The buggy address belongs to the physical page:
[   62.112602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   62.120700] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.127660] page_type: f5(slab)
[   62.130861] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   62.138701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.146536] page dumped because: kasan: bad access detected
[   62.152186] 
[   62.153709] Memory state around the buggy address:
[   62.158568]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.165884]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.173199] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.180513]                                      ^
[   62.185371]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.192686]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.200000] ==================================================================
[   59.510179] ==================================================================
[   59.517505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   59.525010] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374
[   59.532510] 
[   59.534047] CPU: 3 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   59.534079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.534089] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.534101] Call trace:
[   59.534109]  show_stack+0x20/0x38 (C)
[   59.534128]  dump_stack_lvl+0x8c/0xd0
[   59.534149]  print_report+0x118/0x608
[   59.534169]  kasan_report+0xdc/0x128
[   59.534190]  __asan_report_store4_noabort+0x20/0x30
[   59.534209]  kasan_atomics_helper+0x3f7c/0x4858
[   59.534229]  kasan_atomics+0x198/0x2e0
[   59.534249]  kunit_try_run_case+0x170/0x3f0
[   59.534269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.534292]  kthread+0x328/0x630
[   59.534308]  ret_from_fork+0x10/0x20
[   59.534326] 
[   59.604257] Allocated by task 374:
[   59.607720]  kasan_save_stack+0x3c/0x68
[   59.611623]  kasan_save_track+0x20/0x40
[   59.615525]  kasan_save_alloc_info+0x40/0x58
[   59.619863]  __kasan_kmalloc+0xd4/0xd8
[   59.623675]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.628277]  kasan_atomics+0xb8/0x2e0
[   59.632014]  kunit_try_run_case+0x170/0x3f0
[   59.636271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.641846]  kthread+0x328/0x630
[   59.645140]  ret_from_fork+0x10/0x20
[   59.648780] 
[   59.650312] The buggy address belongs to the object at ffff000081814300
[   59.650312]  which belongs to the cache kmalloc-64 of size 64
[   59.662799] The buggy address is located 0 bytes to the right of
[   59.662799]  allocated 48-byte region [ffff000081814300, ffff000081814330)
[   59.675811] 
[   59.677342] The buggy address belongs to the physical page:
[   59.682993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814
[   59.691098] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.698074] page_type: f5(slab)
[   59.701281] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007
[   59.709131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.716974] page dumped because: kasan: bad access detected
[   59.722628] 
[   59.724165] Memory state around the buggy address:
[   59.729030]  ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.736355]  ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.743673] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.750990]                                      ^
[   59.755853]  ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.763172]  ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.770488] ==================================================================

[   33.799315] ==================================================================
[   33.799369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.799422] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.799920] 
[   33.799989] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.800176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.800211] Hardware name: linux,dummy-virt (DT)
[   33.800247] Call trace:
[   33.800277]  show_stack+0x20/0x38 (C)
[   33.800390]  dump_stack_lvl+0x8c/0xd0
[   33.800662]  print_report+0x118/0x608
[   33.800734]  kasan_report+0xdc/0x128
[   33.800790]  kasan_check_range+0x100/0x1a8
[   33.800851]  __kasan_check_write+0x20/0x30
[   33.801411]  kasan_atomics_helper+0xe44/0x4858
[   33.801646]  kasan_atomics+0x198/0x2e0
[   33.801898]  kunit_try_run_case+0x170/0x3f0
[   33.802119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.802217]  kthread+0x328/0x630
[   33.802497]  ret_from_fork+0x10/0x20
[   33.802938] 
[   33.803118] Allocated by task 297:
[   33.803311]  kasan_save_stack+0x3c/0x68
[   33.803657]  kasan_save_track+0x20/0x40
[   33.803946]  kasan_save_alloc_info+0x40/0x58
[   33.804204]  __kasan_kmalloc+0xd4/0xd8
[   33.804491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.804548]  kasan_atomics+0xb8/0x2e0
[   33.804822]  kunit_try_run_case+0x170/0x3f0
[   33.805069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.805283]  kthread+0x328/0x630
[   33.805402]  ret_from_fork+0x10/0x20
[   33.805444] 
[   33.805628] The buggy address belongs to the object at fff00000c5a8e300
[   33.805628]  which belongs to the cache kmalloc-64 of size 64
[   33.805865] The buggy address is located 0 bytes to the right of
[   33.805865]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.806118] 
[   33.806353] The buggy address belongs to the physical page:
[   33.806442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.806519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.806587] page_type: f5(slab)
[   33.806628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.806693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.806738] page dumped because: kasan: bad access detected
[   33.806772] 
[   33.806803] Memory state around the buggy address:
[   33.806847]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.806893]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.806938] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.806979]                                      ^
[   33.807034]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.807088]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.807138] ==================================================================
[   33.841013] ==================================================================
[   33.841265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.841335] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.841389] 
[   33.841425] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.841561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.842155] Hardware name: linux,dummy-virt (DT)
[   33.842340] Call trace:
[   33.842380]  show_stack+0x20/0x38 (C)
[   33.842651]  dump_stack_lvl+0x8c/0xd0
[   33.842866]  print_report+0x118/0x608
[   33.843108]  kasan_report+0xdc/0x128
[   33.843263]  kasan_check_range+0x100/0x1a8
[   33.843318]  __kasan_check_write+0x20/0x30
[   33.843615]  kasan_atomics_helper+0xf88/0x4858
[   33.843871]  kasan_atomics+0x198/0x2e0
[   33.844051]  kunit_try_run_case+0x170/0x3f0
[   33.844107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.844846]  kthread+0x328/0x630
[   33.844951]  ret_from_fork+0x10/0x20
[   33.845060] 
[   33.845085] Allocated by task 297:
[   33.845115]  kasan_save_stack+0x3c/0x68
[   33.845164]  kasan_save_track+0x20/0x40
[   33.845206]  kasan_save_alloc_info+0x40/0x58
[   33.845707]  __kasan_kmalloc+0xd4/0xd8
[   33.846043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.846274]  kasan_atomics+0xb8/0x2e0
[   33.846496]  kunit_try_run_case+0x170/0x3f0
[   33.846567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.846872]  kthread+0x328/0x630
[   33.846933]  ret_from_fork+0x10/0x20
[   33.847095] 
[   33.847143] The buggy address belongs to the object at fff00000c5a8e300
[   33.847143]  which belongs to the cache kmalloc-64 of size 64
[   33.847217] The buggy address is located 0 bytes to the right of
[   33.847217]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.847300] 
[   33.847341] The buggy address belongs to the physical page:
[   33.847376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.847450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.847512] page_type: f5(slab)
[   33.847556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.847619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.847663] page dumped because: kasan: bad access detected
[   33.847696] 
[   33.847718] Memory state around the buggy address:
[   33.847757]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.847803]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.847888] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.848306]                                      ^
[   33.848418]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.848993]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.849299] ==================================================================
[   33.967980] ==================================================================
[   33.968101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.968302] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.968357] 
[   33.968391] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.968480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.968508] Hardware name: linux,dummy-virt (DT)
[   33.968543] Call trace:
[   33.968567]  show_stack+0x20/0x38 (C)
[   33.968618]  dump_stack_lvl+0x8c/0xd0
[   33.968669]  print_report+0x118/0x608
[   33.969052]  kasan_report+0xdc/0x128
[   33.969177]  kasan_check_range+0x100/0x1a8
[   33.969678]  __kasan_check_write+0x20/0x30
[   33.969923]  kasan_atomics_helper+0x147c/0x4858
[   33.970151]  kasan_atomics+0x198/0x2e0
[   33.970266]  kunit_try_run_case+0x170/0x3f0
[   33.970703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.971055]  kthread+0x328/0x630
[   33.971195]  ret_from_fork+0x10/0x20
[   33.971575] 
[   33.971617] Allocated by task 297:
[   33.971769]  kasan_save_stack+0x3c/0x68
[   33.972001]  kasan_save_track+0x20/0x40
[   33.972292]  kasan_save_alloc_info+0x40/0x58
[   33.972479]  __kasan_kmalloc+0xd4/0xd8
[   33.972531]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.972577]  kasan_atomics+0xb8/0x2e0
[   33.972625]  kunit_try_run_case+0x170/0x3f0
[   33.972667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.973080]  kthread+0x328/0x630
[   33.973142]  ret_from_fork+0x10/0x20
[   33.973184] 
[   33.973207] The buggy address belongs to the object at fff00000c5a8e300
[   33.973207]  which belongs to the cache kmalloc-64 of size 64
[   33.973280] The buggy address is located 0 bytes to the right of
[   33.973280]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.973351] 
[   33.973391] The buggy address belongs to the physical page:
[   33.973428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.973494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.973553] page_type: f5(slab)
[   33.973598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.973650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.973703] page dumped because: kasan: bad access detected
[   33.973760] 
[   33.973789] Memory state around the buggy address:
[   33.973846]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.974650]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.974709] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.975023]                                      ^
[   33.975304]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.975388]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.975488] ==================================================================
[   33.904414] ==================================================================
[   33.904475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.904858] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.905162] 
[   33.905465] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.905847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.906134] Hardware name: linux,dummy-virt (DT)
[   33.906215] Call trace:
[   33.906331]  show_stack+0x20/0x38 (C)
[   33.906830]  dump_stack_lvl+0x8c/0xd0
[   33.907104]  print_report+0x118/0x608
[   33.907342]  kasan_report+0xdc/0x128
[   33.907587]  kasan_check_range+0x100/0x1a8
[   33.907759]  __kasan_check_write+0x20/0x30
[   33.907811]  kasan_atomics_helper+0x11f8/0x4858
[   33.908046]  kasan_atomics+0x198/0x2e0
[   33.908445]  kunit_try_run_case+0x170/0x3f0
[   33.908814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.909028]  kthread+0x328/0x630
[   33.909209]  ret_from_fork+0x10/0x20
[   33.909517] 
[   33.909549] Allocated by task 297:
[   33.909863]  kasan_save_stack+0x3c/0x68
[   33.910054]  kasan_save_track+0x20/0x40
[   33.910288]  kasan_save_alloc_info+0x40/0x58
[   33.910398]  __kasan_kmalloc+0xd4/0xd8
[   33.910548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.910770]  kasan_atomics+0xb8/0x2e0
[   33.911187]  kunit_try_run_case+0x170/0x3f0
[   33.912013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.912215]  kthread+0x328/0x630
[   33.912263]  ret_from_fork+0x10/0x20
[   33.912628] 
[   33.912763] The buggy address belongs to the object at fff00000c5a8e300
[   33.912763]  which belongs to the cache kmalloc-64 of size 64
[   33.913011] The buggy address is located 0 bytes to the right of
[   33.913011]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.913481] 
[   33.913535] The buggy address belongs to the physical page:
[   33.913662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.914343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.914437] page_type: f5(slab)
[   33.915031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.915395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.915730] page dumped because: kasan: bad access detected
[   33.915853] 
[   33.915976] Memory state around the buggy address:
[   33.916113]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.916343]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.916412] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.916458]                                      ^
[   33.916495]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.916911]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.917100] ==================================================================
[   33.665301] ==================================================================
[   33.665356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.665846] Write of size 4 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.665917] 
[   33.666122] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.666413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.666472] Hardware name: linux,dummy-virt (DT)
[   33.666602] Call trace:
[   33.666630]  show_stack+0x20/0x38 (C)
[   33.666722]  dump_stack_lvl+0x8c/0xd0
[   33.666784]  print_report+0x118/0x608
[   33.667000]  kasan_report+0xdc/0x128
[   33.667071]  kasan_check_range+0x100/0x1a8
[   33.667368]  __kasan_check_write+0x20/0x30
[   33.667436]  kasan_atomics_helper+0xa6c/0x4858
[   33.667690]  kasan_atomics+0x198/0x2e0
[   33.667872]  kunit_try_run_case+0x170/0x3f0
[   33.668332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.668494]  kthread+0x328/0x630
[   33.668657]  ret_from_fork+0x10/0x20
[   33.668796] 
[   33.668874] Allocated by task 297:
[   33.668907]  kasan_save_stack+0x3c/0x68
[   33.669130]  kasan_save_track+0x20/0x40
[   33.669341]  kasan_save_alloc_info+0x40/0x58
[   33.669568]  __kasan_kmalloc+0xd4/0xd8
[   33.669684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.669862]  kasan_atomics+0xb8/0x2e0
[   33.669918]  kunit_try_run_case+0x170/0x3f0
[   33.670308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.670492]  kthread+0x328/0x630
[   33.670637]  ret_from_fork+0x10/0x20
[   33.670866] 
[   33.670895] The buggy address belongs to the object at fff00000c5a8e300
[   33.670895]  which belongs to the cache kmalloc-64 of size 64
[   33.671319] The buggy address is located 0 bytes to the right of
[   33.671319]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.671615] 
[   33.671693] The buggy address belongs to the physical page:
[   33.671832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.671978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.672032] page_type: f5(slab)
[   33.672084] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.672166] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.672216] page dumped because: kasan: bad access detected
[   33.672266] 
[   33.672448] Memory state around the buggy address:
[   33.672688]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.672754]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.673073] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.673243]                                      ^
[   33.673305]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.673552]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.673685] ==================================================================
[   33.746762] ==================================================================
[   33.746980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.747049] Read of size 4 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.747110] 
[   33.747435] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.747899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.748120] Hardware name: linux,dummy-virt (DT)
[   33.748283] Call trace:
[   33.748332]  show_stack+0x20/0x38 (C)
[   33.748475]  dump_stack_lvl+0x8c/0xd0
[   33.748735]  print_report+0x118/0x608
[   33.749031]  kasan_report+0xdc/0x128
[   33.749260]  __asan_report_load4_noabort+0x20/0x30
[   33.749557]  kasan_atomics_helper+0x3dd8/0x4858
[   33.749631]  kasan_atomics+0x198/0x2e0
[   33.749967]  kunit_try_run_case+0x170/0x3f0
[   33.750444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.750791]  kthread+0x328/0x630
[   33.751185]  ret_from_fork+0x10/0x20
[   33.751390] 
[   33.751415] Allocated by task 297:
[   33.751747]  kasan_save_stack+0x3c/0x68
[   33.751926]  kasan_save_track+0x20/0x40
[   33.752111]  kasan_save_alloc_info+0x40/0x58
[   33.752175]  __kasan_kmalloc+0xd4/0xd8
[   33.752316]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.752472]  kasan_atomics+0xb8/0x2e0
[   33.752917]  kunit_try_run_case+0x170/0x3f0
[   33.753062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.753320]  kthread+0x328/0x630
[   33.753362]  ret_from_fork+0x10/0x20
[   33.753408] 
[   33.753432] The buggy address belongs to the object at fff00000c5a8e300
[   33.753432]  which belongs to the cache kmalloc-64 of size 64
[   33.754189] The buggy address is located 0 bytes to the right of
[   33.754189]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.754416] 
[   33.754536] The buggy address belongs to the physical page:
[   33.754779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.754853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.755195] page_type: f5(slab)
[   33.755325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.755928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.755984] page dumped because: kasan: bad access detected
[   33.756020] 
[   33.756040] Memory state around the buggy address:
[   33.756076]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.756124]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.756194] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.756241]                                      ^
[   33.756277]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.756368]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.756612] ==================================================================
[   33.758504] ==================================================================
[   33.759040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.759205] Write of size 4 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.759264] 
[   33.759297] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.759392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.759710] Hardware name: linux,dummy-virt (DT)
[   33.759764] Call trace:
[   33.759791]  show_stack+0x20/0x38 (C)
[   33.760082]  dump_stack_lvl+0x8c/0xd0
[   33.760527]  print_report+0x118/0x608
[   33.760713]  kasan_report+0xdc/0x128
[   33.760798]  kasan_check_range+0x100/0x1a8
[   33.761046]  __kasan_check_write+0x20/0x30
[   33.761204]  kasan_atomics_helper+0xd3c/0x4858
[   33.761265]  kasan_atomics+0x198/0x2e0
[   33.761460]  kunit_try_run_case+0x170/0x3f0
[   33.761521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.761579]  kthread+0x328/0x630
[   33.761622]  ret_from_fork+0x10/0x20
[   33.761674] 
[   33.761695] Allocated by task 297:
[   33.761796]  kasan_save_stack+0x3c/0x68
[   33.761884]  kasan_save_track+0x20/0x40
[   33.761936]  kasan_save_alloc_info+0x40/0x58
[   33.761985]  __kasan_kmalloc+0xd4/0xd8
[   33.762024]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.762066]  kasan_atomics+0xb8/0x2e0
[   33.762106]  kunit_try_run_case+0x170/0x3f0
[   33.762148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.762207]  kthread+0x328/0x630
[   33.762257]  ret_from_fork+0x10/0x20
[   33.762306] 
[   33.762327] The buggy address belongs to the object at fff00000c5a8e300
[   33.762327]  which belongs to the cache kmalloc-64 of size 64
[   33.762389] The buggy address is located 0 bytes to the right of
[   33.762389]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.762460] 
[   33.762483] The buggy address belongs to the physical page:
[   33.762524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.762588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.762639] page_type: f5(slab)
[   33.762679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.762733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.762786] page dumped because: kasan: bad access detected
[   33.762829] 
[   33.763763] Memory state around the buggy address:
[   33.763844]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.763914]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.763971] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.764039]                                      ^
[   33.764448]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.764754]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.765087] ==================================================================
[   33.861958] ==================================================================
[   33.862011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.862066] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.862119] 
[   33.862317] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.862573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.862747] Hardware name: linux,dummy-virt (DT)
[   33.862811] Call trace:
[   33.863143]  show_stack+0x20/0x38 (C)
[   33.863209]  dump_stack_lvl+0x8c/0xd0
[   33.863407]  print_report+0x118/0x608
[   33.863569]  kasan_report+0xdc/0x128
[   33.863624]  kasan_check_range+0x100/0x1a8
[   33.863677]  __kasan_check_write+0x20/0x30
[   33.864075]  kasan_atomics_helper+0x1058/0x4858
[   33.864385]  kasan_atomics+0x198/0x2e0
[   33.864789]  kunit_try_run_case+0x170/0x3f0
[   33.865190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.865264]  kthread+0x328/0x630
[   33.865724]  ret_from_fork+0x10/0x20
[   33.866083] 
[   33.866274] Allocated by task 297:
[   33.866397]  kasan_save_stack+0x3c/0x68
[   33.866505]  kasan_save_track+0x20/0x40
[   33.866555]  kasan_save_alloc_info+0x40/0x58
[   33.867336]  __kasan_kmalloc+0xd4/0xd8
[   33.867426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.867642]  kasan_atomics+0xb8/0x2e0
[   33.867688]  kunit_try_run_case+0x170/0x3f0
[   33.867983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.868172]  kthread+0x328/0x630
[   33.868533]  ret_from_fork+0x10/0x20
[   33.868588] 
[   33.868610] The buggy address belongs to the object at fff00000c5a8e300
[   33.868610]  which belongs to the cache kmalloc-64 of size 64
[   33.868681] The buggy address is located 0 bytes to the right of
[   33.868681]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.868992] 
[   33.869500] The buggy address belongs to the physical page:
[   33.869689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.870058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.870242] page_type: f5(slab)
[   33.870347] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.870405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.870896] page dumped because: kasan: bad access detected
[   33.871096] 
[   33.871155] Memory state around the buggy address:
[   33.871195]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.871243]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.871288] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.871330]                                      ^
[   33.871367]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.871412]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.871454] ==================================================================
[   33.766966] ==================================================================
[   33.767026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.767307] Read of size 4 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.767388] 
[   33.767423] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.767510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.767540] Hardware name: linux,dummy-virt (DT)
[   33.767815] Call trace:
[   33.768225]  show_stack+0x20/0x38 (C)
[   33.768328]  dump_stack_lvl+0x8c/0xd0
[   33.768411]  print_report+0x118/0x608
[   33.768646]  kasan_report+0xdc/0x128
[   33.769058]  __asan_report_load4_noabort+0x20/0x30
[   33.769536]  kasan_atomics_helper+0x3e04/0x4858
[   33.769891]  kasan_atomics+0x198/0x2e0
[   33.769991]  kunit_try_run_case+0x170/0x3f0
[   33.770058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.770737]  kthread+0x328/0x630
[   33.770968]  ret_from_fork+0x10/0x20
[   33.771025] 
[   33.771054] Allocated by task 297:
[   33.771277]  kasan_save_stack+0x3c/0x68
[   33.771645]  kasan_save_track+0x20/0x40
[   33.772078]  kasan_save_alloc_info+0x40/0x58
[   33.772202]  __kasan_kmalloc+0xd4/0xd8
[   33.772278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.772718]  kasan_atomics+0xb8/0x2e0
[   33.772819]  kunit_try_run_case+0x170/0x3f0
[   33.773300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.773818]  kthread+0x328/0x630
[   33.773904]  ret_from_fork+0x10/0x20
[   33.774079] 
[   33.774167] The buggy address belongs to the object at fff00000c5a8e300
[   33.774167]  which belongs to the cache kmalloc-64 of size 64
[   33.774492] The buggy address is located 0 bytes to the right of
[   33.774492]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.774693] 
[   33.774750] The buggy address belongs to the physical page:
[   33.774995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.775179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.775477] page_type: f5(slab)
[   33.775765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.776055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.776125] page dumped because: kasan: bad access detected
[   33.776332] 
[   33.776500] Memory state around the buggy address:
[   33.776672]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.776872]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.776922] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.776971]                                      ^
[   33.777008]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.777323]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.777388] ==================================================================
[   33.851082] ==================================================================
[   33.851233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.851437] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.851647] 
[   33.851794] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.852053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.852337] Hardware name: linux,dummy-virt (DT)
[   33.852384] Call trace:
[   33.852774]  show_stack+0x20/0x38 (C)
[   33.853145]  dump_stack_lvl+0x8c/0xd0
[   33.853426]  print_report+0x118/0x608
[   33.853688]  kasan_report+0xdc/0x128
[   33.853925]  kasan_check_range+0x100/0x1a8
[   33.854409]  __kasan_check_write+0x20/0x30
[   33.854522]  kasan_atomics_helper+0xff0/0x4858
[   33.854874]  kasan_atomics+0x198/0x2e0
[   33.854939]  kunit_try_run_case+0x170/0x3f0
[   33.855283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.855689]  kthread+0x328/0x630
[   33.855828]  ret_from_fork+0x10/0x20
[   33.856485] 
[   33.856549] Allocated by task 297:
[   33.856805]  kasan_save_stack+0x3c/0x68
[   33.856869]  kasan_save_track+0x20/0x40
[   33.856912]  kasan_save_alloc_info+0x40/0x58
[   33.856954]  __kasan_kmalloc+0xd4/0xd8
[   33.856996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.857043]  kasan_atomics+0xb8/0x2e0
[   33.857242]  kunit_try_run_case+0x170/0x3f0
[   33.857749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.858113]  kthread+0x328/0x630
[   33.858430]  ret_from_fork+0x10/0x20
[   33.858772] 
[   33.858801] The buggy address belongs to the object at fff00000c5a8e300
[   33.858801]  which belongs to the cache kmalloc-64 of size 64
[   33.859039] The buggy address is located 0 bytes to the right of
[   33.859039]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.859249] 
[   33.859287] The buggy address belongs to the physical page:
[   33.859330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.859396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.859457] page_type: f5(slab)
[   33.859507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.859563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.859614] page dumped because: kasan: bad access detected
[   33.859652] 
[   33.859675] Memory state around the buggy address:
[   33.859711]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.859758]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.859804] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.859858]                                      ^
[   33.859894]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.859959]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.860008] ==================================================================
[   33.872115] ==================================================================
[   33.872169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.872225] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.872277] 
[   33.872326] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.872416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.872446] Hardware name: linux,dummy-virt (DT)
[   33.872490] Call trace:
[   33.872516]  show_stack+0x20/0x38 (C)
[   33.872565]  dump_stack_lvl+0x8c/0xd0
[   33.872616]  print_report+0x118/0x608
[   33.872673]  kasan_report+0xdc/0x128
[   33.872721]  kasan_check_range+0x100/0x1a8
[   33.872770]  __kasan_check_write+0x20/0x30
[   33.872819]  kasan_atomics_helper+0x10c0/0x4858
[   33.872898]  kasan_atomics+0x198/0x2e0
[   33.873276]  kunit_try_run_case+0x170/0x3f0
[   33.873780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.873888]  kthread+0x328/0x630
[   33.874328]  ret_from_fork+0x10/0x20
[   33.874656] 
[   33.874731] Allocated by task 297:
[   33.875120]  kasan_save_stack+0x3c/0x68
[   33.875274]  kasan_save_track+0x20/0x40
[   33.875320]  kasan_save_alloc_info+0x40/0x58
[   33.875628]  __kasan_kmalloc+0xd4/0xd8
[   33.875999]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.876189]  kasan_atomics+0xb8/0x2e0
[   33.876236]  kunit_try_run_case+0x170/0x3f0
[   33.876857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.876932]  kthread+0x328/0x630
[   33.876971]  ret_from_fork+0x10/0x20
[   33.877015] 
[   33.877675] The buggy address belongs to the object at fff00000c5a8e300
[   33.877675]  which belongs to the cache kmalloc-64 of size 64
[   33.877780] The buggy address is located 0 bytes to the right of
[   33.877780]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.877861] 
[   33.877884] The buggy address belongs to the physical page:
[   33.878545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.878622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.878675] page_type: f5(slab)
[   33.878719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.879350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.879710] page dumped because: kasan: bad access detected
[   33.880126] 
[   33.880269] Memory state around the buggy address:
[   33.880663]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.880808]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.881049] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.881244]                                      ^
[   33.881326]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.881668]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.881905] ==================================================================
[   33.938578] ==================================================================
[   33.938633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.938689] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.938740] 
[   33.938773] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.938877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.938907] Hardware name: linux,dummy-virt (DT)
[   33.938942] Call trace:
[   33.938994]  show_stack+0x20/0x38 (C)
[   33.939045]  dump_stack_lvl+0x8c/0xd0
[   33.939097]  print_report+0x118/0x608
[   33.939146]  kasan_report+0xdc/0x128
[   33.939196]  kasan_check_range+0x100/0x1a8
[   33.939247]  __kasan_check_write+0x20/0x30
[   33.939305]  kasan_atomics_helper+0x1384/0x4858
[   33.939358]  kasan_atomics+0x198/0x2e0
[   33.939405]  kunit_try_run_case+0x170/0x3f0
[   33.939456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.939514]  kthread+0x328/0x630
[   33.939558]  ret_from_fork+0x10/0x20
[   33.939608] 
[   33.939630] Allocated by task 297:
[   33.939661]  kasan_save_stack+0x3c/0x68
[   33.939715]  kasan_save_track+0x20/0x40
[   33.939759]  kasan_save_alloc_info+0x40/0x58
[   33.939801]  __kasan_kmalloc+0xd4/0xd8
[   33.939852]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.939988]  kasan_atomics+0xb8/0x2e0
[   33.940227]  kunit_try_run_case+0x170/0x3f0
[   33.940449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.940873]  kthread+0x328/0x630
[   33.941126]  ret_from_fork+0x10/0x20
[   33.941375] 
[   33.941637] The buggy address belongs to the object at fff00000c5a8e300
[   33.941637]  which belongs to the cache kmalloc-64 of size 64
[   33.941851] The buggy address is located 0 bytes to the right of
[   33.941851]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.941936] 
[   33.941963] The buggy address belongs to the physical page:
[   33.942370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.942756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.943210] page_type: f5(slab)
[   33.943290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.943725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.943879] page dumped because: kasan: bad access detected
[   33.944113] 
[   33.944181] Memory state around the buggy address:
[   33.944345]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.944430]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.944550] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.944666]                                      ^
[   33.944892]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.945088]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.945163] ==================================================================
[   33.827890] ==================================================================
[   33.827998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.828199] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.828669] 
[   33.828722] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.829214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.829291] Hardware name: linux,dummy-virt (DT)
[   33.829371] Call trace:
[   33.829408]  show_stack+0x20/0x38 (C)
[   33.830072]  dump_stack_lvl+0x8c/0xd0
[   33.830393]  print_report+0x118/0x608
[   33.830777]  kasan_report+0xdc/0x128
[   33.831160]  kasan_check_range+0x100/0x1a8
[   33.831365]  __kasan_check_write+0x20/0x30
[   33.831576]  kasan_atomics_helper+0xf20/0x4858
[   33.831638]  kasan_atomics+0x198/0x2e0
[   33.831898]  kunit_try_run_case+0x170/0x3f0
[   33.832076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.832287]  kthread+0x328/0x630
[   33.832472]  ret_from_fork+0x10/0x20
[   33.832654] 
[   33.832789] Allocated by task 297:
[   33.832822]  kasan_save_stack+0x3c/0x68
[   33.833268]  kasan_save_track+0x20/0x40
[   33.833462]  kasan_save_alloc_info+0x40/0x58
[   33.833710]  __kasan_kmalloc+0xd4/0xd8
[   33.834137]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.834302]  kasan_atomics+0xb8/0x2e0
[   33.834514]  kunit_try_run_case+0x170/0x3f0
[   33.834885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.835114]  kthread+0x328/0x630
[   33.835347]  ret_from_fork+0x10/0x20
[   33.835398] 
[   33.835422] The buggy address belongs to the object at fff00000c5a8e300
[   33.835422]  which belongs to the cache kmalloc-64 of size 64
[   33.836129] The buggy address is located 0 bytes to the right of
[   33.836129]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.836222] 
[   33.836464] The buggy address belongs to the physical page:
[   33.836755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.836819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.836882] page_type: f5(slab)
[   33.836924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.837183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.837654] page dumped because: kasan: bad access detected
[   33.837797] 
[   33.837978] Memory state around the buggy address:
[   33.838067]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.838132]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.838189] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.838485]                                      ^
[   33.838532]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.839031]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.839214] ==================================================================
[   33.646076] ==================================================================
[   33.646248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.646670] Write of size 4 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.646939] 
[   33.647031] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.647128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.647158] Hardware name: linux,dummy-virt (DT)
[   33.647358] Call trace:
[   33.647560]  show_stack+0x20/0x38 (C)
[   33.647625]  dump_stack_lvl+0x8c/0xd0
[   33.648067]  print_report+0x118/0x608
[   33.648326]  kasan_report+0xdc/0x128
[   33.648394]  kasan_check_range+0x100/0x1a8
[   33.648547]  __kasan_check_write+0x20/0x30
[   33.648787]  kasan_atomics_helper+0x99c/0x4858
[   33.649051]  kasan_atomics+0x198/0x2e0
[   33.649237]  kunit_try_run_case+0x170/0x3f0
[   33.649391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.649509]  kthread+0x328/0x630
[   33.649681]  ret_from_fork+0x10/0x20
[   33.649945] 
[   33.649975] Allocated by task 297:
[   33.650119]  kasan_save_stack+0x3c/0x68
[   33.650367]  kasan_save_track+0x20/0x40
[   33.650422]  kasan_save_alloc_info+0x40/0x58
[   33.650656]  __kasan_kmalloc+0xd4/0xd8
[   33.650820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.651130]  kasan_atomics+0xb8/0x2e0
[   33.651286]  kunit_try_run_case+0x170/0x3f0
[   33.651624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.651886]  kthread+0x328/0x630
[   33.652027]  ret_from_fork+0x10/0x20
[   33.652340] 
[   33.652459] The buggy address belongs to the object at fff00000c5a8e300
[   33.652459]  which belongs to the cache kmalloc-64 of size 64
[   33.652689] The buggy address is located 0 bytes to the right of
[   33.652689]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.652789] 
[   33.652811] The buggy address belongs to the physical page:
[   33.653076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.653310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.653493] page_type: f5(slab)
[   33.653754] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.653872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.653919] page dumped because: kasan: bad access detected
[   33.654186] 
[   33.654342] Memory state around the buggy address:
[   33.654383]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.654596]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.654926] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.655072]                                      ^
[   33.655295]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.655516]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.655561] ==================================================================
[   34.070969] ==================================================================
[   34.071036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   34.071393] Read of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   34.071466] 
[   34.071500] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.071617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.071649] Hardware name: linux,dummy-virt (DT)
[   34.071684] Call trace:
[   34.071710]  show_stack+0x20/0x38 (C)
[   34.071791]  dump_stack_lvl+0x8c/0xd0
[   34.071859]  print_report+0x118/0x608
[   34.071908]  kasan_report+0xdc/0x128
[   34.071959]  __asan_report_load8_noabort+0x20/0x30
[   34.072009]  kasan_atomics_helper+0x3e20/0x4858
[   34.072073]  kasan_atomics+0x198/0x2e0
[   34.072129]  kunit_try_run_case+0x170/0x3f0
[   34.072180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.072237]  kthread+0x328/0x630
[   34.072282]  ret_from_fork+0x10/0x20
[   34.072333] 
[   34.072364] Allocated by task 297:
[   34.072395]  kasan_save_stack+0x3c/0x68
[   34.072441]  kasan_save_track+0x20/0x40
[   34.072483]  kasan_save_alloc_info+0x40/0x58
[   34.072523]  __kasan_kmalloc+0xd4/0xd8
[   34.072563]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.072606]  kasan_atomics+0xb8/0x2e0
[   34.072645]  kunit_try_run_case+0x170/0x3f0
[   34.072697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.072753]  kthread+0x328/0x630
[   34.072788]  ret_from_fork+0x10/0x20
[   34.072827] 
[   34.073302] The buggy address belongs to the object at fff00000c5a8e300
[   34.073302]  which belongs to the cache kmalloc-64 of size 64
[   34.073372] The buggy address is located 0 bytes to the right of
[   34.073372]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   34.074304] 
[   34.074620] The buggy address belongs to the physical page:
[   34.074690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   34.074876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.074932] page_type: f5(slab)
[   34.075061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.075506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.076164] page dumped because: kasan: bad access detected
[   34.076335] 
[   34.076402] Memory state around the buggy address:
[   34.076612]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.077002]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.077068] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.077417]                                      ^
[   34.077458]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.077505]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.077546] ==================================================================
[   34.050490] ==================================================================
[   34.050749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   34.050810] Read of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   34.050877] 
[   34.050909] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.050997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.051024] Hardware name: linux,dummy-virt (DT)
[   34.051058] Call trace:
[   34.051248]  show_stack+0x20/0x38 (C)
[   34.051558]  dump_stack_lvl+0x8c/0xd0
[   34.051821]  print_report+0x118/0x608
[   34.051938]  kasan_report+0xdc/0x128
[   34.052064]  __asan_report_load8_noabort+0x20/0x30
[   34.052123]  kasan_atomics_helper+0x3e10/0x4858
[   34.052397]  kasan_atomics+0x198/0x2e0
[   34.052560]  kunit_try_run_case+0x170/0x3f0
[   34.052921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.052998]  kthread+0x328/0x630
[   34.053044]  ret_from_fork+0x10/0x20
[   34.053660] 
[   34.053828] Allocated by task 297:
[   34.053885]  kasan_save_stack+0x3c/0x68
[   34.053934]  kasan_save_track+0x20/0x40
[   34.054241]  kasan_save_alloc_info+0x40/0x58
[   34.054563]  __kasan_kmalloc+0xd4/0xd8
[   34.054634]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.054684]  kasan_atomics+0xb8/0x2e0
[   34.054725]  kunit_try_run_case+0x170/0x3f0
[   34.054828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.054901]  kthread+0x328/0x630
[   34.054937]  ret_from_fork+0x10/0x20
[   34.054976] 
[   34.055000] The buggy address belongs to the object at fff00000c5a8e300
[   34.055000]  which belongs to the cache kmalloc-64 of size 64
[   34.055076] The buggy address is located 0 bytes to the right of
[   34.055076]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   34.055144] 
[   34.055176] The buggy address belongs to the physical page:
[   34.055218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   34.055286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.055338] page_type: f5(slab)
[   34.055380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.055443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.055495] page dumped because: kasan: bad access detected
[   34.055546] 
[   34.055567] Memory state around the buggy address:
[   34.055601]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.055654]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.055700] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.055740]                                      ^
[   34.055775]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.056332]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.056672] ==================================================================
[   33.790061] ==================================================================
[   33.790123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.790527] Read of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.790808] 
[   33.790866] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.791081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.791148] Hardware name: linux,dummy-virt (DT)
[   33.791231] Call trace:
[   33.791341]  show_stack+0x20/0x38 (C)
[   33.791550]  dump_stack_lvl+0x8c/0xd0
[   33.791973]  print_report+0x118/0x608
[   33.792052]  kasan_report+0xdc/0x128
[   33.792137]  __asan_report_load8_noabort+0x20/0x30
[   33.792245]  kasan_atomics_helper+0x3f58/0x4858
[   33.792543]  kasan_atomics+0x198/0x2e0
[   33.792733]  kunit_try_run_case+0x170/0x3f0
[   33.793021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.793294]  kthread+0x328/0x630
[   33.793405]  ret_from_fork+0x10/0x20
[   33.793541] 
[   33.793695] Allocated by task 297:
[   33.793922]  kasan_save_stack+0x3c/0x68
[   33.794259]  kasan_save_track+0x20/0x40
[   33.794358]  kasan_save_alloc_info+0x40/0x58
[   33.794702]  __kasan_kmalloc+0xd4/0xd8
[   33.794863]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.794913]  kasan_atomics+0xb8/0x2e0
[   33.795255]  kunit_try_run_case+0x170/0x3f0
[   33.795433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.795491]  kthread+0x328/0x630
[   33.795649]  ret_from_fork+0x10/0x20
[   33.795697] 
[   33.795727] The buggy address belongs to the object at fff00000c5a8e300
[   33.795727]  which belongs to the cache kmalloc-64 of size 64
[   33.795798] The buggy address is located 0 bytes to the right of
[   33.795798]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.795877] 
[   33.795919] The buggy address belongs to the physical page:
[   33.795963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.796029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.796078] page_type: f5(slab)
[   33.796130] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.796185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.796238] page dumped because: kasan: bad access detected
[   33.796280] 
[   33.796549] Memory state around the buggy address:
[   33.796592]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.796992]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.797054] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.797492]                                      ^
[   33.797568]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.797731]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.798081] ==================================================================
[   34.079284] ==================================================================
[   34.079427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   34.079650] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   34.079999] 
[   34.080125] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.080232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.080272] Hardware name: linux,dummy-virt (DT)
[   34.080309] Call trace:
[   34.080492]  show_stack+0x20/0x38 (C)
[   34.080704]  dump_stack_lvl+0x8c/0xd0
[   34.080783]  print_report+0x118/0x608
[   34.081244]  kasan_report+0xdc/0x128
[   34.081698]  kasan_check_range+0x100/0x1a8
[   34.081821]  __kasan_check_write+0x20/0x30
[   34.082054]  kasan_atomics_helper+0x17ec/0x4858
[   34.082289]  kasan_atomics+0x198/0x2e0
[   34.082347]  kunit_try_run_case+0x170/0x3f0
[   34.082856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.082940]  kthread+0x328/0x630
[   34.083158]  ret_from_fork+0x10/0x20
[   34.083237] 
[   34.083263] Allocated by task 297:
[   34.083585]  kasan_save_stack+0x3c/0x68
[   34.083850]  kasan_save_track+0x20/0x40
[   34.084048]  kasan_save_alloc_info+0x40/0x58
[   34.084460]  __kasan_kmalloc+0xd4/0xd8
[   34.084872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.084957]  kasan_atomics+0xb8/0x2e0
[   34.085146]  kunit_try_run_case+0x170/0x3f0
[   34.085355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.085435]  kthread+0x328/0x630
[   34.085933]  ret_from_fork+0x10/0x20
[   34.086072] 
[   34.086294] The buggy address belongs to the object at fff00000c5a8e300
[   34.086294]  which belongs to the cache kmalloc-64 of size 64
[   34.086457] The buggy address is located 0 bytes to the right of
[   34.086457]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   34.086795] 
[   34.086826] The buggy address belongs to the physical page:
[   34.086871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   34.087375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.087745] page_type: f5(slab)
[   34.087848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.088147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.088316] page dumped because: kasan: bad access detected
[   34.088607] 
[   34.088778] Memory state around the buggy address:
[   34.088859]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.088908]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.088953] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.088996]                                      ^
[   34.089032]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.089078]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.089218] ==================================================================
[   33.883754] ==================================================================
[   33.884086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.884160] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.884212] 
[   33.884256] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.884347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.884718] Hardware name: linux,dummy-virt (DT)
[   33.884979] Call trace:
[   33.885259]  show_stack+0x20/0x38 (C)
[   33.885533]  dump_stack_lvl+0x8c/0xd0
[   33.885589]  print_report+0x118/0x608
[   33.885638]  kasan_report+0xdc/0x128
[   33.885687]  kasan_check_range+0x100/0x1a8
[   33.886953]  __kasan_check_write+0x20/0x30
[   33.887056]  kasan_atomics_helper+0x1128/0x4858
[   33.887140]  kasan_atomics+0x198/0x2e0
[   33.887232]  kunit_try_run_case+0x170/0x3f0
[   33.887311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.887623]  kthread+0x328/0x630
[   33.887678]  ret_from_fork+0x10/0x20
[   33.888260] 
[   33.888401] Allocated by task 297:
[   33.888526]  kasan_save_stack+0x3c/0x68
[   33.888586]  kasan_save_track+0x20/0x40
[   33.888630]  kasan_save_alloc_info+0x40/0x58
[   33.888677]  __kasan_kmalloc+0xd4/0xd8
[   33.889077]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.889378]  kasan_atomics+0xb8/0x2e0
[   33.889625]  kunit_try_run_case+0x170/0x3f0
[   33.889800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.890072]  kthread+0x328/0x630
[   33.890395]  ret_from_fork+0x10/0x20
[   33.890827] 
[   33.891038] The buggy address belongs to the object at fff00000c5a8e300
[   33.891038]  which belongs to the cache kmalloc-64 of size 64
[   33.891296] The buggy address is located 0 bytes to the right of
[   33.891296]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.891726] 
[   33.891757] The buggy address belongs to the physical page:
[   33.891799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.892347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.892484] page_type: f5(slab)
[   33.892657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.892791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.892845] page dumped because: kasan: bad access detected
[   33.892881] 
[   33.892901] Memory state around the buggy address:
[   33.893234]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.893321]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.893426] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.893480]                                      ^
[   33.893516]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.893561]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.893603] ==================================================================
[   33.958754] ==================================================================
[   33.958915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.958976] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.959052] 
[   33.959087] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.959177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.959532] Hardware name: linux,dummy-virt (DT)
[   33.959726] Call trace:
[   33.959788]  show_stack+0x20/0x38 (C)
[   33.960015]  dump_stack_lvl+0x8c/0xd0
[   33.960141]  print_report+0x118/0x608
[   33.960509]  kasan_report+0xdc/0x128
[   33.960561]  kasan_check_range+0x100/0x1a8
[   33.960774]  __kasan_check_write+0x20/0x30
[   33.961442]  kasan_atomics_helper+0x1414/0x4858
[   33.961556]  kasan_atomics+0x198/0x2e0
[   33.961722]  kunit_try_run_case+0x170/0x3f0
[   33.961912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.962097]  kthread+0x328/0x630
[   33.962263]  ret_from_fork+0x10/0x20
[   33.962351] 
[   33.962373] Allocated by task 297:
[   33.962717]  kasan_save_stack+0x3c/0x68
[   33.963044]  kasan_save_track+0x20/0x40
[   33.963195]  kasan_save_alloc_info+0x40/0x58
[   33.963443]  __kasan_kmalloc+0xd4/0xd8
[   33.963674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.963739]  kasan_atomics+0xb8/0x2e0
[   33.963781]  kunit_try_run_case+0x170/0x3f0
[   33.963824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.963899]  kthread+0x328/0x630
[   33.963936]  ret_from_fork+0x10/0x20
[   33.963985] 
[   33.964009] The buggy address belongs to the object at fff00000c5a8e300
[   33.964009]  which belongs to the cache kmalloc-64 of size 64
[   33.964078] The buggy address is located 0 bytes to the right of
[   33.964078]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.964157] 
[   33.964189] The buggy address belongs to the physical page:
[   33.964225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.964281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.964426] page_type: f5(slab)
[   33.964798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.964870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.964915] page dumped because: kasan: bad access detected
[   33.964950] 
[   33.964970] Memory state around the buggy address:
[   33.965006]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.965053]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.965098] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.965817]                                      ^
[   33.965929]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.966133]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.966180] ==================================================================
[   33.820952] ==================================================================
[   33.821496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.821709] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.821855] 
[   33.821896] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.821995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.822024] Hardware name: linux,dummy-virt (DT)
[   33.822108] Call trace:
[   33.822143]  show_stack+0x20/0x38 (C)
[   33.822200]  dump_stack_lvl+0x8c/0xd0
[   33.822253]  print_report+0x118/0x608
[   33.822303]  kasan_report+0xdc/0x128
[   33.822352]  kasan_check_range+0x100/0x1a8
[   33.822403]  __kasan_check_write+0x20/0x30
[   33.822451]  kasan_atomics_helper+0xeb8/0x4858
[   33.822507]  kasan_atomics+0x198/0x2e0
[   33.822555]  kunit_try_run_case+0x170/0x3f0
[   33.822606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.822663]  kthread+0x328/0x630
[   33.822709]  ret_from_fork+0x10/0x20
[   33.822759] 
[   33.822782] Allocated by task 297:
[   33.822812]  kasan_save_stack+0x3c/0x68
[   33.822870]  kasan_save_track+0x20/0x40
[   33.822913]  kasan_save_alloc_info+0x40/0x58
[   33.822963]  __kasan_kmalloc+0xd4/0xd8
[   33.823004]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.823048]  kasan_atomics+0xb8/0x2e0
[   33.823087]  kunit_try_run_case+0x170/0x3f0
[   33.823139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.823198]  kthread+0x328/0x630
[   33.823245]  ret_from_fork+0x10/0x20
[   33.823286] 
[   33.823307] The buggy address belongs to the object at fff00000c5a8e300
[   33.823307]  which belongs to the cache kmalloc-64 of size 64
[   33.823367] The buggy address is located 0 bytes to the right of
[   33.823367]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.823443] 
[   33.823466] The buggy address belongs to the physical page:
[   33.823500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.823554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.823605] page_type: f5(slab)
[   33.823651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.823705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.823755] page dumped because: kasan: bad access detected
[   33.823789] 
[   33.823809] Memory state around the buggy address:
[   33.825017]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.825101]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.825184] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.825337]                                      ^
[   33.825382]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.825674]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.825935] ==================================================================
[   33.977669] ==================================================================
[   33.977728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.978122] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.978289] 
[   33.978353] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.978579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.978613] Hardware name: linux,dummy-virt (DT)
[   33.978649] Call trace:
[   33.978698]  show_stack+0x20/0x38 (C)
[   33.978766]  dump_stack_lvl+0x8c/0xd0
[   33.979126]  print_report+0x118/0x608
[   33.979202]  kasan_report+0xdc/0x128
[   33.979345]  kasan_check_range+0x100/0x1a8
[   33.979457]  __kasan_check_write+0x20/0x30
[   33.979562]  kasan_atomics_helper+0x14e4/0x4858
[   33.979621]  kasan_atomics+0x198/0x2e0
[   33.980099]  kunit_try_run_case+0x170/0x3f0
[   33.980267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.980453]  kthread+0x328/0x630
[   33.980725]  ret_from_fork+0x10/0x20
[   33.980952] 
[   33.981003] Allocated by task 297:
[   33.981181]  kasan_save_stack+0x3c/0x68
[   33.981527]  kasan_save_track+0x20/0x40
[   33.981850]  kasan_save_alloc_info+0x40/0x58
[   33.982027]  __kasan_kmalloc+0xd4/0xd8
[   33.982383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.982585]  kasan_atomics+0xb8/0x2e0
[   33.982792]  kunit_try_run_case+0x170/0x3f0
[   33.983134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.983489]  kthread+0x328/0x630
[   33.983625]  ret_from_fork+0x10/0x20
[   33.983763] 
[   33.984069] The buggy address belongs to the object at fff00000c5a8e300
[   33.984069]  which belongs to the cache kmalloc-64 of size 64
[   33.984192] The buggy address is located 0 bytes to the right of
[   33.984192]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.984265] 
[   33.984306] The buggy address belongs to the physical page:
[   33.984711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.984778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.984829] page_type: f5(slab)
[   33.984887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.985554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.985824] page dumped because: kasan: bad access detected
[   33.985907] 
[   33.985959] Memory state around the buggy address:
[   33.986176]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.986623]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.986936] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.987049]                                      ^
[   33.987089]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.987385]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.987544] ==================================================================
[   33.896325] ==================================================================
[   33.896563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.896654] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.896708] 
[   33.896741] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.897231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.897384] Hardware name: linux,dummy-virt (DT)
[   33.897675] Call trace:
[   33.897764]  show_stack+0x20/0x38 (C)
[   33.897961]  dump_stack_lvl+0x8c/0xd0
[   33.898019]  print_report+0x118/0x608
[   33.898206]  kasan_report+0xdc/0x128
[   33.898430]  kasan_check_range+0x100/0x1a8
[   33.898551]  __kasan_check_write+0x20/0x30
[   33.898605]  kasan_atomics_helper+0x1190/0x4858
[   33.898665]  kasan_atomics+0x198/0x2e0
[   33.898714]  kunit_try_run_case+0x170/0x3f0
[   33.898765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.898822]  kthread+0x328/0x630
[   33.898877]  ret_from_fork+0x10/0x20
[   33.898933] 
[   33.898992] Allocated by task 297:
[   33.899025]  kasan_save_stack+0x3c/0x68
[   33.899081]  kasan_save_track+0x20/0x40
[   33.899122]  kasan_save_alloc_info+0x40/0x58
[   33.899163]  __kasan_kmalloc+0xd4/0xd8
[   33.899213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.899257]  kasan_atomics+0xb8/0x2e0
[   33.899297]  kunit_try_run_case+0x170/0x3f0
[   33.899353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.899403]  kthread+0x328/0x630
[   33.899439]  ret_from_fork+0x10/0x20
[   33.899479] 
[   33.899509] The buggy address belongs to the object at fff00000c5a8e300
[   33.899509]  which belongs to the cache kmalloc-64 of size 64
[   33.899571] The buggy address is located 0 bytes to the right of
[   33.899571]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.899647] 
[   33.899678] The buggy address belongs to the physical page:
[   33.899731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.899804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.900249] page_type: f5(slab)
[   33.900316] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.900394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.900462] page dumped because: kasan: bad access detected
[   33.901059] 
[   33.901504] Memory state around the buggy address:
[   33.901995]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.902166]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.902222] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.902411]                                      ^
[   33.902456]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.902675]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.902826] ==================================================================
[   33.993572] ==================================================================
[   33.993624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.993674] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.993731] 
[   33.993761] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.995082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.995126] Hardware name: linux,dummy-virt (DT)
[   33.995182] Call trace:
[   33.995226]  show_stack+0x20/0x38 (C)
[   33.995298]  dump_stack_lvl+0x8c/0xd0
[   33.995379]  print_report+0x118/0x608
[   33.995466]  kasan_report+0xdc/0x128
[   33.995695]  kasan_check_range+0x100/0x1a8
[   33.996268]  __kasan_check_write+0x20/0x30
[   33.996571]  kasan_atomics_helper+0x15b4/0x4858
[   33.996928]  kasan_atomics+0x198/0x2e0
[   33.997176]  kunit_try_run_case+0x170/0x3f0
[   33.997561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.997934]  kthread+0x328/0x630
[   33.998312]  ret_from_fork+0x10/0x20
[   33.998627] 
[   33.998707] Allocated by task 297:
[   33.998741]  kasan_save_stack+0x3c/0x68
[   33.999087]  kasan_save_track+0x20/0x40
[   33.999853]  kasan_save_alloc_info+0x40/0x58
[   34.000040]  __kasan_kmalloc+0xd4/0xd8
[   34.000312]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.000602]  kasan_atomics+0xb8/0x2e0
[   34.000658]  kunit_try_run_case+0x170/0x3f0
[   34.001004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.001349]  kthread+0x328/0x630
[   34.001486]  ret_from_fork+0x10/0x20
[   34.001530] 
[   34.001893] The buggy address belongs to the object at fff00000c5a8e300
[   34.001893]  which belongs to the cache kmalloc-64 of size 64
[   34.002127] The buggy address is located 0 bytes to the right of
[   34.002127]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   34.002637] 
[   34.002708] The buggy address belongs to the physical page:
[   34.003017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   34.003094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.003198] page_type: f5(slab)
[   34.003243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.003527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.003870] page dumped because: kasan: bad access detected
[   34.004176] 
[   34.004525] Memory state around the buggy address:
[   34.004825]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.005087]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.005254] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.005295]                                      ^
[   34.005332]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.005379]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.005728] ==================================================================
[   33.675797] ==================================================================
[   33.675929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.675991] Write of size 4 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.676193] 
[   33.676378] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.676494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.676662] Hardware name: linux,dummy-virt (DT)
[   33.676768] Call trace:
[   33.676902]  show_stack+0x20/0x38 (C)
[   33.676988]  dump_stack_lvl+0x8c/0xd0
[   33.677045]  print_report+0x118/0x608
[   33.677093]  kasan_report+0xdc/0x128
[   33.677142]  kasan_check_range+0x100/0x1a8
[   33.677193]  __kasan_check_write+0x20/0x30
[   33.677727]  kasan_atomics_helper+0xad4/0x4858
[   33.678675]  kasan_atomics+0x198/0x2e0
[   33.678951]  kunit_try_run_case+0x170/0x3f0
[   33.679258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.680503]  kasan_save_stack+0x3c/0x68
[   33.681312]  kasan_atomics+0xb8/0x2e0
[   33.682427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.682499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.682550] page_type: f5(slab)
[   33.682600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.682663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.682706] page dumped because: kasan: bad access detected
[   33.682740] 
[   33.682771] Memory state around the buggy address:
[   33.682819]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.683083]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.683225] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.683670]                                      ^
[   33.683727]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.683777]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.686319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.687282] Call trace:
[   33.689706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.690665]  kasan_save_alloc_info+0x40/0x58
[   33.692847] The buggy address is located 0 bytes to the right of
[   33.692847]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.693822] page_type: f5(slab)
[   33.694051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.694611]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.694798]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.697665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   33.699540]  print_report+0x118/0x608
[   33.700101]  kthread+0x328/0x630
[   33.701797]  __kasan_kmalloc+0xd4/0xd8
[   33.703194] 
[   33.703566] The buggy address is located 0 bytes to the right of
[   33.703566]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.704409] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.705713]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.706293]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.707819] 
[   33.707951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.708101]  dump_stack_lvl+0x8c/0xd0
[   33.709935]  kasan_save_stack+0x3c/0x68
[   33.713164] 
[   33.714499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.716525] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.718941] ==================================================================
[   33.947335] ==================================================================
[   33.947589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.947830] Read of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.947941] 
[   33.947978] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.948066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.948094] Hardware name: linux,dummy-virt (DT)
[   33.948130] Call trace:
[   33.948625]  show_stack+0x20/0x38 (C)
[   33.948914]  dump_stack_lvl+0x8c/0xd0
[   33.949118]  print_report+0x118/0x608
[   33.949245]  kasan_report+0xdc/0x128
[   33.949497]  __asan_report_load8_noabort+0x20/0x30
[   33.949600]  kasan_atomics_helper+0x3f04/0x4858
[   33.949663]  kasan_atomics+0x198/0x2e0
[   33.949718]  kunit_try_run_case+0x170/0x3f0
[   33.950155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.950576]  kthread+0x328/0x630
[   33.950664]  ret_from_fork+0x10/0x20
[   33.950721] 
[   33.950991] Allocated by task 297:
[   33.951406]  kasan_save_stack+0x3c/0x68
[   33.951704]  kasan_save_track+0x20/0x40
[   33.952125]  kasan_save_alloc_info+0x40/0x58
[   33.952283]  __kasan_kmalloc+0xd4/0xd8
[   33.952353]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.952477]  kasan_atomics+0xb8/0x2e0
[   33.952518]  kunit_try_run_case+0x170/0x3f0
[   33.952567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.952616]  kthread+0x328/0x630
[   33.952844]  ret_from_fork+0x10/0x20
[   33.953188] 
[   33.953224] The buggy address belongs to the object at fff00000c5a8e300
[   33.953224]  which belongs to the cache kmalloc-64 of size 64
[   33.953324] The buggy address is located 0 bytes to the right of
[   33.953324]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.953755] 
[   33.953820] The buggy address belongs to the physical page:
[   33.953970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.954035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.954086] page_type: f5(slab)
[   33.954463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.954856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.955106] page dumped because: kasan: bad access detected
[   33.955492] 
[   33.955648] Memory state around the buggy address:
[   33.955774]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.955854]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.955900] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.955941]                                      ^
[   33.955977]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.956023]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.956148] ==================================================================
[   33.989293] ==================================================================
[   33.989437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.989547] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.989609] 
[   33.989806] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.989922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.990324] Hardware name: linux,dummy-virt (DT)
[   33.990374] Call trace:
[   33.990399]  show_stack+0x20/0x38 (C)
[   33.990455]  dump_stack_lvl+0x8c/0xd0
[   33.990683]  print_report+0x118/0x608
[   33.990872]  kasan_report+0xdc/0x128
[   33.990926]  kasan_check_range+0x100/0x1a8
[   33.991105]  __kasan_check_write+0x20/0x30
[   33.991331]  kasan_atomics_helper+0x154c/0x4858
[   33.991551]  kasan_atomics+0x198/0x2e0
[   33.991607]  kunit_try_run_case+0x170/0x3f0
[   33.991767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.991853]  kthread+0x328/0x630
[   33.991899]  ret_from_fork+0x10/0x20
[   33.991950] 
[   33.991972] Allocated by task 297:
[   33.992001]  kasan_save_stack+0x3c/0x68
[   33.992058]  kasan_save_track+0x20/0x40
[   33.992111]  kasan_save_alloc_info+0x40/0x58
[   33.992153]  __kasan_kmalloc+0xd4/0xd8
[   33.992202]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.992254]  kasan_atomics+0xb8/0x2e0
[   33.992295]  kunit_try_run_case+0x170/0x3f0
[   33.992347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.992397]  kthread+0x328/0x630
[   33.992433]  ret_from_fork+0x10/0x20
[   33.992472] 
[   33.992493] The buggy address belongs to the object at fff00000c5a8e300
[   33.992493]  which belongs to the cache kmalloc-64 of size 64
[   33.992563] The buggy address is located 0 bytes to the right of
[   33.992563]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.992632] 
[   33.992653] The buggy address belongs to the physical page:
[   33.992687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.992740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.992788] page_type: f5(slab)
[   33.992829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.993023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.993082] page dumped because: kasan: bad access detected
[   33.993118] 
[   33.993138] Memory state around the buggy address:
[   33.993172]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.993218]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.993263] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.993302]                                      ^
[   33.993337]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.993384]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.993456] ==================================================================
[   33.657620] ==================================================================
[   33.657696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.657856] Write of size 4 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.657919] 
[   33.657990] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.658101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.658138] Hardware name: linux,dummy-virt (DT)
[   33.658174] Call trace:
[   33.658198]  show_stack+0x20/0x38 (C)
[   33.658257]  dump_stack_lvl+0x8c/0xd0
[   33.658310]  print_report+0x118/0x608
[   33.658359]  kasan_report+0xdc/0x128
[   33.658406]  kasan_check_range+0x100/0x1a8
[   33.658457]  __kasan_check_write+0x20/0x30
[   33.658503]  kasan_atomics_helper+0xa04/0x4858
[   33.658554]  kasan_atomics+0x198/0x2e0
[   33.658608]  kunit_try_run_case+0x170/0x3f0
[   33.658659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.658725]  kthread+0x328/0x630
[   33.658772]  ret_from_fork+0x10/0x20
[   33.658820] 
[   33.659198] Allocated by task 297:
[   33.659248]  kasan_save_stack+0x3c/0x68
[   33.659578]  kasan_save_track+0x20/0x40
[   33.659631]  kasan_save_alloc_info+0x40/0x58
[   33.659887]  __kasan_kmalloc+0xd4/0xd8
[   33.659961]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.660171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.661252] 
[   33.661390] The buggy address belongs to the physical page:
[   33.661430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.661967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.662341] page_type: f5(slab)
[   33.662504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.662727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.662933] page dumped because: kasan: bad access detected
[   33.663009] 
[   33.663089] Memory state around the buggy address:
[   33.663178]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.663261]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.663495] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.663696]                                      ^
[   33.663826]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.664045]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.664266] ==================================================================
[   33.628070] ==================================================================
[   33.628386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.628542] Read of size 4 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.628611] 
[   33.628678] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.628781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.628811] Hardware name: linux,dummy-virt (DT)
[   33.628945] Call trace:
[   33.628979]  show_stack+0x20/0x38 (C)
[   33.629042]  dump_stack_lvl+0x8c/0xd0
[   33.629104]  print_report+0x118/0x608
[   33.629161]  kasan_report+0xdc/0x128
[   33.629210]  __asan_report_load4_noabort+0x20/0x30
[   33.629262]  kasan_atomics_helper+0x42d8/0x4858
[   33.629315]  kasan_atomics+0x198/0x2e0
[   33.629374]  kunit_try_run_case+0x170/0x3f0
[   33.629425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.629484]  kthread+0x328/0x630
[   33.629538]  ret_from_fork+0x10/0x20
[   33.629598] 
[   33.629619] Allocated by task 297:
[   33.629655]  kasan_save_stack+0x3c/0x68
[   33.629700]  kasan_save_track+0x20/0x40
[   33.629742]  kasan_save_alloc_info+0x40/0x58
[   33.629791]  __kasan_kmalloc+0xd4/0xd8
[   33.629868]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.631787] 
[   33.632252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.632311] page_type: f5(slab)
[   33.632562] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.632777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.633673]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.634590] ==================================================================
[   33.778646] ==================================================================
[   33.779253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.779435] Read of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.779692] 
[   33.779737] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.780066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.780110] Hardware name: linux,dummy-virt (DT)
[   33.780146] Call trace:
[   33.780334]  show_stack+0x20/0x38 (C)
[   33.780566]  dump_stack_lvl+0x8c/0xd0
[   33.780619]  print_report+0x118/0x608
[   33.780945]  kasan_report+0xdc/0x128
[   33.781411]  kasan_check_range+0x100/0x1a8
[   33.781496]  __kasan_check_read+0x20/0x30
[   33.781807]  kasan_atomics_helper+0xdd4/0x4858
[   33.781884]  kasan_atomics+0x198/0x2e0
[   33.781994]  kunit_try_run_case+0x170/0x3f0
[   33.782049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.782118]  kthread+0x328/0x630
[   33.782163]  ret_from_fork+0x10/0x20
[   33.782222] 
[   33.782251] Allocated by task 297:
[   33.782322]  kasan_save_stack+0x3c/0x68
[   33.782371]  kasan_save_track+0x20/0x40
[   33.782413]  kasan_save_alloc_info+0x40/0x58
[   33.782469]  __kasan_kmalloc+0xd4/0xd8
[   33.782517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.782560]  kasan_atomics+0xb8/0x2e0
[   33.782601]  kunit_try_run_case+0x170/0x3f0
[   33.782641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.782688]  kthread+0x328/0x630
[   33.782745]  ret_from_fork+0x10/0x20
[   33.782785] 
[   33.782814] The buggy address belongs to the object at fff00000c5a8e300
[   33.782814]  which belongs to the cache kmalloc-64 of size 64
[   33.783776] The buggy address is located 0 bytes to the right of
[   33.783776]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.784020] 
[   33.784189] The buggy address belongs to the physical page:
[   33.784225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.784911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.785114] page_type: f5(slab)
[   33.785399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.785574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.785726] page dumped because: kasan: bad access detected
[   33.785784] 
[   33.786037] Memory state around the buggy address:
[   33.786212]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.786303]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.786433] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.786645]                                      ^
[   33.786683]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.786753]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.786972] ==================================================================
[   33.809279] ==================================================================
[   33.809333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.809390] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.809441] 
[   33.809964] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.810184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.810219] Hardware name: linux,dummy-virt (DT)
[   33.810317] Call trace:
[   33.810342]  show_stack+0x20/0x38 (C)
[   33.810397]  dump_stack_lvl+0x8c/0xd0
[   33.810504]  print_report+0x118/0x608
[   33.810580]  kasan_report+0xdc/0x128
[   33.810640]  __asan_report_store8_noabort+0x20/0x30
[   33.810937]  kasan_atomics_helper+0x3e5c/0x4858
[   33.811135]  kasan_atomics+0x198/0x2e0
[   33.811477]  kunit_try_run_case+0x170/0x3f0
[   33.811556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.811618]  kthread+0x328/0x630
[   33.811663]  ret_from_fork+0x10/0x20
[   33.811715] 
[   33.812009] Allocated by task 297:
[   33.812076]  kasan_save_stack+0x3c/0x68
[   33.812130]  kasan_save_track+0x20/0x40
[   33.812425]  kasan_save_alloc_info+0x40/0x58
[   33.812718]  __kasan_kmalloc+0xd4/0xd8
[   33.813189]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.813414]  kasan_atomics+0xb8/0x2e0
[   33.813612]  kunit_try_run_case+0x170/0x3f0
[   33.813684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.814020]  kthread+0x328/0x630
[   33.814530]  ret_from_fork+0x10/0x20
[   33.814817] 
[   33.815140] The buggy address belongs to the object at fff00000c5a8e300
[   33.815140]  which belongs to the cache kmalloc-64 of size 64
[   33.815590] The buggy address is located 0 bytes to the right of
[   33.815590]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.815901] 
[   33.816083] The buggy address belongs to the physical page:
[   33.816140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.816464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.816747] page_type: f5(slab)
[   33.816911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.816974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.817017] page dumped because: kasan: bad access detected
[   33.817052] 
[   33.817072] Memory state around the buggy address:
[   33.817406]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.817778]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.818071] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.818185]                                      ^
[   33.818226]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.818282]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.818324] ==================================================================
[   34.038987] ==================================================================
[   34.039257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   34.039468] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   34.039639] 
[   34.039674] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.040020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.040065] Hardware name: linux,dummy-virt (DT)
[   34.040102] Call trace:
[   34.040126]  show_stack+0x20/0x38 (C)
[   34.040388]  dump_stack_lvl+0x8c/0xd0
[   34.040605]  print_report+0x118/0x608
[   34.040881]  kasan_report+0xdc/0x128
[   34.041161]  kasan_check_range+0x100/0x1a8
[   34.041244]  __kasan_check_write+0x20/0x30
[   34.041452]  kasan_atomics_helper+0x16d0/0x4858
[   34.042249]  kasan_atomics+0x198/0x2e0
[   34.042344]  kunit_try_run_case+0x170/0x3f0
[   34.042411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.042493]  kthread+0x328/0x630
[   34.042564]  ret_from_fork+0x10/0x20
[   34.042789] 
[   34.042915] Allocated by task 297:
[   34.042947]  kasan_save_stack+0x3c/0x68
[   34.043212]  kasan_save_track+0x20/0x40
[   34.043674]  kasan_save_alloc_info+0x40/0x58
[   34.043813]  __kasan_kmalloc+0xd4/0xd8
[   34.043869]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.044226]  kasan_atomics+0xb8/0x2e0
[   34.044505]  kunit_try_run_case+0x170/0x3f0
[   34.044658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.044715]  kthread+0x328/0x630
[   34.044752]  ret_from_fork+0x10/0x20
[   34.044802] 
[   34.044825] The buggy address belongs to the object at fff00000c5a8e300
[   34.044825]  which belongs to the cache kmalloc-64 of size 64
[   34.045155] The buggy address is located 0 bytes to the right of
[   34.045155]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   34.045508] 
[   34.045644] The buggy address belongs to the physical page:
[   34.045965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   34.046287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.046676] page_type: f5(slab)
[   34.046886] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.047092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.047346] page dumped because: kasan: bad access detected
[   34.047545] 
[   34.048037] Memory state around the buggy address:
[   34.048211]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.048270]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.048417] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.048463]                                      ^
[   34.048730]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.049100]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.049372] ==================================================================
[   34.018285] ==================================================================
[   34.018549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   34.018786] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   34.018995] 
[   34.019222] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.019462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.019887] Hardware name: linux,dummy-virt (DT)
[   34.019948] Call trace:
[   34.019977]  show_stack+0x20/0x38 (C)
[   34.020325]  dump_stack_lvl+0x8c/0xd0
[   34.020672]  print_report+0x118/0x608
[   34.020880]  kasan_report+0xdc/0x128
[   34.021300]  kasan_check_range+0x100/0x1a8
[   34.021551]  __kasan_check_write+0x20/0x30
[   34.022010]  kasan_atomics_helper+0x1644/0x4858
[   34.022178]  kasan_atomics+0x198/0x2e0
[   34.022324]  kunit_try_run_case+0x170/0x3f0
[   34.022753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.023116]  kthread+0x328/0x630
[   34.023488]  ret_from_fork+0x10/0x20
[   34.023815] 
[   34.023914] Allocated by task 297:
[   34.023948]  kasan_save_stack+0x3c/0x68
[   34.023999]  kasan_save_track+0x20/0x40
[   34.024063]  kasan_save_alloc_info+0x40/0x58
[   34.024106]  __kasan_kmalloc+0xd4/0xd8
[   34.024147]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.024222]  kasan_atomics+0xb8/0x2e0
[   34.024264]  kunit_try_run_case+0x170/0x3f0
[   34.024728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.025050]  kthread+0x328/0x630
[   34.025256]  ret_from_fork+0x10/0x20
[   34.025306] 
[   34.025572] The buggy address belongs to the object at fff00000c5a8e300
[   34.025572]  which belongs to the cache kmalloc-64 of size 64
[   34.026262] The buggy address is located 0 bytes to the right of
[   34.026262]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   34.026611] 
[   34.026762] The buggy address belongs to the physical page:
[   34.027037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   34.027218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.027349] page_type: f5(slab)
[   34.027699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.028006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.028214] page dumped because: kasan: bad access detected
[   34.028296] 
[   34.028333] Memory state around the buggy address:
[   34.028463]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.028923]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.029237] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.029345]                                      ^
[   34.029409]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.029461]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.029733] ==================================================================
[   33.919730] ==================================================================
[   33.919858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.919982] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.920313] 
[   33.920361] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.920571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.920741] Hardware name: linux,dummy-virt (DT)
[   33.920860] Call trace:
[   33.920954]  show_stack+0x20/0x38 (C)
[   33.921013]  dump_stack_lvl+0x8c/0xd0
[   33.921066]  print_report+0x118/0x608
[   33.921361]  kasan_report+0xdc/0x128
[   33.921614]  kasan_check_range+0x100/0x1a8
[   33.922015]  __kasan_check_write+0x20/0x30
[   33.922108]  kasan_atomics_helper+0x126c/0x4858
[   33.922380]  kasan_atomics+0x198/0x2e0
[   33.922547]  kunit_try_run_case+0x170/0x3f0
[   33.922600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.922659]  kthread+0x328/0x630
[   33.922705]  ret_from_fork+0x10/0x20
[   33.922756] 
[   33.922779] Allocated by task 297:
[   33.922811]  kasan_save_stack+0x3c/0x68
[   33.922870]  kasan_save_track+0x20/0x40
[   33.922914]  kasan_save_alloc_info+0x40/0x58
[   33.922955]  __kasan_kmalloc+0xd4/0xd8
[   33.923008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.923052]  kasan_atomics+0xb8/0x2e0
[   33.923093]  kunit_try_run_case+0x170/0x3f0
[   33.923135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.923184]  kthread+0x328/0x630
[   33.923222]  ret_from_fork+0x10/0x20
[   33.923262] 
[   33.923293] The buggy address belongs to the object at fff00000c5a8e300
[   33.923293]  which belongs to the cache kmalloc-64 of size 64
[   33.923356] The buggy address is located 0 bytes to the right of
[   33.923356]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.923434] 
[   33.923465] The buggy address belongs to the physical page:
[   33.923511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.923567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.923617] page_type: f5(slab)
[   33.923657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.923713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.923758] page dumped because: kasan: bad access detected
[   33.923799] 
[   33.923828] Memory state around the buggy address:
[   33.923880]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.924318]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.924798] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.924880]                                      ^
[   33.924939]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.925158]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.925256] ==================================================================
[   34.057888] ==================================================================
[   34.058224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   34.058294] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   34.058347] 
[   34.059001] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.059198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.059232] Hardware name: linux,dummy-virt (DT)
[   34.059267] Call trace:
[   34.059293]  show_stack+0x20/0x38 (C)
[   34.059644]  dump_stack_lvl+0x8c/0xd0
[   34.059714]  print_report+0x118/0x608
[   34.059896]  kasan_report+0xdc/0x128
[   34.059989]  kasan_check_range+0x100/0x1a8
[   34.060154]  __kasan_check_write+0x20/0x30
[   34.060372]  kasan_atomics_helper+0x175c/0x4858
[   34.060591]  kasan_atomics+0x198/0x2e0
[   34.060787]  kunit_try_run_case+0x170/0x3f0
[   34.060933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.061288]  kthread+0x328/0x630
[   34.061526]  ret_from_fork+0x10/0x20
[   34.061978] 
[   34.062141] Allocated by task 297:
[   34.062364]  kasan_save_stack+0x3c/0x68
[   34.062417]  kasan_save_track+0x20/0x40
[   34.062459]  kasan_save_alloc_info+0x40/0x58
[   34.063152]  __kasan_kmalloc+0xd4/0xd8
[   34.063471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.063655]  kasan_atomics+0xb8/0x2e0
[   34.063818]  kunit_try_run_case+0x170/0x3f0
[   34.063941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.064049]  kthread+0x328/0x630
[   34.064443]  ret_from_fork+0x10/0x20
[   34.064657] 
[   34.064750] The buggy address belongs to the object at fff00000c5a8e300
[   34.064750]  which belongs to the cache kmalloc-64 of size 64
[   34.064915] The buggy address is located 0 bytes to the right of
[   34.064915]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   34.065378] 
[   34.065853] The buggy address belongs to the physical page:
[   34.065895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   34.066522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.066920] page_type: f5(slab)
[   34.067020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.067305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.067750] page dumped because: kasan: bad access detected
[   34.067944] 
[   34.068175] Memory state around the buggy address:
[   34.068353]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.068562]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.068804] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.069014]                                      ^
[   34.069059]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.069362]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.069524] ==================================================================
[   33.926814] ==================================================================
[   33.926883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.926945] Write of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   33.927388] 
[   33.927439] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.927540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.927570] Hardware name: linux,dummy-virt (DT)
[   33.927604] Call trace:
[   33.927631]  show_stack+0x20/0x38 (C)
[   33.928105]  dump_stack_lvl+0x8c/0xd0
[   33.928620]  print_report+0x118/0x608
[   33.928755]  kasan_report+0xdc/0x128
[   33.928807]  kasan_check_range+0x100/0x1a8
[   33.928871]  __kasan_check_write+0x20/0x30
[   33.929204]  kasan_atomics_helper+0x12d8/0x4858
[   33.929621]  kasan_atomics+0x198/0x2e0
[   33.929777]  kunit_try_run_case+0x170/0x3f0
[   33.930058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.930301]  kthread+0x328/0x630
[   33.930372]  ret_from_fork+0x10/0x20
[   33.930447] 
[   33.930718] Allocated by task 297:
[   33.931132]  kasan_save_stack+0x3c/0x68
[   33.931377]  kasan_save_track+0x20/0x40
[   33.931571]  kasan_save_alloc_info+0x40/0x58
[   33.931869]  __kasan_kmalloc+0xd4/0xd8
[   33.932041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.932403]  kasan_atomics+0xb8/0x2e0
[   33.932571]  kunit_try_run_case+0x170/0x3f0
[   33.932934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.933017]  kthread+0x328/0x630
[   33.933142]  ret_from_fork+0x10/0x20
[   33.933222] 
[   33.933407] The buggy address belongs to the object at fff00000c5a8e300
[   33.933407]  which belongs to the cache kmalloc-64 of size 64
[   33.933543] The buggy address is located 0 bytes to the right of
[   33.933543]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   33.933971] 
[   33.934231] The buggy address belongs to the physical page:
[   33.934272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   33.934357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.934714] page_type: f5(slab)
[   33.935045] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.935121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.935280] page dumped because: kasan: bad access detected
[   33.935606] 
[   33.935684] Memory state around the buggy address:
[   33.935871]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.936438]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.936680] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.936882]                                      ^
[   33.936920]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.936974]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.937015] ==================================================================
[   34.030590] ==================================================================
[   34.030641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   34.030695] Read of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   34.030852] 
[   34.030902] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.030997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.031026] Hardware name: linux,dummy-virt (DT)
[   34.031070] Call trace:
[   34.031098]  show_stack+0x20/0x38 (C)
[   34.031153]  dump_stack_lvl+0x8c/0xd0
[   34.031205]  print_report+0x118/0x608
[   34.031253]  kasan_report+0xdc/0x128
[   34.031311]  __asan_report_load8_noabort+0x20/0x30
[   34.031364]  kasan_atomics_helper+0x3df4/0x4858
[   34.031415]  kasan_atomics+0x198/0x2e0
[   34.031464]  kunit_try_run_case+0x170/0x3f0
[   34.031515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.031573]  kthread+0x328/0x630
[   34.031624]  ret_from_fork+0x10/0x20
[   34.031685] 
[   34.031707] Allocated by task 297:
[   34.031737]  kasan_save_stack+0x3c/0x68
[   34.031791]  kasan_save_track+0x20/0x40
[   34.031832]  kasan_save_alloc_info+0x40/0x58
[   34.032297]  __kasan_kmalloc+0xd4/0xd8
[   34.032769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.032848]  kasan_atomics+0xb8/0x2e0
[   34.032890]  kunit_try_run_case+0x170/0x3f0
[   34.032933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.032983]  kthread+0x328/0x630
[   34.033020]  ret_from_fork+0x10/0x20
[   34.033614] 
[   34.033742] The buggy address belongs to the object at fff00000c5a8e300
[   34.033742]  which belongs to the cache kmalloc-64 of size 64
[   34.034141] The buggy address is located 0 bytes to the right of
[   34.034141]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   34.034506] 
[   34.034535] The buggy address belongs to the physical page:
[   34.034846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   34.035147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.035352] page_type: f5(slab)
[   34.035521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.035610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.035677] page dumped because: kasan: bad access detected
[   34.035933] 
[   34.036025] Memory state around the buggy address:
[   34.036340]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.036912]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.037022] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.037219]                                      ^
[   34.037458]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.037513]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.037556] ==================================================================
[   34.007945] ==================================================================
[   34.007999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   34.008338] Read of size 8 at addr fff00000c5a8e330 by task kunit_try_catch/297
[   34.008415] 
[   34.008457] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   34.008547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.008576] Hardware name: linux,dummy-virt (DT)
[   34.008612] Call trace:
[   34.008636]  show_stack+0x20/0x38 (C)
[   34.008691]  dump_stack_lvl+0x8c/0xd0
[   34.009027]  print_report+0x118/0x608
[   34.009810]  kasan_report+0xdc/0x128
[   34.010238]  __asan_report_load8_noabort+0x20/0x30
[   34.010530]  kasan_atomics_helper+0x3db0/0x4858
[   34.010703]  kasan_atomics+0x198/0x2e0
[   34.010930]  kunit_try_run_case+0x170/0x3f0
[   34.011613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.011717]  kthread+0x328/0x630
[   34.012092]  ret_from_fork+0x10/0x20
[   34.012534] 
[   34.012702] Allocated by task 297:
[   34.012741]  kasan_save_stack+0x3c/0x68
[   34.012933]  kasan_save_track+0x20/0x40
[   34.013161]  kasan_save_alloc_info+0x40/0x58
[   34.013408]  __kasan_kmalloc+0xd4/0xd8
[   34.013466]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.013511]  kasan_atomics+0xb8/0x2e0
[   34.013552]  kunit_try_run_case+0x170/0x3f0
[   34.013725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.014281]  kthread+0x328/0x630
[   34.014432]  ret_from_fork+0x10/0x20
[   34.014490] 
[   34.014519] The buggy address belongs to the object at fff00000c5a8e300
[   34.014519]  which belongs to the cache kmalloc-64 of size 64
[   34.014786] The buggy address is located 0 bytes to the right of
[   34.014786]  allocated 48-byte region [fff00000c5a8e300, fff00000c5a8e330)
[   34.015130] 
[   34.015353] The buggy address belongs to the physical page:
[   34.015399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8e
[   34.015830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.016249] page_type: f5(slab)
[   34.016299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.016987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.017062] page dumped because: kasan: bad access detected
[   34.017172] 
[   34.017203] Memory state around the buggy address:
[   34.017239]  fff00000c5a8e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.017288]  fff00000c5a8e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.017410] >fff00000c5a8e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.017451]                                      ^
[   34.017487]  fff00000c5a8e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.017533]  fff00000c5a8e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.017575] ==================================================================

[   26.711745] ==================================================================
[   26.712041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   26.712391] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.712732] 
[   26.712835] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.712883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.712897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.712919] Call Trace:
[   26.712933]  <TASK>
[   26.712950]  dump_stack_lvl+0x73/0xb0
[   26.712976]  print_report+0xd1/0x650
[   26.712999]  ? __virt_addr_valid+0x1db/0x2d0
[   26.713022]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.713048]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.713075]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.713102]  kasan_report+0x141/0x180
[   26.713124]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.713154]  kasan_check_range+0x10c/0x1c0
[   26.713178]  __kasan_check_write+0x18/0x20
[   26.713201]  kasan_atomics_helper+0x1eaa/0x5450
[   26.713228]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.713254]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.713279]  ? kasan_atomics+0x152/0x310
[   26.713306]  kasan_atomics+0x1dc/0x310
[   26.713329]  ? __pfx_kasan_atomics+0x10/0x10
[   26.713353]  ? trace_hardirqs_on+0x37/0xe0
[   26.713375]  ? __pfx_read_tsc+0x10/0x10
[   26.713396]  ? ktime_get_ts64+0x86/0x230
[   26.713421]  kunit_try_run_case+0x1a5/0x480
[   26.713445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.713520]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.713558]  ? __kthread_parkme+0x82/0x180
[   26.713593]  ? preempt_count_sub+0x50/0x80
[   26.713630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.713669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.713706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.713821]  kthread+0x337/0x6f0
[   26.713851]  ? trace_preempt_on+0x20/0xc0
[   26.713876]  ? __pfx_kthread+0x10/0x10
[   26.713897]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.713924]  ? calculate_sigpending+0x7b/0xa0
[   26.713948]  ? __pfx_kthread+0x10/0x10
[   26.713971]  ret_from_fork+0x116/0x1d0
[   26.714014]  ? __pfx_kthread+0x10/0x10
[   26.714037]  ret_from_fork_asm+0x1a/0x30
[   26.714069]  </TASK>
[   26.714082] 
[   26.721405] Allocated by task 314:
[   26.721612]  kasan_save_stack+0x45/0x70
[   26.721852]  kasan_save_track+0x18/0x40
[   26.722061]  kasan_save_alloc_info+0x3b/0x50
[   26.722322]  __kasan_kmalloc+0xb7/0xc0
[   26.722569]  __kmalloc_cache_noprof+0x189/0x420
[   26.722808]  kasan_atomics+0x95/0x310
[   26.722951]  kunit_try_run_case+0x1a5/0x480
[   26.723088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.723288]  kthread+0x337/0x6f0
[   26.723480]  ret_from_fork+0x116/0x1d0
[   26.723681]  ret_from_fork_asm+0x1a/0x30
[   26.723894] 
[   26.724003] The buggy address belongs to the object at ffff888106195400
[   26.724003]  which belongs to the cache kmalloc-64 of size 64
[   26.724519] The buggy address is located 0 bytes to the right of
[   26.724519]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.725144] 
[   26.725247] The buggy address belongs to the physical page:
[   26.725524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.725875] flags: 0x200000000000000(node=0|zone=2)
[   26.726235] page_type: f5(slab)
[   26.726404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.726759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.727085] page dumped because: kasan: bad access detected
[   26.727420] 
[   26.727532] Memory state around the buggy address:
[   26.727733]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.727936]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.728138] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.728336]                                      ^
[   26.728501]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.728847]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.729205] ==================================================================
[   25.890864] ==================================================================
[   25.891153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   25.891600] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.891886] 
[   25.891969] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.892019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.892033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.892055] Call Trace:
[   25.892070]  <TASK>
[   25.892086]  dump_stack_lvl+0x73/0xb0
[   25.892114]  print_report+0xd1/0x650
[   25.892137]  ? __virt_addr_valid+0x1db/0x2d0
[   25.892161]  ? kasan_atomics_helper+0x860/0x5450
[   25.892186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.892213]  ? kasan_atomics_helper+0x860/0x5450
[   25.892238]  kasan_report+0x141/0x180
[   25.892261]  ? kasan_atomics_helper+0x860/0x5450
[   25.892299]  kasan_check_range+0x10c/0x1c0
[   25.892324]  __kasan_check_write+0x18/0x20
[   25.892349]  kasan_atomics_helper+0x860/0x5450
[   25.892395]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.892422]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.892447]  ? kasan_atomics+0x152/0x310
[   25.892484]  kasan_atomics+0x1dc/0x310
[   25.892508]  ? __pfx_kasan_atomics+0x10/0x10
[   25.892530]  ? trace_hardirqs_on+0x37/0xe0
[   25.892555]  ? __pfx_read_tsc+0x10/0x10
[   25.892577]  ? ktime_get_ts64+0x86/0x230
[   25.892602]  kunit_try_run_case+0x1a5/0x480
[   25.892627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.892654]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.892677]  ? __kthread_parkme+0x82/0x180
[   25.892699]  ? preempt_count_sub+0x50/0x80
[   25.892723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.892749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.892774]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.892800]  kthread+0x337/0x6f0
[   25.892820]  ? trace_preempt_on+0x20/0xc0
[   25.892842]  ? __pfx_kthread+0x10/0x10
[   25.892864]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.892890]  ? calculate_sigpending+0x7b/0xa0
[   25.892915]  ? __pfx_kthread+0x10/0x10
[   25.892938]  ret_from_fork+0x116/0x1d0
[   25.892959]  ? __pfx_kthread+0x10/0x10
[   25.892981]  ret_from_fork_asm+0x1a/0x30
[   25.893014]  </TASK>
[   25.893026] 
[   25.901108] Allocated by task 314:
[   25.901333]  kasan_save_stack+0x45/0x70
[   25.901763]  kasan_save_track+0x18/0x40
[   25.901954]  kasan_save_alloc_info+0x3b/0x50
[   25.902098]  __kasan_kmalloc+0xb7/0xc0
[   25.902266]  __kmalloc_cache_noprof+0x189/0x420
[   25.902581]  kasan_atomics+0x95/0x310
[   25.902755]  kunit_try_run_case+0x1a5/0x480
[   25.902952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.903156]  kthread+0x337/0x6f0
[   25.903388]  ret_from_fork+0x116/0x1d0
[   25.903589]  ret_from_fork_asm+0x1a/0x30
[   25.903795] 
[   25.903863] The buggy address belongs to the object at ffff888106195400
[   25.903863]  which belongs to the cache kmalloc-64 of size 64
[   25.904365] The buggy address is located 0 bytes to the right of
[   25.904365]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.904971] 
[   25.905038] The buggy address belongs to the physical page:
[   25.905204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.905436] flags: 0x200000000000000(node=0|zone=2)
[   25.905676] page_type: f5(slab)
[   25.906037] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.906660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.907015] page dumped because: kasan: bad access detected
[   25.907317] 
[   25.907437] Memory state around the buggy address:
[   25.907597]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.907808]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.908017] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.908410]                                      ^
[   25.908829]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.909149]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.909440] ==================================================================
[   26.009603] ==================================================================
[   26.009910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   26.010141] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.010973] 
[   26.011076] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.011125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.011139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.011219] Call Trace:
[   26.011233]  <TASK>
[   26.011249]  dump_stack_lvl+0x73/0xb0
[   26.011279]  print_report+0xd1/0x650
[   26.011302]  ? __virt_addr_valid+0x1db/0x2d0
[   26.011327]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.011352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.011380]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.011406]  kasan_report+0x141/0x180
[   26.011428]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.011471]  kasan_check_range+0x10c/0x1c0
[   26.011497]  __kasan_check_write+0x18/0x20
[   26.011522]  kasan_atomics_helper+0xb6a/0x5450
[   26.011549]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.011576]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.011603]  ? kasan_atomics+0x152/0x310
[   26.011630]  kasan_atomics+0x1dc/0x310
[   26.011653]  ? __pfx_kasan_atomics+0x10/0x10
[   26.011677]  ? trace_hardirqs_on+0x37/0xe0
[   26.011700]  ? __pfx_read_tsc+0x10/0x10
[   26.011723]  ? ktime_get_ts64+0x86/0x230
[   26.011748]  kunit_try_run_case+0x1a5/0x480
[   26.011774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.011800]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.011825]  ? __kthread_parkme+0x82/0x180
[   26.011847]  ? preempt_count_sub+0x50/0x80
[   26.011872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.011898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.011924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.011950]  kthread+0x337/0x6f0
[   26.011970]  ? trace_preempt_on+0x20/0xc0
[   26.011993]  ? __pfx_kthread+0x10/0x10
[   26.012016]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.012041]  ? calculate_sigpending+0x7b/0xa0
[   26.012067]  ? __pfx_kthread+0x10/0x10
[   26.012090]  ret_from_fork+0x116/0x1d0
[   26.012111]  ? __pfx_kthread+0x10/0x10
[   26.012134]  ret_from_fork_asm+0x1a/0x30
[   26.012246]  </TASK>
[   26.012259] 
[   26.019883] Allocated by task 314:
[   26.020049]  kasan_save_stack+0x45/0x70
[   26.020191]  kasan_save_track+0x18/0x40
[   26.020321]  kasan_save_alloc_info+0x3b/0x50
[   26.020645]  __kasan_kmalloc+0xb7/0xc0
[   26.020851]  __kmalloc_cache_noprof+0x189/0x420
[   26.021072]  kasan_atomics+0x95/0x310
[   26.021331]  kunit_try_run_case+0x1a5/0x480
[   26.021685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.021995]  kthread+0x337/0x6f0
[   26.022249]  ret_from_fork+0x116/0x1d0
[   26.022419]  ret_from_fork_asm+0x1a/0x30
[   26.022589] 
[   26.022657] The buggy address belongs to the object at ffff888106195400
[   26.022657]  which belongs to the cache kmalloc-64 of size 64
[   26.023098] The buggy address is located 0 bytes to the right of
[   26.023098]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.023929] 
[   26.024029] The buggy address belongs to the physical page:
[   26.024206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.024439] flags: 0x200000000000000(node=0|zone=2)
[   26.024608] page_type: f5(slab)
[   26.024724] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.025237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.026106] page dumped because: kasan: bad access detected
[   26.026400] 
[   26.026488] Memory state around the buggy address:
[   26.026641]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.026958]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.027446] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.027743]                                      ^
[   26.027940]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.028431]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.028730] ==================================================================
[   25.756794] ==================================================================
[   25.757074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   25.757358] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.757745] 
[   25.758141] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.758193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.758208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.758231] Call Trace:
[   25.758247]  <TASK>
[   25.758264]  dump_stack_lvl+0x73/0xb0
[   25.758294]  print_report+0xd1/0x650
[   25.758317]  ? __virt_addr_valid+0x1db/0x2d0
[   25.758341]  ? kasan_atomics_helper+0x565/0x5450
[   25.758366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.758393]  ? kasan_atomics_helper+0x565/0x5450
[   25.758486]  kasan_report+0x141/0x180
[   25.758510]  ? kasan_atomics_helper+0x565/0x5450
[   25.758541]  kasan_check_range+0x10c/0x1c0
[   25.758566]  __kasan_check_write+0x18/0x20
[   25.758590]  kasan_atomics_helper+0x565/0x5450
[   25.758619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.758646]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.758671]  ? kasan_atomics+0x152/0x310
[   25.758699]  kasan_atomics+0x1dc/0x310
[   25.758723]  ? __pfx_kasan_atomics+0x10/0x10
[   25.758746]  ? trace_hardirqs_on+0x37/0xe0
[   25.758769]  ? __pfx_read_tsc+0x10/0x10
[   25.758793]  ? ktime_get_ts64+0x86/0x230
[   25.758819]  kunit_try_run_case+0x1a5/0x480
[   25.758844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.758871]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.758895]  ? __kthread_parkme+0x82/0x180
[   25.758917]  ? preempt_count_sub+0x50/0x80
[   25.758941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.758968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.758993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.759018]  kthread+0x337/0x6f0
[   25.759040]  ? trace_preempt_on+0x20/0xc0
[   25.759063]  ? __pfx_kthread+0x10/0x10
[   25.759086]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.759112]  ? calculate_sigpending+0x7b/0xa0
[   25.759138]  ? __pfx_kthread+0x10/0x10
[   25.759161]  ret_from_fork+0x116/0x1d0
[   25.759182]  ? __pfx_kthread+0x10/0x10
[   25.759204]  ret_from_fork_asm+0x1a/0x30
[   25.759237]  </TASK>
[   25.759248] 
[   25.766697] Allocated by task 314:
[   25.766873]  kasan_save_stack+0x45/0x70
[   25.767073]  kasan_save_track+0x18/0x40
[   25.767257]  kasan_save_alloc_info+0x3b/0x50
[   25.767450]  __kasan_kmalloc+0xb7/0xc0
[   25.767590]  __kmalloc_cache_noprof+0x189/0x420
[   25.767738]  kasan_atomics+0x95/0x310
[   25.768238]  kunit_try_run_case+0x1a5/0x480
[   25.768478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.768732]  kthread+0x337/0x6f0
[   25.768900]  ret_from_fork+0x116/0x1d0
[   25.769068]  ret_from_fork_asm+0x1a/0x30
[   25.769417] 
[   25.769519] The buggy address belongs to the object at ffff888106195400
[   25.769519]  which belongs to the cache kmalloc-64 of size 64
[   25.769972] The buggy address is located 0 bytes to the right of
[   25.769972]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.770413] 
[   25.770489] The buggy address belongs to the physical page:
[   25.770656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.771113] flags: 0x200000000000000(node=0|zone=2)
[   25.771449] page_type: f5(slab)
[   25.771643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.771891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.772111] page dumped because: kasan: bad access detected
[   25.772654] 
[   25.772762] Memory state around the buggy address:
[   25.772980]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.773492]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.773728] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.773974]                                      ^
[   25.774190]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.774687]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.774967] ==================================================================
[   26.272594] ==================================================================
[   26.272932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   26.273441] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.273732] 
[   26.273835] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.273890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.273903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.273926] Call Trace:
[   26.273940]  <TASK>
[   26.273955]  dump_stack_lvl+0x73/0xb0
[   26.273982]  print_report+0xd1/0x650
[   26.274005]  ? __virt_addr_valid+0x1db/0x2d0
[   26.274029]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.274057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.274083]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.274110]  kasan_report+0x141/0x180
[   26.274133]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.274163]  __asan_report_load4_noabort+0x18/0x20
[   26.274189]  kasan_atomics_helper+0x49e8/0x5450
[   26.274230]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.274257]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.274282]  ? kasan_atomics+0x152/0x310
[   26.274308]  kasan_atomics+0x1dc/0x310
[   26.274331]  ? __pfx_kasan_atomics+0x10/0x10
[   26.274355]  ? trace_hardirqs_on+0x37/0xe0
[   26.274378]  ? __pfx_read_tsc+0x10/0x10
[   26.274401]  ? ktime_get_ts64+0x86/0x230
[   26.274426]  kunit_try_run_case+0x1a5/0x480
[   26.274452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.274490]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.274514]  ? __kthread_parkme+0x82/0x180
[   26.274536]  ? preempt_count_sub+0x50/0x80
[   26.274561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.274586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.274611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.274637]  kthread+0x337/0x6f0
[   26.274658]  ? trace_preempt_on+0x20/0xc0
[   26.274681]  ? __pfx_kthread+0x10/0x10
[   26.274704]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.274729]  ? calculate_sigpending+0x7b/0xa0
[   26.274754]  ? __pfx_kthread+0x10/0x10
[   26.274777]  ret_from_fork+0x116/0x1d0
[   26.274798]  ? __pfx_kthread+0x10/0x10
[   26.274820]  ret_from_fork_asm+0x1a/0x30
[   26.274852]  </TASK>
[   26.274864] 
[   26.281605] Allocated by task 314:
[   26.281782]  kasan_save_stack+0x45/0x70
[   26.281987]  kasan_save_track+0x18/0x40
[   26.282176]  kasan_save_alloc_info+0x3b/0x50
[   26.282374]  __kasan_kmalloc+0xb7/0xc0
[   26.282574]  __kmalloc_cache_noprof+0x189/0x420
[   26.282748]  kasan_atomics+0x95/0x310
[   26.282927]  kunit_try_run_case+0x1a5/0x480
[   26.283113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.283362]  kthread+0x337/0x6f0
[   26.283506]  ret_from_fork+0x116/0x1d0
[   26.283666]  ret_from_fork_asm+0x1a/0x30
[   26.283832] 
[   26.283923] The buggy address belongs to the object at ffff888106195400
[   26.283923]  which belongs to the cache kmalloc-64 of size 64
[   26.284369] The buggy address is located 0 bytes to the right of
[   26.284369]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.284865] 
[   26.284933] The buggy address belongs to the physical page:
[   26.285161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.285441] flags: 0x200000000000000(node=0|zone=2)
[   26.285680] page_type: f5(slab)
[   26.285844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.286075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.286579] page dumped because: kasan: bad access detected
[   26.286799] 
[   26.286882] Memory state around the buggy address:
[   26.287045]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.287469]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.287756] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.288038]                                      ^
[   26.288255]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.288537]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.288824] ==================================================================
[   26.831254] ==================================================================
[   26.831989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   26.832442] Read of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.832682] 
[   26.832761] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.832806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.832820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.832843] Call Trace:
[   26.832860]  <TASK>
[   26.832876]  dump_stack_lvl+0x73/0xb0
[   26.832902]  print_report+0xd1/0x650
[   26.832926]  ? __virt_addr_valid+0x1db/0x2d0
[   26.832950]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.832976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.833003]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.833029]  kasan_report+0x141/0x180
[   26.833052]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.833083]  __asan_report_load8_noabort+0x18/0x20
[   26.833108]  kasan_atomics_helper+0x4fb2/0x5450
[   26.833135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.833162]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.833188]  ? kasan_atomics+0x152/0x310
[   26.833214]  kasan_atomics+0x1dc/0x310
[   26.833238]  ? __pfx_kasan_atomics+0x10/0x10
[   26.833261]  ? trace_hardirqs_on+0x37/0xe0
[   26.833285]  ? __pfx_read_tsc+0x10/0x10
[   26.833307]  ? ktime_get_ts64+0x86/0x230
[   26.833333]  kunit_try_run_case+0x1a5/0x480
[   26.833360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.833386]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.833410]  ? __kthread_parkme+0x82/0x180
[   26.833432]  ? preempt_count_sub+0x50/0x80
[   26.833467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.833492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.833518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.833545]  kthread+0x337/0x6f0
[   26.833566]  ? trace_preempt_on+0x20/0xc0
[   26.833588]  ? __pfx_kthread+0x10/0x10
[   26.833611]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.833637]  ? calculate_sigpending+0x7b/0xa0
[   26.833662]  ? __pfx_kthread+0x10/0x10
[   26.833685]  ret_from_fork+0x116/0x1d0
[   26.833705]  ? __pfx_kthread+0x10/0x10
[   26.833727]  ret_from_fork_asm+0x1a/0x30
[   26.833760]  </TASK>
[   26.833772] 
[   26.846009] Allocated by task 314:
[   26.846693]  kasan_save_stack+0x45/0x70
[   26.847282]  kasan_save_track+0x18/0x40
[   26.847792]  kasan_save_alloc_info+0x3b/0x50
[   26.848352]  __kasan_kmalloc+0xb7/0xc0
[   26.848820]  __kmalloc_cache_noprof+0x189/0x420
[   26.849408]  kasan_atomics+0x95/0x310
[   26.849877]  kunit_try_run_case+0x1a5/0x480
[   26.850434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.851119]  kthread+0x337/0x6f0
[   26.851531]  ret_from_fork+0x116/0x1d0
[   26.851682]  ret_from_fork_asm+0x1a/0x30
[   26.851819] 
[   26.851887] The buggy address belongs to the object at ffff888106195400
[   26.851887]  which belongs to the cache kmalloc-64 of size 64
[   26.852542] The buggy address is located 0 bytes to the right of
[   26.852542]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.853316] 
[   26.853553] The buggy address belongs to the physical page:
[   26.853798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.854121] flags: 0x200000000000000(node=0|zone=2)
[   26.854632] page_type: f5(slab)
[   26.854920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.855376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.855869] page dumped because: kasan: bad access detected
[   26.856258] 
[   26.856352] Memory state around the buggy address:
[   26.856569]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.856847]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.857113] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.857729]                                      ^
[   26.858213]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.858630]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.858851] ==================================================================
[   26.657632] ==================================================================
[   26.658024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   26.658436] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.658762] 
[   26.658888] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.658935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.658948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.658969] Call Trace:
[   26.658986]  <TASK>
[   26.659001]  dump_stack_lvl+0x73/0xb0
[   26.659029]  print_report+0xd1/0x650
[   26.659051]  ? __virt_addr_valid+0x1db/0x2d0
[   26.659075]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.659100]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.659127]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.659153]  kasan_report+0x141/0x180
[   26.659176]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.659229]  kasan_check_range+0x10c/0x1c0
[   26.659254]  __kasan_check_write+0x18/0x20
[   26.659279]  kasan_atomics_helper+0x1ce1/0x5450
[   26.659307]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.659333]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.659358]  ? kasan_atomics+0x152/0x310
[   26.659385]  kasan_atomics+0x1dc/0x310
[   26.659408]  ? __pfx_kasan_atomics+0x10/0x10
[   26.659431]  ? trace_hardirqs_on+0x37/0xe0
[   26.659463]  ? __pfx_read_tsc+0x10/0x10
[   26.659485]  ? ktime_get_ts64+0x86/0x230
[   26.659510]  kunit_try_run_case+0x1a5/0x480
[   26.659535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.659562]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.659585]  ? __kthread_parkme+0x82/0x180
[   26.659606]  ? preempt_count_sub+0x50/0x80
[   26.659630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.659655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.659681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.659707]  kthread+0x337/0x6f0
[   26.659727]  ? trace_preempt_on+0x20/0xc0
[   26.659750]  ? __pfx_kthread+0x10/0x10
[   26.659772]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.659797]  ? calculate_sigpending+0x7b/0xa0
[   26.659821]  ? __pfx_kthread+0x10/0x10
[   26.659844]  ret_from_fork+0x116/0x1d0
[   26.659865]  ? __pfx_kthread+0x10/0x10
[   26.659887]  ret_from_fork_asm+0x1a/0x30
[   26.659919]  </TASK>
[   26.659931] 
[   26.667577] Allocated by task 314:
[   26.667705]  kasan_save_stack+0x45/0x70
[   26.667845]  kasan_save_track+0x18/0x40
[   26.667974]  kasan_save_alloc_info+0x3b/0x50
[   26.668117]  __kasan_kmalloc+0xb7/0xc0
[   26.668272]  __kmalloc_cache_noprof+0x189/0x420
[   26.668422]  kasan_atomics+0x95/0x310
[   26.668612]  kunit_try_run_case+0x1a5/0x480
[   26.668833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.669115]  kthread+0x337/0x6f0
[   26.669351]  ret_from_fork+0x116/0x1d0
[   26.669577]  ret_from_fork_asm+0x1a/0x30
[   26.669802] 
[   26.669926] The buggy address belongs to the object at ffff888106195400
[   26.669926]  which belongs to the cache kmalloc-64 of size 64
[   26.670563] The buggy address is located 0 bytes to the right of
[   26.670563]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.671154] 
[   26.671292] The buggy address belongs to the physical page:
[   26.671563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.671910] flags: 0x200000000000000(node=0|zone=2)
[   26.672144] page_type: f5(slab)
[   26.672288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.672554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.672921] page dumped because: kasan: bad access detected
[   26.673221] 
[   26.673315] Memory state around the buggy address:
[   26.673568]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.673876]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.674090] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.674323]                                      ^
[   26.674482]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.674690]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.674898] ==================================================================
[   26.460567] ==================================================================
[   26.460846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   26.461116] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.461935] 
[   26.462052] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.462248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.462264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.462287] Call Trace:
[   26.462302]  <TASK>
[   26.462318]  dump_stack_lvl+0x73/0xb0
[   26.462348]  print_report+0xd1/0x650
[   26.462371]  ? __virt_addr_valid+0x1db/0x2d0
[   26.462395]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.462421]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.462448]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.462486]  kasan_report+0x141/0x180
[   26.462509]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.462542]  kasan_check_range+0x10c/0x1c0
[   26.462567]  __kasan_check_write+0x18/0x20
[   26.462591]  kasan_atomics_helper+0x16e7/0x5450
[   26.462618]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.462644]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.462669]  ? kasan_atomics+0x152/0x310
[   26.462696]  kasan_atomics+0x1dc/0x310
[   26.462719]  ? __pfx_kasan_atomics+0x10/0x10
[   26.462742]  ? trace_hardirqs_on+0x37/0xe0
[   26.462765]  ? __pfx_read_tsc+0x10/0x10
[   26.462787]  ? ktime_get_ts64+0x86/0x230
[   26.462812]  kunit_try_run_case+0x1a5/0x480
[   26.462838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.462865]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.462888]  ? __kthread_parkme+0x82/0x180
[   26.462909]  ? preempt_count_sub+0x50/0x80
[   26.462934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.462960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.462985]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.463011]  kthread+0x337/0x6f0
[   26.463033]  ? trace_preempt_on+0x20/0xc0
[   26.463055]  ? __pfx_kthread+0x10/0x10
[   26.463078]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.463103]  ? calculate_sigpending+0x7b/0xa0
[   26.463128]  ? __pfx_kthread+0x10/0x10
[   26.463151]  ret_from_fork+0x116/0x1d0
[   26.463172]  ? __pfx_kthread+0x10/0x10
[   26.463195]  ret_from_fork_asm+0x1a/0x30
[   26.463230]  </TASK>
[   26.463242] 
[   26.473275] Allocated by task 314:
[   26.473439]  kasan_save_stack+0x45/0x70
[   26.473644]  kasan_save_track+0x18/0x40
[   26.473818]  kasan_save_alloc_info+0x3b/0x50
[   26.474016]  __kasan_kmalloc+0xb7/0xc0
[   26.474185]  __kmalloc_cache_noprof+0x189/0x420
[   26.474762]  kasan_atomics+0x95/0x310
[   26.474919]  kunit_try_run_case+0x1a5/0x480
[   26.475224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.475570]  kthread+0x337/0x6f0
[   26.475746]  ret_from_fork+0x116/0x1d0
[   26.476052]  ret_from_fork_asm+0x1a/0x30
[   26.476417] 
[   26.476532] The buggy address belongs to the object at ffff888106195400
[   26.476532]  which belongs to the cache kmalloc-64 of size 64
[   26.477213] The buggy address is located 0 bytes to the right of
[   26.477213]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.477721] 
[   26.477818] The buggy address belongs to the physical page:
[   26.478057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.478632] flags: 0x200000000000000(node=0|zone=2)
[   26.478834] page_type: f5(slab)
[   26.478984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.479586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.479965] page dumped because: kasan: bad access detected
[   26.480289] 
[   26.480385] Memory state around the buggy address:
[   26.480594]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.481083]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.481465] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.481824]                                      ^
[   26.482136]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.482544]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.482870] ==================================================================
[   26.162590] ==================================================================
[   26.162891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   26.163435] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.163715] 
[   26.163796] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.163843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.163857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.163880] Call Trace:
[   26.163898]  <TASK>
[   26.163915]  dump_stack_lvl+0x73/0xb0
[   26.163944]  print_report+0xd1/0x650
[   26.163967]  ? __virt_addr_valid+0x1db/0x2d0
[   26.163992]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.164018]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.164045]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.164071]  kasan_report+0x141/0x180
[   26.164094]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.164126]  __asan_report_load4_noabort+0x18/0x20
[   26.164168]  kasan_atomics_helper+0x4a36/0x5450
[   26.164196]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.164223]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.164249]  ? kasan_atomics+0x152/0x310
[   26.164276]  kasan_atomics+0x1dc/0x310
[   26.164300]  ? __pfx_kasan_atomics+0x10/0x10
[   26.164324]  ? trace_hardirqs_on+0x37/0xe0
[   26.164348]  ? __pfx_read_tsc+0x10/0x10
[   26.164370]  ? ktime_get_ts64+0x86/0x230
[   26.164396]  kunit_try_run_case+0x1a5/0x480
[   26.164422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.164449]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.164486]  ? __kthread_parkme+0x82/0x180
[   26.164508]  ? preempt_count_sub+0x50/0x80
[   26.164532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.164558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.164584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.164610]  kthread+0x337/0x6f0
[   26.164632]  ? trace_preempt_on+0x20/0xc0
[   26.164655]  ? __pfx_kthread+0x10/0x10
[   26.164677]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.164702]  ? calculate_sigpending+0x7b/0xa0
[   26.164727]  ? __pfx_kthread+0x10/0x10
[   26.164750]  ret_from_fork+0x116/0x1d0
[   26.164770]  ? __pfx_kthread+0x10/0x10
[   26.164793]  ret_from_fork_asm+0x1a/0x30
[   26.164825]  </TASK>
[   26.164837] 
[   26.171959] Allocated by task 314:
[   26.172084]  kasan_save_stack+0x45/0x70
[   26.172317]  kasan_save_track+0x18/0x40
[   26.172517]  kasan_save_alloc_info+0x3b/0x50
[   26.172720]  __kasan_kmalloc+0xb7/0xc0
[   26.172911]  __kmalloc_cache_noprof+0x189/0x420
[   26.173096]  kasan_atomics+0x95/0x310
[   26.173299]  kunit_try_run_case+0x1a5/0x480
[   26.173509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.173682]  kthread+0x337/0x6f0
[   26.173797]  ret_from_fork+0x116/0x1d0
[   26.173929]  ret_from_fork_asm+0x1a/0x30
[   26.174061] 
[   26.174127] The buggy address belongs to the object at ffff888106195400
[   26.174127]  which belongs to the cache kmalloc-64 of size 64
[   26.174579] The buggy address is located 0 bytes to the right of
[   26.174579]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.175122] 
[   26.175264] The buggy address belongs to the physical page:
[   26.175520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.175865] flags: 0x200000000000000(node=0|zone=2)
[   26.176070] page_type: f5(slab)
[   26.176188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.176542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.176762] page dumped because: kasan: bad access detected
[   26.176928] 
[   26.176993] Memory state around the buggy address:
[   26.177140]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.177805]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.178128] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.178480]                                      ^
[   26.178688]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.178972]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.179312] ==================================================================
[   26.322884] ==================================================================
[   26.323175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   26.323496] Read of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.323715] 
[   26.323793] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.323840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.323854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.323875] Call Trace:
[   26.323892]  <TASK>
[   26.323908]  dump_stack_lvl+0x73/0xb0
[   26.323934]  print_report+0xd1/0x650
[   26.323957]  ? __virt_addr_valid+0x1db/0x2d0
[   26.323980]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.324006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.324033]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.324060]  kasan_report+0x141/0x180
[   26.324082]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.324113]  kasan_check_range+0x10c/0x1c0
[   26.324138]  __kasan_check_read+0x15/0x20
[   26.324162]  kasan_atomics_helper+0x13b5/0x5450
[   26.324189]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.324216]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.324242]  ? kasan_atomics+0x152/0x310
[   26.324269]  kasan_atomics+0x1dc/0x310
[   26.324292]  ? __pfx_kasan_atomics+0x10/0x10
[   26.324316]  ? trace_hardirqs_on+0x37/0xe0
[   26.324339]  ? __pfx_read_tsc+0x10/0x10
[   26.324362]  ? ktime_get_ts64+0x86/0x230
[   26.324387]  kunit_try_run_case+0x1a5/0x480
[   26.324413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.324439]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.324473]  ? __kthread_parkme+0x82/0x180
[   26.324495]  ? preempt_count_sub+0x50/0x80
[   26.324520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.324546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.324598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.324623]  kthread+0x337/0x6f0
[   26.324644]  ? trace_preempt_on+0x20/0xc0
[   26.324667]  ? __pfx_kthread+0x10/0x10
[   26.324689]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.324715]  ? calculate_sigpending+0x7b/0xa0
[   26.324740]  ? __pfx_kthread+0x10/0x10
[   26.324763]  ret_from_fork+0x116/0x1d0
[   26.324783]  ? __pfx_kthread+0x10/0x10
[   26.324806]  ret_from_fork_asm+0x1a/0x30
[   26.324838]  </TASK>
[   26.324849] 
[   26.332345] Allocated by task 314:
[   26.332484]  kasan_save_stack+0x45/0x70
[   26.332625]  kasan_save_track+0x18/0x40
[   26.332813]  kasan_save_alloc_info+0x3b/0x50
[   26.333017]  __kasan_kmalloc+0xb7/0xc0
[   26.333212]  __kmalloc_cache_noprof+0x189/0x420
[   26.333401]  kasan_atomics+0x95/0x310
[   26.333579]  kunit_try_run_case+0x1a5/0x480
[   26.333780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.333963]  kthread+0x337/0x6f0
[   26.334080]  ret_from_fork+0x116/0x1d0
[   26.334243]  ret_from_fork_asm+0x1a/0x30
[   26.334436] 
[   26.334536] The buggy address belongs to the object at ffff888106195400
[   26.334536]  which belongs to the cache kmalloc-64 of size 64
[   26.335053] The buggy address is located 0 bytes to the right of
[   26.335053]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.335558] 
[   26.335650] The buggy address belongs to the physical page:
[   26.335867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.336173] flags: 0x200000000000000(node=0|zone=2)
[   26.336375] page_type: f5(slab)
[   26.336532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.336760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.336980] page dumped because: kasan: bad access detected
[   26.337147] 
[   26.337225] Memory state around the buggy address:
[   26.337443]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.337770]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.338262] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.338586]                                      ^
[   26.338754]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.338964]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.339185] ==================================================================
[   26.590823] ==================================================================
[   26.591143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   26.591464] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.591733] 
[   26.591841] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.591889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.591904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.591927] Call Trace:
[   26.591947]  <TASK>
[   26.591964]  dump_stack_lvl+0x73/0xb0
[   26.591992]  print_report+0xd1/0x650
[   26.592015]  ? __virt_addr_valid+0x1db/0x2d0
[   26.592039]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.592064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.592091]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.592117]  kasan_report+0x141/0x180
[   26.592139]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.592170]  kasan_check_range+0x10c/0x1c0
[   26.592194]  __kasan_check_write+0x18/0x20
[   26.592217]  kasan_atomics_helper+0x1a7f/0x5450
[   26.592244]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.592270]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.592295]  ? kasan_atomics+0x152/0x310
[   26.592321]  kasan_atomics+0x1dc/0x310
[   26.592345]  ? __pfx_kasan_atomics+0x10/0x10
[   26.592367]  ? trace_hardirqs_on+0x37/0xe0
[   26.592390]  ? __pfx_read_tsc+0x10/0x10
[   26.592412]  ? ktime_get_ts64+0x86/0x230
[   26.592438]  kunit_try_run_case+0x1a5/0x480
[   26.592661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.592693]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.592718]  ? __kthread_parkme+0x82/0x180
[   26.592741]  ? preempt_count_sub+0x50/0x80
[   26.592766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.592792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.592818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.592845]  kthread+0x337/0x6f0
[   26.592866]  ? trace_preempt_on+0x20/0xc0
[   26.592890]  ? __pfx_kthread+0x10/0x10
[   26.592913]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.592939]  ? calculate_sigpending+0x7b/0xa0
[   26.592965]  ? __pfx_kthread+0x10/0x10
[   26.592988]  ret_from_fork+0x116/0x1d0
[   26.593009]  ? __pfx_kthread+0x10/0x10
[   26.593031]  ret_from_fork_asm+0x1a/0x30
[   26.593063]  </TASK>
[   26.593076] 
[   26.600120] Allocated by task 314:
[   26.600305]  kasan_save_stack+0x45/0x70
[   26.600470]  kasan_save_track+0x18/0x40
[   26.600659]  kasan_save_alloc_info+0x3b/0x50
[   26.600832]  __kasan_kmalloc+0xb7/0xc0
[   26.601014]  __kmalloc_cache_noprof+0x189/0x420
[   26.601168]  kasan_atomics+0x95/0x310
[   26.601314]  kunit_try_run_case+0x1a5/0x480
[   26.601464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.601634]  kthread+0x337/0x6f0
[   26.601750]  ret_from_fork+0x116/0x1d0
[   26.601885]  ret_from_fork_asm+0x1a/0x30
[   26.602018] 
[   26.602083] The buggy address belongs to the object at ffff888106195400
[   26.602083]  which belongs to the cache kmalloc-64 of size 64
[   26.602466] The buggy address is located 0 bytes to the right of
[   26.602466]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.603006] 
[   26.603095] The buggy address belongs to the physical page:
[   26.603365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.603720] flags: 0x200000000000000(node=0|zone=2)
[   26.603948] page_type: f5(slab)
[   26.604109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.604398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.604631] page dumped because: kasan: bad access detected
[   26.604798] 
[   26.604863] Memory state around the buggy address:
[   26.605012]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.605248]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.605468] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.605777]                                      ^
[   26.606008]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.606355]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.606677] ==================================================================
[   25.593537] ==================================================================
[   25.593961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   25.594416] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.594666] 
[   25.594746] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.594793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.594806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.594826] Call Trace:
[   25.594867]  <TASK>
[   25.594884]  dump_stack_lvl+0x73/0xb0
[   25.594913]  print_report+0xd1/0x650
[   25.594935]  ? __virt_addr_valid+0x1db/0x2d0
[   25.594959]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.594984]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.595009]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.595056]  kasan_report+0x141/0x180
[   25.595078]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.595108]  __asan_report_store4_noabort+0x1b/0x30
[   25.595132]  kasan_atomics_helper+0x4ba2/0x5450
[   25.595292]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.595320]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.595345]  ? kasan_atomics+0x152/0x310
[   25.595372]  kasan_atomics+0x1dc/0x310
[   25.595394]  ? __pfx_kasan_atomics+0x10/0x10
[   25.595416]  ? trace_hardirqs_on+0x37/0xe0
[   25.595438]  ? __pfx_read_tsc+0x10/0x10
[   25.595472]  ? ktime_get_ts64+0x86/0x230
[   25.595496]  kunit_try_run_case+0x1a5/0x480
[   25.595522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.595547]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.595569]  ? __kthread_parkme+0x82/0x180
[   25.595591]  ? preempt_count_sub+0x50/0x80
[   25.595614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.595639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.595663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.595687]  kthread+0x337/0x6f0
[   25.595707]  ? trace_preempt_on+0x20/0xc0
[   25.595729]  ? __pfx_kthread+0x10/0x10
[   25.595750]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.595774]  ? calculate_sigpending+0x7b/0xa0
[   25.595798]  ? __pfx_kthread+0x10/0x10
[   25.595819]  ret_from_fork+0x116/0x1d0
[   25.595838]  ? __pfx_kthread+0x10/0x10
[   25.595859]  ret_from_fork_asm+0x1a/0x30
[   25.595963]  </TASK>
[   25.595976] 
[   25.604410] Allocated by task 314:
[   25.604601]  kasan_save_stack+0x45/0x70
[   25.604772]  kasan_save_track+0x18/0x40
[   25.605046]  kasan_save_alloc_info+0x3b/0x50
[   25.605331]  __kasan_kmalloc+0xb7/0xc0
[   25.605547]  __kmalloc_cache_noprof+0x189/0x420
[   25.605739]  kasan_atomics+0x95/0x310
[   25.605870]  kunit_try_run_case+0x1a5/0x480
[   25.606009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.606416]  kthread+0x337/0x6f0
[   25.606657]  ret_from_fork+0x116/0x1d0
[   25.606845]  ret_from_fork_asm+0x1a/0x30
[   25.607058] 
[   25.607124] The buggy address belongs to the object at ffff888106195400
[   25.607124]  which belongs to the cache kmalloc-64 of size 64
[   25.607965] The buggy address is located 0 bytes to the right of
[   25.607965]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.608688] 
[   25.608784] The buggy address belongs to the physical page:
[   25.609113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.609615] flags: 0x200000000000000(node=0|zone=2)
[   25.609851] page_type: f5(slab)
[   25.609999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.610227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.610506] page dumped because: kasan: bad access detected
[   25.610779] 
[   25.610872] Memory state around the buggy address:
[   25.611242]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.611970]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.612679] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.612971]                                      ^
[   25.613179]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.613717]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.614123] ==================================================================
[   25.634563] ==================================================================
[   25.635383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   25.635740] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.636080] 
[   25.636706] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.636760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.636776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.636800] Call Trace:
[   25.636815]  <TASK>
[   25.636833]  dump_stack_lvl+0x73/0xb0
[   25.636863]  print_report+0xd1/0x650
[   25.636887]  ? __virt_addr_valid+0x1db/0x2d0
[   25.636911]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.636937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.636964]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.636992]  kasan_report+0x141/0x180
[   25.637016]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.637047]  __asan_report_store4_noabort+0x1b/0x30
[   25.637073]  kasan_atomics_helper+0x4b6e/0x5450
[   25.637100]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.637128]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.637173]  ? kasan_atomics+0x152/0x310
[   25.637201]  kasan_atomics+0x1dc/0x310
[   25.637225]  ? __pfx_kasan_atomics+0x10/0x10
[   25.637249]  ? trace_hardirqs_on+0x37/0xe0
[   25.637273]  ? __pfx_read_tsc+0x10/0x10
[   25.637296]  ? ktime_get_ts64+0x86/0x230
[   25.637322]  kunit_try_run_case+0x1a5/0x480
[   25.637348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.637375]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.637399]  ? __kthread_parkme+0x82/0x180
[   25.637421]  ? preempt_count_sub+0x50/0x80
[   25.637446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.637484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.637510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.637536]  kthread+0x337/0x6f0
[   25.637558]  ? trace_preempt_on+0x20/0xc0
[   25.637581]  ? __pfx_kthread+0x10/0x10
[   25.637604]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.637630]  ? calculate_sigpending+0x7b/0xa0
[   25.637654]  ? __pfx_kthread+0x10/0x10
[   25.637678]  ret_from_fork+0x116/0x1d0
[   25.637699]  ? __pfx_kthread+0x10/0x10
[   25.637721]  ret_from_fork_asm+0x1a/0x30
[   25.637753]  </TASK>
[   25.637765] 
[   25.649221] Allocated by task 314:
[   25.649471]  kasan_save_stack+0x45/0x70
[   25.649818]  kasan_save_track+0x18/0x40
[   25.650102]  kasan_save_alloc_info+0x3b/0x50
[   25.650535]  __kasan_kmalloc+0xb7/0xc0
[   25.650812]  __kmalloc_cache_noprof+0x189/0x420
[   25.651055]  kasan_atomics+0x95/0x310
[   25.651477]  kunit_try_run_case+0x1a5/0x480
[   25.651643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.651937]  kthread+0x337/0x6f0
[   25.652281]  ret_from_fork+0x116/0x1d0
[   25.652781]  ret_from_fork_asm+0x1a/0x30
[   25.652966] 
[   25.653077] The buggy address belongs to the object at ffff888106195400
[   25.653077]  which belongs to the cache kmalloc-64 of size 64
[   25.654056] The buggy address is located 0 bytes to the right of
[   25.654056]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.654865] 
[   25.654956] The buggy address belongs to the physical page:
[   25.655482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.655849] flags: 0x200000000000000(node=0|zone=2)
[   25.656420] page_type: f5(slab)
[   25.656602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.657128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.657618] page dumped because: kasan: bad access detected
[   25.657958] 
[   25.658081] Memory state around the buggy address:
[   25.658605]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.658887]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.659436] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.659848]                                      ^
[   25.660168]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.660730]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.661055] ==================================================================
[   26.374382] ==================================================================
[   26.374746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   26.375359] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.375716] 
[   26.375822] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.375870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.375884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.375907] Call Trace:
[   26.375921]  <TASK>
[   26.375938]  dump_stack_lvl+0x73/0xb0
[   26.375965]  print_report+0xd1/0x650
[   26.375988]  ? __virt_addr_valid+0x1db/0x2d0
[   26.376013]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.376039]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.376065]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.376093]  kasan_report+0x141/0x180
[   26.376116]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.376147]  __asan_report_store8_noabort+0x1b/0x30
[   26.376173]  kasan_atomics_helper+0x50d4/0x5450
[   26.376214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.376241]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.376266]  ? kasan_atomics+0x152/0x310
[   26.376294]  kasan_atomics+0x1dc/0x310
[   26.376317]  ? __pfx_kasan_atomics+0x10/0x10
[   26.376341]  ? trace_hardirqs_on+0x37/0xe0
[   26.376364]  ? __pfx_read_tsc+0x10/0x10
[   26.376387]  ? ktime_get_ts64+0x86/0x230
[   26.376412]  kunit_try_run_case+0x1a5/0x480
[   26.376438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.376476]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.376499]  ? __kthread_parkme+0x82/0x180
[   26.376522]  ? preempt_count_sub+0x50/0x80
[   26.376546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.376572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.376597]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.376623]  kthread+0x337/0x6f0
[   26.376645]  ? trace_preempt_on+0x20/0xc0
[   26.376668]  ? __pfx_kthread+0x10/0x10
[   26.376690]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.376715]  ? calculate_sigpending+0x7b/0xa0
[   26.376741]  ? __pfx_kthread+0x10/0x10
[   26.376765]  ret_from_fork+0x116/0x1d0
[   26.376785]  ? __pfx_kthread+0x10/0x10
[   26.376808]  ret_from_fork_asm+0x1a/0x30
[   26.376840]  </TASK>
[   26.376852] 
[   26.383643] Allocated by task 314:
[   26.383770]  kasan_save_stack+0x45/0x70
[   26.383912]  kasan_save_track+0x18/0x40
[   26.384043]  kasan_save_alloc_info+0x3b/0x50
[   26.384187]  __kasan_kmalloc+0xb7/0xc0
[   26.384318]  __kmalloc_cache_noprof+0x189/0x420
[   26.384486]  kasan_atomics+0x95/0x310
[   26.384670]  kunit_try_run_case+0x1a5/0x480
[   26.384871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.385124]  kthread+0x337/0x6f0
[   26.385291]  ret_from_fork+0x116/0x1d0
[   26.385484]  ret_from_fork_asm+0x1a/0x30
[   26.385677] 
[   26.385766] The buggy address belongs to the object at ffff888106195400
[   26.385766]  which belongs to the cache kmalloc-64 of size 64
[   26.386298] The buggy address is located 0 bytes to the right of
[   26.386298]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.387204] 
[   26.387299] The buggy address belongs to the physical page:
[   26.387561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.387911] flags: 0x200000000000000(node=0|zone=2)
[   26.388124] page_type: f5(slab)
[   26.388327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.388639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.388865] page dumped because: kasan: bad access detected
[   26.389031] 
[   26.389096] Memory state around the buggy address:
[   26.389390]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.389717]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.390040] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.390552]                                      ^
[   26.390745]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.391026]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.391297] ==================================================================
[   25.935582] ==================================================================
[   25.935896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   25.936735] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.937593] 
[   25.937716] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.937767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.937783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.937805] Call Trace:
[   25.937821]  <TASK>
[   25.937837]  dump_stack_lvl+0x73/0xb0
[   25.937874]  print_report+0xd1/0x650
[   25.937899]  ? __virt_addr_valid+0x1db/0x2d0
[   25.937924]  ? kasan_atomics_helper+0x992/0x5450
[   25.937950]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.937976]  ? kasan_atomics_helper+0x992/0x5450
[   25.938002]  kasan_report+0x141/0x180
[   25.938025]  ? kasan_atomics_helper+0x992/0x5450
[   25.938055]  kasan_check_range+0x10c/0x1c0
[   25.938079]  __kasan_check_write+0x18/0x20
[   25.938104]  kasan_atomics_helper+0x992/0x5450
[   25.938130]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.938326]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.938354]  ? kasan_atomics+0x152/0x310
[   25.938382]  kasan_atomics+0x1dc/0x310
[   25.938406]  ? __pfx_kasan_atomics+0x10/0x10
[   25.938429]  ? trace_hardirqs_on+0x37/0xe0
[   25.938502]  ? __pfx_read_tsc+0x10/0x10
[   25.938525]  ? ktime_get_ts64+0x86/0x230
[   25.938550]  kunit_try_run_case+0x1a5/0x480
[   25.938576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.938603]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.938626]  ? __kthread_parkme+0x82/0x180
[   25.938648]  ? preempt_count_sub+0x50/0x80
[   25.938673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.938699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.938723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.938749]  kthread+0x337/0x6f0
[   25.938770]  ? trace_preempt_on+0x20/0xc0
[   25.938793]  ? __pfx_kthread+0x10/0x10
[   25.938815]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.938840]  ? calculate_sigpending+0x7b/0xa0
[   25.938866]  ? __pfx_kthread+0x10/0x10
[   25.938888]  ret_from_fork+0x116/0x1d0
[   25.938909]  ? __pfx_kthread+0x10/0x10
[   25.938930]  ret_from_fork_asm+0x1a/0x30
[   25.938963]  </TASK>
[   25.938975] 
[   25.949944] Allocated by task 314:
[   25.950077]  kasan_save_stack+0x45/0x70
[   25.950431]  kasan_save_track+0x18/0x40
[   25.950581]  kasan_save_alloc_info+0x3b/0x50
[   25.950726]  __kasan_kmalloc+0xb7/0xc0
[   25.950862]  __kmalloc_cache_noprof+0x189/0x420
[   25.951083]  kasan_atomics+0x95/0x310
[   25.951373]  kunit_try_run_case+0x1a5/0x480
[   25.951549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.951721]  kthread+0x337/0x6f0
[   25.951837]  ret_from_fork+0x116/0x1d0
[   25.951979]  ret_from_fork_asm+0x1a/0x30
[   25.952203] 
[   25.952319] The buggy address belongs to the object at ffff888106195400
[   25.952319]  which belongs to the cache kmalloc-64 of size 64
[   25.952946] The buggy address is located 0 bytes to the right of
[   25.952946]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.953634] 
[   25.953719] The buggy address belongs to the physical page:
[   25.953924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.954260] flags: 0x200000000000000(node=0|zone=2)
[   25.954418] page_type: f5(slab)
[   25.954545] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.954821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.955151] page dumped because: kasan: bad access detected
[   25.955431] 
[   25.955507] Memory state around the buggy address:
[   25.955759]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.956897]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.957451] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.957741]                                      ^
[   25.957968]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.958551]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.959039] ==================================================================
[   26.214734] ==================================================================
[   26.215049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   26.215398] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.215638] 
[   26.215720] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.215767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.215781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.215804] Call Trace:
[   26.215817]  <TASK>
[   26.215836]  dump_stack_lvl+0x73/0xb0
[   26.215863]  print_report+0xd1/0x650
[   26.215886]  ? __virt_addr_valid+0x1db/0x2d0
[   26.215910]  ? kasan_atomics_helper+0x1148/0x5450
[   26.215936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.215963]  ? kasan_atomics_helper+0x1148/0x5450
[   26.215990]  kasan_report+0x141/0x180
[   26.216014]  ? kasan_atomics_helper+0x1148/0x5450
[   26.216045]  kasan_check_range+0x10c/0x1c0
[   26.216069]  __kasan_check_write+0x18/0x20
[   26.216094]  kasan_atomics_helper+0x1148/0x5450
[   26.216122]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.216149]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.216174]  ? kasan_atomics+0x152/0x310
[   26.216288]  kasan_atomics+0x1dc/0x310
[   26.216318]  ? __pfx_kasan_atomics+0x10/0x10
[   26.216342]  ? trace_hardirqs_on+0x37/0xe0
[   26.216366]  ? __pfx_read_tsc+0x10/0x10
[   26.216388]  ? ktime_get_ts64+0x86/0x230
[   26.216413]  kunit_try_run_case+0x1a5/0x480
[   26.216439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.216480]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.216504]  ? __kthread_parkme+0x82/0x180
[   26.216526]  ? preempt_count_sub+0x50/0x80
[   26.216550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.216577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.216602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.216628]  kthread+0x337/0x6f0
[   26.216649]  ? trace_preempt_on+0x20/0xc0
[   26.216673]  ? __pfx_kthread+0x10/0x10
[   26.216695]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.216721]  ? calculate_sigpending+0x7b/0xa0
[   26.216747]  ? __pfx_kthread+0x10/0x10
[   26.216771]  ret_from_fork+0x116/0x1d0
[   26.216792]  ? __pfx_kthread+0x10/0x10
[   26.216814]  ret_from_fork_asm+0x1a/0x30
[   26.216846]  </TASK>
[   26.216859] 
[   26.225567] Allocated by task 314:
[   26.225696]  kasan_save_stack+0x45/0x70
[   26.225849]  kasan_save_track+0x18/0x40
[   26.225982]  kasan_save_alloc_info+0x3b/0x50
[   26.226127]  __kasan_kmalloc+0xb7/0xc0
[   26.226257]  __kmalloc_cache_noprof+0x189/0x420
[   26.226407]  kasan_atomics+0x95/0x310
[   26.227341]  kunit_try_run_case+0x1a5/0x480
[   26.227633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.228075]  kthread+0x337/0x6f0
[   26.228568]  ret_from_fork+0x116/0x1d0
[   26.228950]  ret_from_fork_asm+0x1a/0x30
[   26.229285] 
[   26.229514] The buggy address belongs to the object at ffff888106195400
[   26.229514]  which belongs to the cache kmalloc-64 of size 64
[   26.230176] The buggy address is located 0 bytes to the right of
[   26.230176]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.230692] 
[   26.230780] The buggy address belongs to the physical page:
[   26.231009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.231607] flags: 0x200000000000000(node=0|zone=2)
[   26.232043] page_type: f5(slab)
[   26.232331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.232850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.233423] page dumped because: kasan: bad access detected
[   26.233795] 
[   26.234030] Memory state around the buggy address:
[   26.234467]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.234841]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.235134] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.235644]                                      ^
[   26.236038]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.236505]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.236819] ==================================================================
[   26.391843] ==================================================================
[   26.392163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   26.392435] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.392672] 
[   26.392750] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.392795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.392810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.392832] Call Trace:
[   26.392848]  <TASK>
[   26.392864]  dump_stack_lvl+0x73/0xb0
[   26.392891]  print_report+0xd1/0x650
[   26.392914]  ? __virt_addr_valid+0x1db/0x2d0
[   26.392939]  ? kasan_atomics_helper+0x151d/0x5450
[   26.392965]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.392992]  ? kasan_atomics_helper+0x151d/0x5450
[   26.393019]  kasan_report+0x141/0x180
[   26.393043]  ? kasan_atomics_helper+0x151d/0x5450
[   26.393073]  kasan_check_range+0x10c/0x1c0
[   26.393098]  __kasan_check_write+0x18/0x20
[   26.393123]  kasan_atomics_helper+0x151d/0x5450
[   26.393150]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.393178]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.393204]  ? kasan_atomics+0x152/0x310
[   26.393231]  kasan_atomics+0x1dc/0x310
[   26.393254]  ? __pfx_kasan_atomics+0x10/0x10
[   26.393277]  ? trace_hardirqs_on+0x37/0xe0
[   26.393301]  ? __pfx_read_tsc+0x10/0x10
[   26.393323]  ? ktime_get_ts64+0x86/0x230
[   26.393349]  kunit_try_run_case+0x1a5/0x480
[   26.393375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.393400]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.393424]  ? __kthread_parkme+0x82/0x180
[   26.393447]  ? preempt_count_sub+0x50/0x80
[   26.393483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.393509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.393534]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.393560]  kthread+0x337/0x6f0
[   26.393580]  ? trace_preempt_on+0x20/0xc0
[   26.393603]  ? __pfx_kthread+0x10/0x10
[   26.393625]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.393651]  ? calculate_sigpending+0x7b/0xa0
[   26.393675]  ? __pfx_kthread+0x10/0x10
[   26.393698]  ret_from_fork+0x116/0x1d0
[   26.393718]  ? __pfx_kthread+0x10/0x10
[   26.393740]  ret_from_fork_asm+0x1a/0x30
[   26.393772]  </TASK>
[   26.393785] 
[   26.400658] Allocated by task 314:
[   26.400829]  kasan_save_stack+0x45/0x70
[   26.401026]  kasan_save_track+0x18/0x40
[   26.401217]  kasan_save_alloc_info+0x3b/0x50
[   26.401424]  __kasan_kmalloc+0xb7/0xc0
[   26.401625]  __kmalloc_cache_noprof+0x189/0x420
[   26.401850]  kasan_atomics+0x95/0x310
[   26.402033]  kunit_try_run_case+0x1a5/0x480
[   26.402270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.402542]  kthread+0x337/0x6f0
[   26.402718]  ret_from_fork+0x116/0x1d0
[   26.402905]  ret_from_fork_asm+0x1a/0x30
[   26.403101] 
[   26.403188] The buggy address belongs to the object at ffff888106195400
[   26.403188]  which belongs to the cache kmalloc-64 of size 64
[   26.403716] The buggy address is located 0 bytes to the right of
[   26.403716]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.404188] 
[   26.404283] The buggy address belongs to the physical page:
[   26.404481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.404721] flags: 0x200000000000000(node=0|zone=2)
[   26.404880] page_type: f5(slab)
[   26.405002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.405306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.405643] page dumped because: kasan: bad access detected
[   26.405898] 
[   26.405988] Memory state around the buggy address:
[   26.406202]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.406534]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.406845] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.407159]                                      ^
[   26.407382]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.407604]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.407813] ==================================================================
[   26.483492] ==================================================================
[   26.483905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   26.484163] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.484745] 
[   26.484849] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.484897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.484912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.484934] Call Trace:
[   26.484949]  <TASK>
[   26.484965]  dump_stack_lvl+0x73/0xb0
[   26.484994]  print_report+0xd1/0x650
[   26.485017]  ? __virt_addr_valid+0x1db/0x2d0
[   26.485041]  ? kasan_atomics_helper+0x177f/0x5450
[   26.485068]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.485094]  ? kasan_atomics_helper+0x177f/0x5450
[   26.485121]  kasan_report+0x141/0x180
[   26.485144]  ? kasan_atomics_helper+0x177f/0x5450
[   26.485175]  kasan_check_range+0x10c/0x1c0
[   26.485200]  __kasan_check_write+0x18/0x20
[   26.485685]  kasan_atomics_helper+0x177f/0x5450
[   26.485727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.485756]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.485783]  ? kasan_atomics+0x152/0x310
[   26.485811]  kasan_atomics+0x1dc/0x310
[   26.485836]  ? __pfx_kasan_atomics+0x10/0x10
[   26.485868]  ? trace_hardirqs_on+0x37/0xe0
[   26.485891]  ? __pfx_read_tsc+0x10/0x10
[   26.485913]  ? ktime_get_ts64+0x86/0x230
[   26.485938]  kunit_try_run_case+0x1a5/0x480
[   26.485965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.485991]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.486016]  ? __kthread_parkme+0x82/0x180
[   26.486038]  ? preempt_count_sub+0x50/0x80
[   26.486063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.486089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.486114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.486140]  kthread+0x337/0x6f0
[   26.486160]  ? trace_preempt_on+0x20/0xc0
[   26.486183]  ? __pfx_kthread+0x10/0x10
[   26.486220]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.486246]  ? calculate_sigpending+0x7b/0xa0
[   26.486271]  ? __pfx_kthread+0x10/0x10
[   26.486295]  ret_from_fork+0x116/0x1d0
[   26.486315]  ? __pfx_kthread+0x10/0x10
[   26.486337]  ret_from_fork_asm+0x1a/0x30
[   26.486370]  </TASK>
[   26.486382] 
[   26.496289] Allocated by task 314:
[   26.496674]  kasan_save_stack+0x45/0x70
[   26.496964]  kasan_save_track+0x18/0x40
[   26.497279]  kasan_save_alloc_info+0x3b/0x50
[   26.497568]  __kasan_kmalloc+0xb7/0xc0
[   26.497715]  __kmalloc_cache_noprof+0x189/0x420
[   26.497987]  kasan_atomics+0x95/0x310
[   26.498167]  kunit_try_run_case+0x1a5/0x480
[   26.498577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.498900]  kthread+0x337/0x6f0
[   26.499030]  ret_from_fork+0x116/0x1d0
[   26.499380]  ret_from_fork_asm+0x1a/0x30
[   26.499674] 
[   26.499750] The buggy address belongs to the object at ffff888106195400
[   26.499750]  which belongs to the cache kmalloc-64 of size 64
[   26.500416] The buggy address is located 0 bytes to the right of
[   26.500416]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.500923] 
[   26.501003] The buggy address belongs to the physical page:
[   26.501539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.501972] flags: 0x200000000000000(node=0|zone=2)
[   26.502271] page_type: f5(slab)
[   26.502443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.502915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.503333] page dumped because: kasan: bad access detected
[   26.503654] 
[   26.503749] Memory state around the buggy address:
[   26.504096]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.504487]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.504842] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.505146]                                      ^
[   26.505505]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.505916]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.506309] ==================================================================
[   26.876022] ==================================================================
[   26.876249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   26.876598] Read of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.876918] 
[   26.877013] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.877061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.877075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.877097] Call Trace:
[   26.877111]  <TASK>
[   26.877127]  dump_stack_lvl+0x73/0xb0
[   26.877154]  print_report+0xd1/0x650
[   26.877177]  ? __virt_addr_valid+0x1db/0x2d0
[   26.877201]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.877227]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.877254]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.877280]  kasan_report+0x141/0x180
[   26.877303]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.877334]  __asan_report_load8_noabort+0x18/0x20
[   26.877359]  kasan_atomics_helper+0x4fa5/0x5450
[   26.877387]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.877413]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.877438]  ? kasan_atomics+0x152/0x310
[   26.877475]  kasan_atomics+0x1dc/0x310
[   26.877499]  ? __pfx_kasan_atomics+0x10/0x10
[   26.877522]  ? trace_hardirqs_on+0x37/0xe0
[   26.877545]  ? __pfx_read_tsc+0x10/0x10
[   26.877568]  ? ktime_get_ts64+0x86/0x230
[   26.877592]  kunit_try_run_case+0x1a5/0x480
[   26.877618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.877644]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.877668]  ? __kthread_parkme+0x82/0x180
[   26.877689]  ? preempt_count_sub+0x50/0x80
[   26.877714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.877740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.877765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.877792]  kthread+0x337/0x6f0
[   26.877814]  ? trace_preempt_on+0x20/0xc0
[   26.877840]  ? __pfx_kthread+0x10/0x10
[   26.877872]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.877897]  ? calculate_sigpending+0x7b/0xa0
[   26.877922]  ? __pfx_kthread+0x10/0x10
[   26.877945]  ret_from_fork+0x116/0x1d0
[   26.877966]  ? __pfx_kthread+0x10/0x10
[   26.877988]  ret_from_fork_asm+0x1a/0x30
[   26.878020]  </TASK>
[   26.878032] 
[   26.888424] Allocated by task 314:
[   26.888735]  kasan_save_stack+0x45/0x70
[   26.888932]  kasan_save_track+0x18/0x40
[   26.889273]  kasan_save_alloc_info+0x3b/0x50
[   26.889547]  __kasan_kmalloc+0xb7/0xc0
[   26.889706]  __kmalloc_cache_noprof+0x189/0x420
[   26.889930]  kasan_atomics+0x95/0x310
[   26.890074]  kunit_try_run_case+0x1a5/0x480
[   26.890297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.890476]  kthread+0x337/0x6f0
[   26.890591]  ret_from_fork+0x116/0x1d0
[   26.890718]  ret_from_fork_asm+0x1a/0x30
[   26.890851] 
[   26.890918] The buggy address belongs to the object at ffff888106195400
[   26.890918]  which belongs to the cache kmalloc-64 of size 64
[   26.891375] The buggy address is located 0 bytes to the right of
[   26.891375]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.892483] 
[   26.892584] The buggy address belongs to the physical page:
[   26.893053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.893549] flags: 0x200000000000000(node=0|zone=2)
[   26.893776] page_type: f5(slab)
[   26.893984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.894216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.894439] page dumped because: kasan: bad access detected
[   26.894616] 
[   26.894683] Memory state around the buggy address:
[   26.894834]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.895256]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.895919] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.896243]                                      ^
[   26.896595]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.896845]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.897301] ==================================================================
[   26.046569] ==================================================================
[   26.046922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   26.047280] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.047573] 
[   26.047670] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.047719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.047734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.047756] Call Trace:
[   26.047771]  <TASK>
[   26.047788]  dump_stack_lvl+0x73/0xb0
[   26.047814]  print_report+0xd1/0x650
[   26.047837]  ? __virt_addr_valid+0x1db/0x2d0
[   26.047860]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.047886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.047913]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.047938]  kasan_report+0x141/0x180
[   26.047961]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.047992]  __asan_report_load4_noabort+0x18/0x20
[   26.048017]  kasan_atomics_helper+0x4a84/0x5450
[   26.048044]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.048070]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.048095]  ? kasan_atomics+0x152/0x310
[   26.048122]  kasan_atomics+0x1dc/0x310
[   26.048145]  ? __pfx_kasan_atomics+0x10/0x10
[   26.048168]  ? trace_hardirqs_on+0x37/0xe0
[   26.048192]  ? __pfx_read_tsc+0x10/0x10
[   26.048215]  ? ktime_get_ts64+0x86/0x230
[   26.048239]  kunit_try_run_case+0x1a5/0x480
[   26.048265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.048292]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.048315]  ? __kthread_parkme+0x82/0x180
[   26.048336]  ? preempt_count_sub+0x50/0x80
[   26.048361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.048387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.048412]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.048438]  kthread+0x337/0x6f0
[   26.048469]  ? trace_preempt_on+0x20/0xc0
[   26.048493]  ? __pfx_kthread+0x10/0x10
[   26.048516]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.048541]  ? calculate_sigpending+0x7b/0xa0
[   26.048567]  ? __pfx_kthread+0x10/0x10
[   26.048590]  ret_from_fork+0x116/0x1d0
[   26.048610]  ? __pfx_kthread+0x10/0x10
[   26.048633]  ret_from_fork_asm+0x1a/0x30
[   26.048665]  </TASK>
[   26.048677] 
[   26.055950] Allocated by task 314:
[   26.056127]  kasan_save_stack+0x45/0x70
[   26.056332]  kasan_save_track+0x18/0x40
[   26.056479]  kasan_save_alloc_info+0x3b/0x50
[   26.056623]  __kasan_kmalloc+0xb7/0xc0
[   26.056753]  __kmalloc_cache_noprof+0x189/0x420
[   26.056902]  kasan_atomics+0x95/0x310
[   26.057029]  kunit_try_run_case+0x1a5/0x480
[   26.057169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.057421]  kthread+0x337/0x6f0
[   26.057592]  ret_from_fork+0x116/0x1d0
[   26.057774]  ret_from_fork_asm+0x1a/0x30
[   26.057969] 
[   26.058059] The buggy address belongs to the object at ffff888106195400
[   26.058059]  which belongs to the cache kmalloc-64 of size 64
[   26.058802] The buggy address is located 0 bytes to the right of
[   26.058802]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.059160] 
[   26.059226] The buggy address belongs to the physical page:
[   26.059394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.059708] flags: 0x200000000000000(node=0|zone=2)
[   26.059939] page_type: f5(slab)
[   26.060102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.060552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.060888] page dumped because: kasan: bad access detected
[   26.061141] 
[   26.061283] Memory state around the buggy address:
[   26.061515]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.061833]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.062108] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.062576]                                      ^
[   26.062727]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062936]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.063213] ==================================================================
[   26.506938] ==================================================================
[   26.507363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   26.507818] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.508150] 
[   26.508704] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.508828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.508845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.508867] Call Trace:
[   26.508885]  <TASK>
[   26.508903]  dump_stack_lvl+0x73/0xb0
[   26.508933]  print_report+0xd1/0x650
[   26.508957]  ? __virt_addr_valid+0x1db/0x2d0
[   26.508981]  ? kasan_atomics_helper+0x1818/0x5450
[   26.509009]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.509037]  ? kasan_atomics_helper+0x1818/0x5450
[   26.509063]  kasan_report+0x141/0x180
[   26.509087]  ? kasan_atomics_helper+0x1818/0x5450
[   26.509117]  kasan_check_range+0x10c/0x1c0
[   26.509142]  __kasan_check_write+0x18/0x20
[   26.509167]  kasan_atomics_helper+0x1818/0x5450
[   26.509195]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.509221]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.509247]  ? kasan_atomics+0x152/0x310
[   26.509275]  kasan_atomics+0x1dc/0x310
[   26.509298]  ? __pfx_kasan_atomics+0x10/0x10
[   26.509320]  ? trace_hardirqs_on+0x37/0xe0
[   26.509344]  ? __pfx_read_tsc+0x10/0x10
[   26.509367]  ? ktime_get_ts64+0x86/0x230
[   26.509392]  kunit_try_run_case+0x1a5/0x480
[   26.509419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.509445]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.509481]  ? __kthread_parkme+0x82/0x180
[   26.509503]  ? preempt_count_sub+0x50/0x80
[   26.509527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.509554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.509579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.509604]  kthread+0x337/0x6f0
[   26.509625]  ? trace_preempt_on+0x20/0xc0
[   26.509648]  ? __pfx_kthread+0x10/0x10
[   26.509671]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.509696]  ? calculate_sigpending+0x7b/0xa0
[   26.509721]  ? __pfx_kthread+0x10/0x10
[   26.509745]  ret_from_fork+0x116/0x1d0
[   26.509765]  ? __pfx_kthread+0x10/0x10
[   26.509787]  ret_from_fork_asm+0x1a/0x30
[   26.509820]  </TASK>
[   26.509833] 
[   26.519680] Allocated by task 314:
[   26.519838]  kasan_save_stack+0x45/0x70
[   26.520034]  kasan_save_track+0x18/0x40
[   26.520530]  kasan_save_alloc_info+0x3b/0x50
[   26.520735]  __kasan_kmalloc+0xb7/0xc0
[   26.520960]  __kmalloc_cache_noprof+0x189/0x420
[   26.521247]  kasan_atomics+0x95/0x310
[   26.521527]  kunit_try_run_case+0x1a5/0x480
[   26.521848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.522027]  kthread+0x337/0x6f0
[   26.522305]  ret_from_fork+0x116/0x1d0
[   26.522675]  ret_from_fork_asm+0x1a/0x30
[   26.523082] 
[   26.523214] The buggy address belongs to the object at ffff888106195400
[   26.523214]  which belongs to the cache kmalloc-64 of size 64
[   26.523842] The buggy address is located 0 bytes to the right of
[   26.523842]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.524493] 
[   26.524600] The buggy address belongs to the physical page:
[   26.525002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.525415] flags: 0x200000000000000(node=0|zone=2)
[   26.525722] page_type: f5(slab)
[   26.525949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.526264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.526720] page dumped because: kasan: bad access detected
[   26.527049] 
[   26.527146] Memory state around the buggy address:
[   26.527367]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.527677]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.527969] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.528544]                                      ^
[   26.528748]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.529153]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.529719] ==================================================================
[   25.687245] ==================================================================
[   25.687639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   25.687960] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.688277] 
[   25.688363] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.688582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.688598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.688620] Call Trace:
[   25.688635]  <TASK>
[   25.688652]  dump_stack_lvl+0x73/0xb0
[   25.688682]  print_report+0xd1/0x650
[   25.688706]  ? __virt_addr_valid+0x1db/0x2d0
[   25.688730]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.688757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.688784]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.688811]  kasan_report+0x141/0x180
[   25.688834]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.688866]  __asan_report_load4_noabort+0x18/0x20
[   25.688892]  kasan_atomics_helper+0x4b54/0x5450
[   25.688956]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.688984]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.689028]  ? kasan_atomics+0x152/0x310
[   25.689055]  kasan_atomics+0x1dc/0x310
[   25.689080]  ? __pfx_kasan_atomics+0x10/0x10
[   25.689103]  ? trace_hardirqs_on+0x37/0xe0
[   25.689127]  ? __pfx_read_tsc+0x10/0x10
[   25.689241]  ? ktime_get_ts64+0x86/0x230
[   25.689284]  kunit_try_run_case+0x1a5/0x480
[   25.689311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.689351]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.689375]  ? __kthread_parkme+0x82/0x180
[   25.689412]  ? preempt_count_sub+0x50/0x80
[   25.689437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.689477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.689503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.689543]  kthread+0x337/0x6f0
[   25.689565]  ? trace_preempt_on+0x20/0xc0
[   25.689588]  ? __pfx_kthread+0x10/0x10
[   25.689611]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.689637]  ? calculate_sigpending+0x7b/0xa0
[   25.689663]  ? __pfx_kthread+0x10/0x10
[   25.689686]  ret_from_fork+0x116/0x1d0
[   25.689707]  ? __pfx_kthread+0x10/0x10
[   25.689730]  ret_from_fork_asm+0x1a/0x30
[   25.689764]  </TASK>
[   25.689777] 
[   25.698215] Allocated by task 314:
[   25.698338]  kasan_save_stack+0x45/0x70
[   25.698559]  kasan_save_track+0x18/0x40
[   25.698854]  kasan_save_alloc_info+0x3b/0x50
[   25.699085]  __kasan_kmalloc+0xb7/0xc0
[   25.699415]  __kmalloc_cache_noprof+0x189/0x420
[   25.699637]  kasan_atomics+0x95/0x310
[   25.699797]  kunit_try_run_case+0x1a5/0x480
[   25.699941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.700229]  kthread+0x337/0x6f0
[   25.700415]  ret_from_fork+0x116/0x1d0
[   25.700762]  ret_from_fork_asm+0x1a/0x30
[   25.700929] 
[   25.701031] The buggy address belongs to the object at ffff888106195400
[   25.701031]  which belongs to the cache kmalloc-64 of size 64
[   25.701489] The buggy address is located 0 bytes to the right of
[   25.701489]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.702119] 
[   25.702211] The buggy address belongs to the physical page:
[   25.702452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.702954] flags: 0x200000000000000(node=0|zone=2)
[   25.703121] page_type: f5(slab)
[   25.703429] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.703812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.704128] page dumped because: kasan: bad access detected
[   25.704374] 
[   25.704488] Memory state around the buggy address:
[   25.704699]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.705420]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.705650] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.706032]                                      ^
[   25.706409]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.706762]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.707268] ==================================================================
[   26.306050] ==================================================================
[   26.306319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   26.306676] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.307001] 
[   26.307104] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.307150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.307163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.307187] Call Trace:
[   26.307209]  <TASK>
[   26.307225]  dump_stack_lvl+0x73/0xb0
[   26.307251]  print_report+0xd1/0x650
[   26.307275]  ? __virt_addr_valid+0x1db/0x2d0
[   26.307299]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.307325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.307352]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.307379]  kasan_report+0x141/0x180
[   26.307402]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.307433]  __asan_report_load4_noabort+0x18/0x20
[   26.307470]  kasan_atomics_helper+0x49ce/0x5450
[   26.307497]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.307524]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.307549]  ? kasan_atomics+0x152/0x310
[   26.307577]  kasan_atomics+0x1dc/0x310
[   26.307600]  ? __pfx_kasan_atomics+0x10/0x10
[   26.307623]  ? trace_hardirqs_on+0x37/0xe0
[   26.307647]  ? __pfx_read_tsc+0x10/0x10
[   26.307670]  ? ktime_get_ts64+0x86/0x230
[   26.307694]  kunit_try_run_case+0x1a5/0x480
[   26.307720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.307746]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.307769]  ? __kthread_parkme+0x82/0x180
[   26.307792]  ? preempt_count_sub+0x50/0x80
[   26.307816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.307843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.307868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.307894]  kthread+0x337/0x6f0
[   26.307915]  ? trace_preempt_on+0x20/0xc0
[   26.307939]  ? __pfx_kthread+0x10/0x10
[   26.307961]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.307986]  ? calculate_sigpending+0x7b/0xa0
[   26.308012]  ? __pfx_kthread+0x10/0x10
[   26.308036]  ret_from_fork+0x116/0x1d0
[   26.308056]  ? __pfx_kthread+0x10/0x10
[   26.308079]  ret_from_fork_asm+0x1a/0x30
[   26.308111]  </TASK>
[   26.308123] 
[   26.315320] Allocated by task 314:
[   26.315497]  kasan_save_stack+0x45/0x70
[   26.315677]  kasan_save_track+0x18/0x40
[   26.315839]  kasan_save_alloc_info+0x3b/0x50
[   26.316043]  __kasan_kmalloc+0xb7/0xc0
[   26.316198]  __kmalloc_cache_noprof+0x189/0x420
[   26.316419]  kasan_atomics+0x95/0x310
[   26.316572]  kunit_try_run_case+0x1a5/0x480
[   26.316779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.316998]  kthread+0x337/0x6f0
[   26.317144]  ret_from_fork+0x116/0x1d0
[   26.317315]  ret_from_fork_asm+0x1a/0x30
[   26.317528] 
[   26.317599] The buggy address belongs to the object at ffff888106195400
[   26.317599]  which belongs to the cache kmalloc-64 of size 64
[   26.318044] The buggy address is located 0 bytes to the right of
[   26.318044]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.318539] 
[   26.318605] The buggy address belongs to the physical page:
[   26.318774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.319100] flags: 0x200000000000000(node=0|zone=2)
[   26.319328] page_type: f5(slab)
[   26.319500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.319768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.319991] page dumped because: kasan: bad access detected
[   26.320217] 
[   26.320307] Memory state around the buggy address:
[   26.320536]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.320859]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.321185] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.321531]                                      ^
[   26.321737]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.321998]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.322335] ==================================================================
[   25.614759] ==================================================================
[   25.615014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   25.615971] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.616737] 
[   25.616841] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.616892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.616906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.616926] Call Trace:
[   25.616939]  <TASK>
[   25.616955]  dump_stack_lvl+0x73/0xb0
[   25.616982]  print_report+0xd1/0x650
[   25.617004]  ? __virt_addr_valid+0x1db/0x2d0
[   25.617027]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.617052]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.617078]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.617103]  kasan_report+0x141/0x180
[   25.617125]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.617155]  __asan_report_load4_noabort+0x18/0x20
[   25.617179]  kasan_atomics_helper+0x4b88/0x5450
[   25.617219]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.617244]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.617268]  ? kasan_atomics+0x152/0x310
[   25.617294]  kasan_atomics+0x1dc/0x310
[   25.617317]  ? __pfx_kasan_atomics+0x10/0x10
[   25.617339]  ? trace_hardirqs_on+0x37/0xe0
[   25.617360]  ? __pfx_read_tsc+0x10/0x10
[   25.617381]  ? ktime_get_ts64+0x86/0x230
[   25.617405]  kunit_try_run_case+0x1a5/0x480
[   25.617430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.617468]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.617490]  ? __kthread_parkme+0x82/0x180
[   25.617511]  ? preempt_count_sub+0x50/0x80
[   25.617534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.617559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.617583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.617607]  kthread+0x337/0x6f0
[   25.617627]  ? trace_preempt_on+0x20/0xc0
[   25.617648]  ? __pfx_kthread+0x10/0x10
[   25.617670]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.617694]  ? calculate_sigpending+0x7b/0xa0
[   25.617719]  ? __pfx_kthread+0x10/0x10
[   25.617741]  ret_from_fork+0x116/0x1d0
[   25.617759]  ? __pfx_kthread+0x10/0x10
[   25.617780]  ret_from_fork_asm+0x1a/0x30
[   25.617810]  </TASK>
[   25.617822] 
[   25.625640] Allocated by task 314:
[   25.625820]  kasan_save_stack+0x45/0x70
[   25.626029]  kasan_save_track+0x18/0x40
[   25.626208]  kasan_save_alloc_info+0x3b/0x50
[   25.626512]  __kasan_kmalloc+0xb7/0xc0
[   25.626716]  __kmalloc_cache_noprof+0x189/0x420
[   25.626928]  kasan_atomics+0x95/0x310
[   25.627103]  kunit_try_run_case+0x1a5/0x480
[   25.627242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.627509]  kthread+0x337/0x6f0
[   25.627666]  ret_from_fork+0x116/0x1d0
[   25.627793]  ret_from_fork_asm+0x1a/0x30
[   25.628001] 
[   25.628069] The buggy address belongs to the object at ffff888106195400
[   25.628069]  which belongs to the cache kmalloc-64 of size 64
[   25.628402] The buggy address is located 0 bytes to the right of
[   25.628402]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.629034] 
[   25.629136] The buggy address belongs to the physical page:
[   25.629444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.629812] flags: 0x200000000000000(node=0|zone=2)
[   25.630070] page_type: f5(slab)
[   25.630345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.630676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.630893] page dumped because: kasan: bad access detected
[   25.631130] 
[   25.631244] Memory state around the buggy address:
[   25.631549]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.631784]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.631989] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.632189]                                      ^
[   25.632408]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.632731]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.633206] ==================================================================
[   25.707676] ==================================================================
[   25.708024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   25.708577] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.708869] 
[   25.708996] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.709083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.709097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.709121] Call Trace:
[   25.709137]  <TASK>
[   25.709153]  dump_stack_lvl+0x73/0xb0
[   25.709322]  print_report+0xd1/0x650
[   25.709348]  ? __virt_addr_valid+0x1db/0x2d0
[   25.709373]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.709400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.709427]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.709470]  kasan_report+0x141/0x180
[   25.709493]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.709524]  kasan_check_range+0x10c/0x1c0
[   25.709575]  __kasan_check_write+0x18/0x20
[   25.709600]  kasan_atomics_helper+0x4a0/0x5450
[   25.709642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.709670]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.709695]  ? kasan_atomics+0x152/0x310
[   25.709723]  kasan_atomics+0x1dc/0x310
[   25.709747]  ? __pfx_kasan_atomics+0x10/0x10
[   25.709771]  ? trace_hardirqs_on+0x37/0xe0
[   25.709794]  ? __pfx_read_tsc+0x10/0x10
[   25.709816]  ? ktime_get_ts64+0x86/0x230
[   25.709846]  kunit_try_run_case+0x1a5/0x480
[   25.709871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.709898]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.709939]  ? __kthread_parkme+0x82/0x180
[   25.709962]  ? preempt_count_sub+0x50/0x80
[   25.709987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.710013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.710039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.710065]  kthread+0x337/0x6f0
[   25.710086]  ? trace_preempt_on+0x20/0xc0
[   25.710128]  ? __pfx_kthread+0x10/0x10
[   25.710228]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.710260]  ? calculate_sigpending+0x7b/0xa0
[   25.710287]  ? __pfx_kthread+0x10/0x10
[   25.710311]  ret_from_fork+0x116/0x1d0
[   25.710358]  ? __pfx_kthread+0x10/0x10
[   25.710382]  ret_from_fork_asm+0x1a/0x30
[   25.710415]  </TASK>
[   25.710429] 
[   25.719199] Allocated by task 314:
[   25.719532]  kasan_save_stack+0x45/0x70
[   25.719739]  kasan_save_track+0x18/0x40
[   25.720191]  kasan_save_alloc_info+0x3b/0x50
[   25.720466]  __kasan_kmalloc+0xb7/0xc0
[   25.720661]  __kmalloc_cache_noprof+0x189/0x420
[   25.720808]  kasan_atomics+0x95/0x310
[   25.720989]  kunit_try_run_case+0x1a5/0x480
[   25.721226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.721551]  kthread+0x337/0x6f0
[   25.722019]  ret_from_fork+0x116/0x1d0
[   25.722248]  ret_from_fork_asm+0x1a/0x30
[   25.722424] 
[   25.722547] The buggy address belongs to the object at ffff888106195400
[   25.722547]  which belongs to the cache kmalloc-64 of size 64
[   25.723107] The buggy address is located 0 bytes to the right of
[   25.723107]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.723829] 
[   25.723903] The buggy address belongs to the physical page:
[   25.724068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.724642] flags: 0x200000000000000(node=0|zone=2)
[   25.725015] page_type: f5(slab)
[   25.725166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.725601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.725970] page dumped because: kasan: bad access detected
[   25.726316] 
[   25.726484] Memory state around the buggy address:
[   25.727244]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.727490]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.727733] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.728020]                                      ^
[   25.728488]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.729119]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.730332] ==================================================================
[   26.029322] ==================================================================
[   26.029668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   26.029991] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.030362] 
[   26.030443] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.030501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.030516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.030537] Call Trace:
[   26.030551]  <TASK>
[   26.030567]  dump_stack_lvl+0x73/0xb0
[   26.030594]  print_report+0xd1/0x650
[   26.030616]  ? __virt_addr_valid+0x1db/0x2d0
[   26.030640]  ? kasan_atomics_helper+0xc70/0x5450
[   26.030666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.030692]  ? kasan_atomics_helper+0xc70/0x5450
[   26.030718]  kasan_report+0x141/0x180
[   26.030742]  ? kasan_atomics_helper+0xc70/0x5450
[   26.030772]  kasan_check_range+0x10c/0x1c0
[   26.030797]  __kasan_check_write+0x18/0x20
[   26.030821]  kasan_atomics_helper+0xc70/0x5450
[   26.030849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.030875]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.030901]  ? kasan_atomics+0x152/0x310
[   26.030927]  kasan_atomics+0x1dc/0x310
[   26.030951]  ? __pfx_kasan_atomics+0x10/0x10
[   26.030974]  ? trace_hardirqs_on+0x37/0xe0
[   26.030997]  ? __pfx_read_tsc+0x10/0x10
[   26.031020]  ? ktime_get_ts64+0x86/0x230
[   26.031045]  kunit_try_run_case+0x1a5/0x480
[   26.031070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.031096]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.031119]  ? __kthread_parkme+0x82/0x180
[   26.031141]  ? preempt_count_sub+0x50/0x80
[   26.031165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.031388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.031427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.031467]  kthread+0x337/0x6f0
[   26.031489]  ? trace_preempt_on+0x20/0xc0
[   26.031513]  ? __pfx_kthread+0x10/0x10
[   26.031536]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.031562]  ? calculate_sigpending+0x7b/0xa0
[   26.031587]  ? __pfx_kthread+0x10/0x10
[   26.031611]  ret_from_fork+0x116/0x1d0
[   26.031632]  ? __pfx_kthread+0x10/0x10
[   26.031654]  ret_from_fork_asm+0x1a/0x30
[   26.031686]  </TASK>
[   26.031698] 
[   26.038950] Allocated by task 314:
[   26.039125]  kasan_save_stack+0x45/0x70
[   26.039385]  kasan_save_track+0x18/0x40
[   26.039571]  kasan_save_alloc_info+0x3b/0x50
[   26.039715]  __kasan_kmalloc+0xb7/0xc0
[   26.039844]  __kmalloc_cache_noprof+0x189/0x420
[   26.039994]  kasan_atomics+0x95/0x310
[   26.040120]  kunit_try_run_case+0x1a5/0x480
[   26.040311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.040571]  kthread+0x337/0x6f0
[   26.040740]  ret_from_fork+0x116/0x1d0
[   26.040922]  ret_from_fork_asm+0x1a/0x30
[   26.041113] 
[   26.041208] The buggy address belongs to the object at ffff888106195400
[   26.041208]  which belongs to the cache kmalloc-64 of size 64
[   26.041744] The buggy address is located 0 bytes to the right of
[   26.041744]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.042336] 
[   26.042418] The buggy address belongs to the physical page:
[   26.042642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.042900] flags: 0x200000000000000(node=0|zone=2)
[   26.043059] page_type: f5(slab)
[   26.043194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.043541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.043876] page dumped because: kasan: bad access detected
[   26.044107] 
[   26.044203] Memory state around the buggy address:
[   26.044366]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.044666]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.044958] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.045287]                                      ^
[   26.045482]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.045736]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.046021] ==================================================================
[   26.356828] ==================================================================
[   26.357071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   26.357304] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.357540] 
[   26.357620] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.357666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.357680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.357703] Call Trace:
[   26.357717]  <TASK>
[   26.357732]  dump_stack_lvl+0x73/0xb0
[   26.357757]  print_report+0xd1/0x650
[   26.357780]  ? __virt_addr_valid+0x1db/0x2d0
[   26.357804]  ? kasan_atomics_helper+0x1467/0x5450
[   26.357829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.357864]  ? kasan_atomics_helper+0x1467/0x5450
[   26.357890]  kasan_report+0x141/0x180
[   26.357914]  ? kasan_atomics_helper+0x1467/0x5450
[   26.357944]  kasan_check_range+0x10c/0x1c0
[   26.357969]  __kasan_check_write+0x18/0x20
[   26.357994]  kasan_atomics_helper+0x1467/0x5450
[   26.358021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.358048]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.358074]  ? kasan_atomics+0x152/0x310
[   26.358100]  kasan_atomics+0x1dc/0x310
[   26.358124]  ? __pfx_kasan_atomics+0x10/0x10
[   26.358147]  ? trace_hardirqs_on+0x37/0xe0
[   26.358170]  ? __pfx_read_tsc+0x10/0x10
[   26.358192]  ? ktime_get_ts64+0x86/0x230
[   26.358216]  kunit_try_run_case+0x1a5/0x480
[   26.358242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.358268]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.358291]  ? __kthread_parkme+0x82/0x180
[   26.358313]  ? preempt_count_sub+0x50/0x80
[   26.358338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.358363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.358407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.358433]  kthread+0x337/0x6f0
[   26.358465]  ? trace_preempt_on+0x20/0xc0
[   26.358490]  ? __pfx_kthread+0x10/0x10
[   26.358512]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.358538]  ? calculate_sigpending+0x7b/0xa0
[   26.358563]  ? __pfx_kthread+0x10/0x10
[   26.358587]  ret_from_fork+0x116/0x1d0
[   26.358607]  ? __pfx_kthread+0x10/0x10
[   26.358630]  ret_from_fork_asm+0x1a/0x30
[   26.358663]  </TASK>
[   26.358675] 
[   26.366373] Allocated by task 314:
[   26.366507]  kasan_save_stack+0x45/0x70
[   26.366648]  kasan_save_track+0x18/0x40
[   26.366778]  kasan_save_alloc_info+0x3b/0x50
[   26.366920]  __kasan_kmalloc+0xb7/0xc0
[   26.367051]  __kmalloc_cache_noprof+0x189/0x420
[   26.367201]  kasan_atomics+0x95/0x310
[   26.367327]  kunit_try_run_case+0x1a5/0x480
[   26.367486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.367735]  kthread+0x337/0x6f0
[   26.367901]  ret_from_fork+0x116/0x1d0
[   26.368085]  ret_from_fork_asm+0x1a/0x30
[   26.368279] 
[   26.368370] The buggy address belongs to the object at ffff888106195400
[   26.368370]  which belongs to the cache kmalloc-64 of size 64
[   26.369002] The buggy address is located 0 bytes to the right of
[   26.369002]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.369897] 
[   26.370008] The buggy address belongs to the physical page:
[   26.370176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.370411] flags: 0x200000000000000(node=0|zone=2)
[   26.370578] page_type: f5(slab)
[   26.370692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.370920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.371326] page dumped because: kasan: bad access detected
[   26.371582] 
[   26.371672] Memory state around the buggy address:
[   26.371888]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.372197]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.372517] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.372831]                                      ^
[   26.373047]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.373366]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.373588] ==================================================================
[   26.624089] ==================================================================
[   26.624446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   26.624724] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.625052] 
[   26.625153] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.625218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.625233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.625255] Call Trace:
[   26.625269]  <TASK>
[   26.625286]  dump_stack_lvl+0x73/0xb0
[   26.625312]  print_report+0xd1/0x650
[   26.625335]  ? __virt_addr_valid+0x1db/0x2d0
[   26.625359]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.625385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.625411]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.625437]  kasan_report+0x141/0x180
[   26.625469]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.625500]  kasan_check_range+0x10c/0x1c0
[   26.625525]  __kasan_check_write+0x18/0x20
[   26.625549]  kasan_atomics_helper+0x1c18/0x5450
[   26.625576]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.625602]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.625628]  ? kasan_atomics+0x152/0x310
[   26.625654]  kasan_atomics+0x1dc/0x310
[   26.625677]  ? __pfx_kasan_atomics+0x10/0x10
[   26.625700]  ? trace_hardirqs_on+0x37/0xe0
[   26.625723]  ? __pfx_read_tsc+0x10/0x10
[   26.625745]  ? ktime_get_ts64+0x86/0x230
[   26.625770]  kunit_try_run_case+0x1a5/0x480
[   26.625794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.625821]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.625852]  ? __kthread_parkme+0x82/0x180
[   26.625873]  ? preempt_count_sub+0x50/0x80
[   26.625897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.625923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.625947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.625974]  kthread+0x337/0x6f0
[   26.625995]  ? trace_preempt_on+0x20/0xc0
[   26.626018]  ? __pfx_kthread+0x10/0x10
[   26.626040]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.626065]  ? calculate_sigpending+0x7b/0xa0
[   26.626090]  ? __pfx_kthread+0x10/0x10
[   26.626113]  ret_from_fork+0x116/0x1d0
[   26.626133]  ? __pfx_kthread+0x10/0x10
[   26.626156]  ret_from_fork_asm+0x1a/0x30
[   26.626208]  </TASK>
[   26.626220] 
[   26.633128] Allocated by task 314:
[   26.633275]  kasan_save_stack+0x45/0x70
[   26.633419]  kasan_save_track+0x18/0x40
[   26.633557]  kasan_save_alloc_info+0x3b/0x50
[   26.633724]  __kasan_kmalloc+0xb7/0xc0
[   26.633916]  __kmalloc_cache_noprof+0x189/0x420
[   26.634126]  kasan_atomics+0x95/0x310
[   26.634335]  kunit_try_run_case+0x1a5/0x480
[   26.634547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.634788]  kthread+0x337/0x6f0
[   26.634954]  ret_from_fork+0x116/0x1d0
[   26.635142]  ret_from_fork_asm+0x1a/0x30
[   26.635351] 
[   26.635442] The buggy address belongs to the object at ffff888106195400
[   26.635442]  which belongs to the cache kmalloc-64 of size 64
[   26.635961] The buggy address is located 0 bytes to the right of
[   26.635961]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.636350] 
[   26.636443] The buggy address belongs to the physical page:
[   26.636702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.637033] flags: 0x200000000000000(node=0|zone=2)
[   26.637261] page_type: f5(slab)
[   26.637411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.637704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.638009] page dumped because: kasan: bad access detected
[   26.638274] 
[   26.638355] Memory state around the buggy address:
[   26.638559]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.638831]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.639101] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.639402]                                      ^
[   26.639605]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.639879]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.640165] ==================================================================
[   26.693586] ==================================================================
[   26.693929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   26.694424] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.694788] 
[   26.694895] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.694942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.694956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.694978] Call Trace:
[   26.695012]  <TASK>
[   26.695028]  dump_stack_lvl+0x73/0xb0
[   26.695070]  print_report+0xd1/0x650
[   26.695107]  ? __virt_addr_valid+0x1db/0x2d0
[   26.695157]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.695223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.695250]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.695277]  kasan_report+0x141/0x180
[   26.695300]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.695331]  kasan_check_range+0x10c/0x1c0
[   26.695356]  __kasan_check_write+0x18/0x20
[   26.695380]  kasan_atomics_helper+0x1e12/0x5450
[   26.695407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.695434]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.695467]  ? kasan_atomics+0x152/0x310
[   26.695495]  kasan_atomics+0x1dc/0x310
[   26.695517]  ? __pfx_kasan_atomics+0x10/0x10
[   26.695541]  ? trace_hardirqs_on+0x37/0xe0
[   26.695563]  ? __pfx_read_tsc+0x10/0x10
[   26.695587]  ? ktime_get_ts64+0x86/0x230
[   26.695612]  kunit_try_run_case+0x1a5/0x480
[   26.695638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.695665]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.695688]  ? __kthread_parkme+0x82/0x180
[   26.695709]  ? preempt_count_sub+0x50/0x80
[   26.695733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.695759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.695783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.695809]  kthread+0x337/0x6f0
[   26.695830]  ? trace_preempt_on+0x20/0xc0
[   26.695872]  ? __pfx_kthread+0x10/0x10
[   26.695895]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.695920]  ? calculate_sigpending+0x7b/0xa0
[   26.695945]  ? __pfx_kthread+0x10/0x10
[   26.695968]  ret_from_fork+0x116/0x1d0
[   26.695988]  ? __pfx_kthread+0x10/0x10
[   26.696010]  ret_from_fork_asm+0x1a/0x30
[   26.696042]  </TASK>
[   26.696055] 
[   26.703366] Allocated by task 314:
[   26.703514]  kasan_save_stack+0x45/0x70
[   26.703712]  kasan_save_track+0x18/0x40
[   26.703897]  kasan_save_alloc_info+0x3b/0x50
[   26.704064]  __kasan_kmalloc+0xb7/0xc0
[   26.704220]  __kmalloc_cache_noprof+0x189/0x420
[   26.704371]  kasan_atomics+0x95/0x310
[   26.704560]  kunit_try_run_case+0x1a5/0x480
[   26.704785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.705036]  kthread+0x337/0x6f0
[   26.705247]  ret_from_fork+0x116/0x1d0
[   26.705429]  ret_from_fork_asm+0x1a/0x30
[   26.705638] 
[   26.705718] The buggy address belongs to the object at ffff888106195400
[   26.705718]  which belongs to the cache kmalloc-64 of size 64
[   26.706217] The buggy address is located 0 bytes to the right of
[   26.706217]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.706729] 
[   26.706820] The buggy address belongs to the physical page:
[   26.707061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.707416] flags: 0x200000000000000(node=0|zone=2)
[   26.707654] page_type: f5(slab)
[   26.707803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.708091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.708479] page dumped because: kasan: bad access detected
[   26.708721] 
[   26.708834] Memory state around the buggy address:
[   26.709096]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.709506]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.709819] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.710144]                                      ^
[   26.710389]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.710709]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.711013] ==================================================================
[   26.436898] ==================================================================
[   26.437351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   26.437951] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.438550] 
[   26.438878] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.439014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.439033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.439056] Call Trace:
[   26.439074]  <TASK>
[   26.439092]  dump_stack_lvl+0x73/0xb0
[   26.439122]  print_report+0xd1/0x650
[   26.439146]  ? __virt_addr_valid+0x1db/0x2d0
[   26.439170]  ? kasan_atomics_helper+0x164f/0x5450
[   26.439196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.439223]  ? kasan_atomics_helper+0x164f/0x5450
[   26.439250]  kasan_report+0x141/0x180
[   26.439272]  ? kasan_atomics_helper+0x164f/0x5450
[   26.439303]  kasan_check_range+0x10c/0x1c0
[   26.439327]  __kasan_check_write+0x18/0x20
[   26.439352]  kasan_atomics_helper+0x164f/0x5450
[   26.439379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.439406]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.439432]  ? kasan_atomics+0x152/0x310
[   26.439471]  kasan_atomics+0x1dc/0x310
[   26.439495]  ? __pfx_kasan_atomics+0x10/0x10
[   26.439518]  ? trace_hardirqs_on+0x37/0xe0
[   26.439542]  ? __pfx_read_tsc+0x10/0x10
[   26.439564]  ? ktime_get_ts64+0x86/0x230
[   26.439590]  kunit_try_run_case+0x1a5/0x480
[   26.439615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.439641]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.439664]  ? __kthread_parkme+0x82/0x180
[   26.439687]  ? preempt_count_sub+0x50/0x80
[   26.439711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.439737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.439762]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.439788]  kthread+0x337/0x6f0
[   26.439809]  ? trace_preempt_on+0x20/0xc0
[   26.439832]  ? __pfx_kthread+0x10/0x10
[   26.439854]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.439879]  ? calculate_sigpending+0x7b/0xa0
[   26.439904]  ? __pfx_kthread+0x10/0x10
[   26.439927]  ret_from_fork+0x116/0x1d0
[   26.439948]  ? __pfx_kthread+0x10/0x10
[   26.439970]  ret_from_fork_asm+0x1a/0x30
[   26.440002]  </TASK>
[   26.440015] 
[   26.450511] Allocated by task 314:
[   26.450754]  kasan_save_stack+0x45/0x70
[   26.450956]  kasan_save_track+0x18/0x40
[   26.451093]  kasan_save_alloc_info+0x3b/0x50
[   26.451298]  __kasan_kmalloc+0xb7/0xc0
[   26.451490]  __kmalloc_cache_noprof+0x189/0x420
[   26.451668]  kasan_atomics+0x95/0x310
[   26.451832]  kunit_try_run_case+0x1a5/0x480
[   26.452018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.452655]  kthread+0x337/0x6f0
[   26.452813]  ret_from_fork+0x116/0x1d0
[   26.452945]  ret_from_fork_asm+0x1a/0x30
[   26.453302] 
[   26.453394] The buggy address belongs to the object at ffff888106195400
[   26.453394]  which belongs to the cache kmalloc-64 of size 64
[   26.454110] The buggy address is located 0 bytes to the right of
[   26.454110]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.454739] 
[   26.454967] The buggy address belongs to the physical page:
[   26.455266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.455619] flags: 0x200000000000000(node=0|zone=2)
[   26.455891] page_type: f5(slab)
[   26.456056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.456585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.456987] page dumped because: kasan: bad access detected
[   26.457192] 
[   26.457473] Memory state around the buggy address:
[   26.457800]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.458099]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.458497] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.458902]                                      ^
[   26.459218]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.459521]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.459935] ==================================================================
[   25.567717] ==================================================================
[   25.568876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   25.569338] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.569590] 
[   25.569983] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.570039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.570053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.570078] Call Trace:
[   25.570092]  <TASK>
[   25.570109]  dump_stack_lvl+0x73/0xb0
[   25.570296]  print_report+0xd1/0x650
[   25.570332]  ? __virt_addr_valid+0x1db/0x2d0
[   25.570357]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.570383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.570409]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.570434]  kasan_report+0x141/0x180
[   25.570472]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.570504]  __asan_report_load4_noabort+0x18/0x20
[   25.570529]  kasan_atomics_helper+0x4bbc/0x5450
[   25.570555]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.570581]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.570605]  ? kasan_atomics+0x152/0x310
[   25.570631]  kasan_atomics+0x1dc/0x310
[   25.570654]  ? __pfx_kasan_atomics+0x10/0x10
[   25.570676]  ? trace_hardirqs_on+0x37/0xe0
[   25.570699]  ? __pfx_read_tsc+0x10/0x10
[   25.570721]  ? ktime_get_ts64+0x86/0x230
[   25.570746]  kunit_try_run_case+0x1a5/0x480
[   25.570772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.570797]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.570821]  ? __kthread_parkme+0x82/0x180
[   25.570842]  ? preempt_count_sub+0x50/0x80
[   25.570866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.570891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.570915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.570939]  kthread+0x337/0x6f0
[   25.570960]  ? trace_preempt_on+0x20/0xc0
[   25.570982]  ? __pfx_kthread+0x10/0x10
[   25.571003]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.571027]  ? calculate_sigpending+0x7b/0xa0
[   25.571052]  ? __pfx_kthread+0x10/0x10
[   25.571074]  ret_from_fork+0x116/0x1d0
[   25.571093]  ? __pfx_kthread+0x10/0x10
[   25.571114]  ret_from_fork_asm+0x1a/0x30
[   25.571146]  </TASK>
[   25.571158] 
[   25.582758] Allocated by task 314:
[   25.583117]  kasan_save_stack+0x45/0x70
[   25.583546]  kasan_save_track+0x18/0x40
[   25.583824]  kasan_save_alloc_info+0x3b/0x50
[   25.583998]  __kasan_kmalloc+0xb7/0xc0
[   25.584203]  __kmalloc_cache_noprof+0x189/0x420
[   25.584675]  kasan_atomics+0x95/0x310
[   25.584822]  kunit_try_run_case+0x1a5/0x480
[   25.585030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.585583]  kthread+0x337/0x6f0
[   25.585751]  ret_from_fork+0x116/0x1d0
[   25.585963]  ret_from_fork_asm+0x1a/0x30
[   25.586595] 
[   25.586675] The buggy address belongs to the object at ffff888106195400
[   25.586675]  which belongs to the cache kmalloc-64 of size 64
[   25.587622] The buggy address is located 0 bytes to the right of
[   25.587622]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.588146] 
[   25.588525] The buggy address belongs to the physical page:
[   25.588862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.589364] flags: 0x200000000000000(node=0|zone=2)
[   25.589615] page_type: f5(slab)
[   25.589765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.590093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.590406] page dumped because: kasan: bad access detected
[   25.590644] 
[   25.590720] Memory state around the buggy address:
[   25.590925]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.591226]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.591751] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.592037]                                      ^
[   25.592335]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.592610]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.592958] ==================================================================
[   26.119394] ==================================================================
[   26.119751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   26.120097] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.120784] 
[   26.120886] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.120936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.120951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.120974] Call Trace:
[   26.120990]  <TASK>
[   26.121007]  dump_stack_lvl+0x73/0xb0
[   26.121035]  print_report+0xd1/0x650
[   26.121059]  ? __virt_addr_valid+0x1db/0x2d0
[   26.121084]  ? kasan_atomics_helper+0xf10/0x5450
[   26.121111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.121139]  ? kasan_atomics_helper+0xf10/0x5450
[   26.121167]  kasan_report+0x141/0x180
[   26.121192]  ? kasan_atomics_helper+0xf10/0x5450
[   26.121410]  kasan_check_range+0x10c/0x1c0
[   26.121438]  __kasan_check_write+0x18/0x20
[   26.121479]  kasan_atomics_helper+0xf10/0x5450
[   26.121508]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.121536]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.121563]  ? kasan_atomics+0x152/0x310
[   26.121592]  kasan_atomics+0x1dc/0x310
[   26.121617]  ? __pfx_kasan_atomics+0x10/0x10
[   26.121641]  ? trace_hardirqs_on+0x37/0xe0
[   26.121665]  ? __pfx_read_tsc+0x10/0x10
[   26.121689]  ? ktime_get_ts64+0x86/0x230
[   26.121716]  kunit_try_run_case+0x1a5/0x480
[   26.121743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.121771]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.121796]  ? __kthread_parkme+0x82/0x180
[   26.121819]  ? preempt_count_sub+0x50/0x80
[   26.121852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.121880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.121907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.121935]  kthread+0x337/0x6f0
[   26.121957]  ? trace_preempt_on+0x20/0xc0
[   26.121981]  ? __pfx_kthread+0x10/0x10
[   26.122004]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.122032]  ? calculate_sigpending+0x7b/0xa0
[   26.122058]  ? __pfx_kthread+0x10/0x10
[   26.122083]  ret_from_fork+0x116/0x1d0
[   26.122104]  ? __pfx_kthread+0x10/0x10
[   26.122127]  ret_from_fork_asm+0x1a/0x30
[   26.122161]  </TASK>
[   26.122175] 
[   26.134418] Allocated by task 314:
[   26.134782]  kasan_save_stack+0x45/0x70
[   26.135170]  kasan_save_track+0x18/0x40
[   26.135632]  kasan_save_alloc_info+0x3b/0x50
[   26.136030]  __kasan_kmalloc+0xb7/0xc0
[   26.136385]  __kmalloc_cache_noprof+0x189/0x420
[   26.136793]  kasan_atomics+0x95/0x310
[   26.137126]  kunit_try_run_case+0x1a5/0x480
[   26.137564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.138169]  kthread+0x337/0x6f0
[   26.138508]  ret_from_fork+0x116/0x1d0
[   26.138867]  ret_from_fork_asm+0x1a/0x30
[   26.139225] 
[   26.139379] The buggy address belongs to the object at ffff888106195400
[   26.139379]  which belongs to the cache kmalloc-64 of size 64
[   26.139770] The buggy address is located 0 bytes to the right of
[   26.139770]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.140121] 
[   26.140189] The buggy address belongs to the physical page:
[   26.140395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.140660] flags: 0x200000000000000(node=0|zone=2)
[   26.140875] page_type: f5(slab)
[   26.141032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.141295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.141651] page dumped because: kasan: bad access detected
[   26.141892] 
[   26.141963] Memory state around the buggy address:
[   26.142180]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.142453]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.142704] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.143016]                                      ^
[   26.143187]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.143467]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.143692] ==================================================================
[   26.755771] ==================================================================
[   26.756673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   26.757643] Read of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.758622] 
[   26.758893] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.758947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.758963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.758994] Call Trace:
[   26.759014]  <TASK>
[   26.759031]  dump_stack_lvl+0x73/0xb0
[   26.759061]  print_report+0xd1/0x650
[   26.759085]  ? __virt_addr_valid+0x1db/0x2d0
[   26.759110]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.759137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.759164]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.759190]  kasan_report+0x141/0x180
[   26.759214]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.759245]  __asan_report_load8_noabort+0x18/0x20
[   26.759271]  kasan_atomics_helper+0x4f71/0x5450
[   26.759298]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.759324]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.759350]  ? kasan_atomics+0x152/0x310
[   26.759377]  kasan_atomics+0x1dc/0x310
[   26.759401]  ? __pfx_kasan_atomics+0x10/0x10
[   26.759423]  ? trace_hardirqs_on+0x37/0xe0
[   26.759446]  ? __pfx_read_tsc+0x10/0x10
[   26.759478]  ? ktime_get_ts64+0x86/0x230
[   26.759503]  kunit_try_run_case+0x1a5/0x480
[   26.759530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.759556]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.759580]  ? __kthread_parkme+0x82/0x180
[   26.759602]  ? preempt_count_sub+0x50/0x80
[   26.759627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.759653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.759678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.759703]  kthread+0x337/0x6f0
[   26.759724]  ? trace_preempt_on+0x20/0xc0
[   26.759747]  ? __pfx_kthread+0x10/0x10
[   26.759769]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.759794]  ? calculate_sigpending+0x7b/0xa0
[   26.759820]  ? __pfx_kthread+0x10/0x10
[   26.759843]  ret_from_fork+0x116/0x1d0
[   26.759863]  ? __pfx_kthread+0x10/0x10
[   26.759885]  ret_from_fork_asm+0x1a/0x30
[   26.759918]  </TASK>
[   26.759929] 
[   26.772716] Allocated by task 314:
[   26.772847]  kasan_save_stack+0x45/0x70
[   26.772991]  kasan_save_track+0x18/0x40
[   26.773122]  kasan_save_alloc_info+0x3b/0x50
[   26.773291]  __kasan_kmalloc+0xb7/0xc0
[   26.773420]  __kmalloc_cache_noprof+0x189/0x420
[   26.773606]  kasan_atomics+0x95/0x310
[   26.773794]  kunit_try_run_case+0x1a5/0x480
[   26.774005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.774318]  kthread+0x337/0x6f0
[   26.774467]  ret_from_fork+0x116/0x1d0
[   26.774596]  ret_from_fork_asm+0x1a/0x30
[   26.774760] 
[   26.774852] The buggy address belongs to the object at ffff888106195400
[   26.774852]  which belongs to the cache kmalloc-64 of size 64
[   26.775463] The buggy address is located 0 bytes to the right of
[   26.775463]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.775947] 
[   26.776039] The buggy address belongs to the physical page:
[   26.776282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.776529] flags: 0x200000000000000(node=0|zone=2)
[   26.776688] page_type: f5(slab)
[   26.776845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.777174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.777532] page dumped because: kasan: bad access detected
[   26.777697] 
[   26.777760] Memory state around the buggy address:
[   26.778021]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.778419]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.778746] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.779026]                                      ^
[   26.779225]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.779546]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.779794] ==================================================================
[   26.797205] ==================================================================
[   26.797644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   26.797888] Read of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.798109] 
[   26.798202] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.798248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.798261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.798282] Call Trace:
[   26.798295]  <TASK>
[   26.798311]  dump_stack_lvl+0x73/0xb0
[   26.798336]  print_report+0xd1/0x650
[   26.798359]  ? __virt_addr_valid+0x1db/0x2d0
[   26.798383]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.798408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.798445]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.798483]  kasan_report+0x141/0x180
[   26.798505]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.798537]  __asan_report_load8_noabort+0x18/0x20
[   26.798562]  kasan_atomics_helper+0x4f98/0x5450
[   26.798590]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.798617]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.798642]  ? kasan_atomics+0x152/0x310
[   26.798669]  kasan_atomics+0x1dc/0x310
[   26.798693]  ? __pfx_kasan_atomics+0x10/0x10
[   26.798716]  ? trace_hardirqs_on+0x37/0xe0
[   26.798742]  ? __pfx_read_tsc+0x10/0x10
[   26.798767]  ? ktime_get_ts64+0x86/0x230
[   26.798792]  kunit_try_run_case+0x1a5/0x480
[   26.798818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.798844]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.798867]  ? __kthread_parkme+0x82/0x180
[   26.798889]  ? preempt_count_sub+0x50/0x80
[   26.798913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.798939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.798964]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.798989]  kthread+0x337/0x6f0
[   26.799009]  ? trace_preempt_on+0x20/0xc0
[   26.799033]  ? __pfx_kthread+0x10/0x10
[   26.799055]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.799080]  ? calculate_sigpending+0x7b/0xa0
[   26.799104]  ? __pfx_kthread+0x10/0x10
[   26.799128]  ret_from_fork+0x116/0x1d0
[   26.799148]  ? __pfx_kthread+0x10/0x10
[   26.799171]  ret_from_fork_asm+0x1a/0x30
[   26.799202]  </TASK>
[   26.799213] 
[   26.806297] Allocated by task 314:
[   26.806476]  kasan_save_stack+0x45/0x70
[   26.806641]  kasan_save_track+0x18/0x40
[   26.806824]  kasan_save_alloc_info+0x3b/0x50
[   26.806999]  __kasan_kmalloc+0xb7/0xc0
[   26.807187]  __kmalloc_cache_noprof+0x189/0x420
[   26.807368]  kasan_atomics+0x95/0x310
[   26.807550]  kunit_try_run_case+0x1a5/0x480
[   26.807751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.807952]  kthread+0x337/0x6f0
[   26.808117]  ret_from_fork+0x116/0x1d0
[   26.808308]  ret_from_fork_asm+0x1a/0x30
[   26.808497] 
[   26.808574] The buggy address belongs to the object at ffff888106195400
[   26.808574]  which belongs to the cache kmalloc-64 of size 64
[   26.809005] The buggy address is located 0 bytes to the right of
[   26.809005]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.809469] 
[   26.809535] The buggy address belongs to the physical page:
[   26.809701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.809941] flags: 0x200000000000000(node=0|zone=2)
[   26.810096] page_type: f5(slab)
[   26.810212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.810437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.810696] page dumped because: kasan: bad access detected
[   26.810942] 
[   26.811041] Memory state around the buggy address:
[   26.811344]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.811670]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.811980] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.812422]                                      ^
[   26.812654]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.812964]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.813372] ==================================================================
[   25.909847] ==================================================================
[   25.910091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   25.910539] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.910869] 
[   25.910972] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.911018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.911032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.911067] Call Trace:
[   25.911084]  <TASK>
[   25.911101]  dump_stack_lvl+0x73/0xb0
[   25.911128]  print_report+0xd1/0x650
[   25.911151]  ? __virt_addr_valid+0x1db/0x2d0
[   25.911174]  ? kasan_atomics_helper+0x8f9/0x5450
[   25.911200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.911227]  ? kasan_atomics_helper+0x8f9/0x5450
[   25.911253]  kasan_report+0x141/0x180
[   25.911275]  ? kasan_atomics_helper+0x8f9/0x5450
[   25.911306]  kasan_check_range+0x10c/0x1c0
[   25.911331]  __kasan_check_write+0x18/0x20
[   25.911355]  kasan_atomics_helper+0x8f9/0x5450
[   25.911382]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.911408]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.911433]  ? kasan_atomics+0x152/0x310
[   25.911471]  kasan_atomics+0x1dc/0x310
[   25.911496]  ? __pfx_kasan_atomics+0x10/0x10
[   25.911519]  ? trace_hardirqs_on+0x37/0xe0
[   25.911541]  ? __pfx_read_tsc+0x10/0x10
[   25.911564]  ? ktime_get_ts64+0x86/0x230
[   25.911588]  kunit_try_run_case+0x1a5/0x480
[   25.911614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.911640]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.911664]  ? __kthread_parkme+0x82/0x180
[   25.911687]  ? preempt_count_sub+0x50/0x80
[   25.911711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.911738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.911764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.911793]  kthread+0x337/0x6f0
[   25.911814]  ? trace_preempt_on+0x20/0xc0
[   25.911838]  ? __pfx_kthread+0x10/0x10
[   25.911860]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.911886]  ? calculate_sigpending+0x7b/0xa0
[   25.911911]  ? __pfx_kthread+0x10/0x10
[   25.911933]  ret_from_fork+0x116/0x1d0
[   25.911953]  ? __pfx_kthread+0x10/0x10
[   25.911976]  ret_from_fork_asm+0x1a/0x30
[   25.912009]  </TASK>
[   25.912034] 
[   25.921168] Allocated by task 314:
[   25.921356]  kasan_save_stack+0x45/0x70
[   25.921568]  kasan_save_track+0x18/0x40
[   25.921740]  kasan_save_alloc_info+0x3b/0x50
[   25.921932]  __kasan_kmalloc+0xb7/0xc0
[   25.922106]  __kmalloc_cache_noprof+0x189/0x420
[   25.922288]  kasan_atomics+0x95/0x310
[   25.923083]  kunit_try_run_case+0x1a5/0x480
[   25.924123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.924413]  kthread+0x337/0x6f0
[   25.924597]  ret_from_fork+0x116/0x1d0
[   25.924784]  ret_from_fork_asm+0x1a/0x30
[   25.924958] 
[   25.925064] The buggy address belongs to the object at ffff888106195400
[   25.925064]  which belongs to the cache kmalloc-64 of size 64
[   25.925576] The buggy address is located 0 bytes to the right of
[   25.925576]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.926092] 
[   25.926235] The buggy address belongs to the physical page:
[   25.926482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.926790] flags: 0x200000000000000(node=0|zone=2)
[   25.927654] page_type: f5(slab)
[   25.927786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.928009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.928704] page dumped because: kasan: bad access detected
[   25.929509] 
[   25.929957] Memory state around the buggy address:
[   25.930781]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.931951]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.933125] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.933630]                                      ^
[   25.933792]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.934011]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.934679] ==================================================================
[   25.863226] ==================================================================
[   25.863817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   25.864468] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.865387] 
[   25.865644] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.865699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.865816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.865845] Call Trace:
[   25.865859]  <TASK>
[   25.865876]  dump_stack_lvl+0x73/0xb0
[   25.865908]  print_report+0xd1/0x650
[   25.865932]  ? __virt_addr_valid+0x1db/0x2d0
[   25.865965]  ? kasan_atomics_helper+0x7c7/0x5450
[   25.865991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.866017]  ? kasan_atomics_helper+0x7c7/0x5450
[   25.866043]  kasan_report+0x141/0x180
[   25.866067]  ? kasan_atomics_helper+0x7c7/0x5450
[   25.866098]  kasan_check_range+0x10c/0x1c0
[   25.866123]  __kasan_check_write+0x18/0x20
[   25.866148]  kasan_atomics_helper+0x7c7/0x5450
[   25.866174]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.866201]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.866227]  ? kasan_atomics+0x152/0x310
[   25.866253]  kasan_atomics+0x1dc/0x310
[   25.866277]  ? __pfx_kasan_atomics+0x10/0x10
[   25.866300]  ? trace_hardirqs_on+0x37/0xe0
[   25.866323]  ? __pfx_read_tsc+0x10/0x10
[   25.866345]  ? ktime_get_ts64+0x86/0x230
[   25.866399]  kunit_try_run_case+0x1a5/0x480
[   25.866437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.866484]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.866507]  ? __kthread_parkme+0x82/0x180
[   25.866529]  ? preempt_count_sub+0x50/0x80
[   25.866554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.866580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.866605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.866631]  kthread+0x337/0x6f0
[   25.866653]  ? trace_preempt_on+0x20/0xc0
[   25.866676]  ? __pfx_kthread+0x10/0x10
[   25.866699]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.866724]  ? calculate_sigpending+0x7b/0xa0
[   25.866750]  ? __pfx_kthread+0x10/0x10
[   25.866773]  ret_from_fork+0x116/0x1d0
[   25.866794]  ? __pfx_kthread+0x10/0x10
[   25.866816]  ret_from_fork_asm+0x1a/0x30
[   25.866848]  </TASK>
[   25.866862] 
[   25.878015] Allocated by task 314:
[   25.878151]  kasan_save_stack+0x45/0x70
[   25.878797]  kasan_save_track+0x18/0x40
[   25.878994]  kasan_save_alloc_info+0x3b/0x50
[   25.879146]  __kasan_kmalloc+0xb7/0xc0
[   25.879279]  __kmalloc_cache_noprof+0x189/0x420
[   25.879429]  kasan_atomics+0x95/0x310
[   25.879568]  kunit_try_run_case+0x1a5/0x480
[   25.879709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.879882]  kthread+0x337/0x6f0
[   25.880003]  ret_from_fork+0x116/0x1d0
[   25.880131]  ret_from_fork_asm+0x1a/0x30
[   25.880265] 
[   25.880333] The buggy address belongs to the object at ffff888106195400
[   25.880333]  which belongs to the cache kmalloc-64 of size 64
[   25.881162] The buggy address is located 0 bytes to the right of
[   25.881162]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.882221] 
[   25.882508] The buggy address belongs to the physical page:
[   25.883027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.883890] flags: 0x200000000000000(node=0|zone=2)
[   25.884548] page_type: f5(slab)
[   25.885043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.885698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.886149] page dumped because: kasan: bad access detected
[   25.886642] 
[   25.886739] Memory state around the buggy address:
[   25.887073]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.887651]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.887963] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.888443]                                      ^
[   25.888797]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.889083]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.889786] ==================================================================
[   26.555950] ==================================================================
[   26.556426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   26.556885] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.557177] 
[   26.557287] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.557335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.557349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.557372] Call Trace:
[   26.557388]  <TASK>
[   26.557406]  dump_stack_lvl+0x73/0xb0
[   26.557451]  print_report+0xd1/0x650
[   26.557488]  ? __virt_addr_valid+0x1db/0x2d0
[   26.557511]  ? kasan_atomics_helper+0x194a/0x5450
[   26.557537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.557563]  ? kasan_atomics_helper+0x194a/0x5450
[   26.557589]  kasan_report+0x141/0x180
[   26.557612]  ? kasan_atomics_helper+0x194a/0x5450
[   26.557642]  kasan_check_range+0x10c/0x1c0
[   26.557667]  __kasan_check_write+0x18/0x20
[   26.557691]  kasan_atomics_helper+0x194a/0x5450
[   26.557718]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.557745]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.557770]  ? kasan_atomics+0x152/0x310
[   26.557796]  kasan_atomics+0x1dc/0x310
[   26.557820]  ? __pfx_kasan_atomics+0x10/0x10
[   26.557851]  ? trace_hardirqs_on+0x37/0xe0
[   26.557875]  ? __pfx_read_tsc+0x10/0x10
[   26.557898]  ? ktime_get_ts64+0x86/0x230
[   26.557923]  kunit_try_run_case+0x1a5/0x480
[   26.557949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.557974]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.557998]  ? __kthread_parkme+0x82/0x180
[   26.558020]  ? preempt_count_sub+0x50/0x80
[   26.558044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.558070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.558096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.558121]  kthread+0x337/0x6f0
[   26.558142]  ? trace_preempt_on+0x20/0xc0
[   26.558166]  ? __pfx_kthread+0x10/0x10
[   26.558188]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.558226]  ? calculate_sigpending+0x7b/0xa0
[   26.558251]  ? __pfx_kthread+0x10/0x10
[   26.558274]  ret_from_fork+0x116/0x1d0
[   26.558294]  ? __pfx_kthread+0x10/0x10
[   26.558317]  ret_from_fork_asm+0x1a/0x30
[   26.558349]  </TASK>
[   26.558361] 
[   26.565662] Allocated by task 314:
[   26.565834]  kasan_save_stack+0x45/0x70
[   26.566036]  kasan_save_track+0x18/0x40
[   26.566235]  kasan_save_alloc_info+0x3b/0x50
[   26.566407]  __kasan_kmalloc+0xb7/0xc0
[   26.566597]  __kmalloc_cache_noprof+0x189/0x420
[   26.566789]  kasan_atomics+0x95/0x310
[   26.566932]  kunit_try_run_case+0x1a5/0x480
[   26.567137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.567340]  kthread+0x337/0x6f0
[   26.567463]  ret_from_fork+0x116/0x1d0
[   26.567594]  ret_from_fork_asm+0x1a/0x30
[   26.567780] 
[   26.567870] The buggy address belongs to the object at ffff888106195400
[   26.567870]  which belongs to the cache kmalloc-64 of size 64
[   26.568394] The buggy address is located 0 bytes to the right of
[   26.568394]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.568762] 
[   26.568829] The buggy address belongs to the physical page:
[   26.568996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.569567] flags: 0x200000000000000(node=0|zone=2)
[   26.569797] page_type: f5(slab)
[   26.569961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.570247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.570479] page dumped because: kasan: bad access detected
[   26.570646] 
[   26.570711] Memory state around the buggy address:
[   26.570859]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.571194]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.571541] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.571867]                                      ^
[   26.572094]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.572636]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.572893] ==================================================================
[   26.408318] ==================================================================
[   26.408667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   26.409010] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.409607] 
[   26.409721] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.409767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.409781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.409802] Call Trace:
[   26.409820]  <TASK>
[   26.409835]  dump_stack_lvl+0x73/0xb0
[   26.409867]  print_report+0xd1/0x650
[   26.409889]  ? __virt_addr_valid+0x1db/0x2d0
[   26.409913]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.409939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.409967]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.409994]  kasan_report+0x141/0x180
[   26.410017]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.410048]  kasan_check_range+0x10c/0x1c0
[   26.410073]  __kasan_check_write+0x18/0x20
[   26.410098]  kasan_atomics_helper+0x15b6/0x5450
[   26.410126]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.410153]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.410179]  ? kasan_atomics+0x152/0x310
[   26.410220]  kasan_atomics+0x1dc/0x310
[   26.410244]  ? __pfx_kasan_atomics+0x10/0x10
[   26.410267]  ? trace_hardirqs_on+0x37/0xe0
[   26.410291]  ? __pfx_read_tsc+0x10/0x10
[   26.410314]  ? ktime_get_ts64+0x86/0x230
[   26.410339]  kunit_try_run_case+0x1a5/0x480
[   26.410366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.410392]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.410416]  ? __kthread_parkme+0x82/0x180
[   26.410440]  ? preempt_count_sub+0x50/0x80
[   26.410517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.410544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.410589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.410615]  kthread+0x337/0x6f0
[   26.410637]  ? trace_preempt_on+0x20/0xc0
[   26.410660]  ? __pfx_kthread+0x10/0x10
[   26.410683]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.410709]  ? calculate_sigpending+0x7b/0xa0
[   26.410735]  ? __pfx_kthread+0x10/0x10
[   26.410758]  ret_from_fork+0x116/0x1d0
[   26.410778]  ? __pfx_kthread+0x10/0x10
[   26.410801]  ret_from_fork_asm+0x1a/0x30
[   26.410833]  </TASK>
[   26.410863] 
[   26.424265] Allocated by task 314:
[   26.424656]  kasan_save_stack+0x45/0x70
[   26.425029]  kasan_save_track+0x18/0x40
[   26.425410]  kasan_save_alloc_info+0x3b/0x50
[   26.425893]  __kasan_kmalloc+0xb7/0xc0
[   26.426274]  __kmalloc_cache_noprof+0x189/0x420
[   26.426705]  kasan_atomics+0x95/0x310
[   26.427049]  kunit_try_run_case+0x1a5/0x480
[   26.427232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.427893]  kthread+0x337/0x6f0
[   26.428192]  ret_from_fork+0x116/0x1d0
[   26.428543]  ret_from_fork_asm+0x1a/0x30
[   26.428794] 
[   26.428964] The buggy address belongs to the object at ffff888106195400
[   26.428964]  which belongs to the cache kmalloc-64 of size 64
[   26.429493] The buggy address is located 0 bytes to the right of
[   26.429493]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.429861] 
[   26.429929] The buggy address belongs to the physical page:
[   26.430095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.430341] flags: 0x200000000000000(node=0|zone=2)
[   26.430645] page_type: f5(slab)
[   26.431378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.432086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.432781] page dumped because: kasan: bad access detected
[   26.433327] 
[   26.433491] Memory state around the buggy address:
[   26.434079]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.434740]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.434961] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.435172]                                      ^
[   26.435395]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.435922]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.436211] ==================================================================
[   26.530221] ==================================================================
[   26.530507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   26.530769] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.531095] 
[   26.531756] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.531825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.531841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.531866] Call Trace:
[   26.531883]  <TASK>
[   26.531898]  dump_stack_lvl+0x73/0xb0
[   26.531929]  print_report+0xd1/0x650
[   26.531951]  ? __virt_addr_valid+0x1db/0x2d0
[   26.531976]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.532001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.532028]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.532055]  kasan_report+0x141/0x180
[   26.532077]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.532107]  kasan_check_range+0x10c/0x1c0
[   26.532132]  __kasan_check_write+0x18/0x20
[   26.532156]  kasan_atomics_helper+0x18b1/0x5450
[   26.532194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.532222]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.532247]  ? kasan_atomics+0x152/0x310
[   26.532274]  kasan_atomics+0x1dc/0x310
[   26.532301]  ? __pfx_kasan_atomics+0x10/0x10
[   26.532325]  ? trace_hardirqs_on+0x37/0xe0
[   26.532348]  ? __pfx_read_tsc+0x10/0x10
[   26.532370]  ? ktime_get_ts64+0x86/0x230
[   26.532396]  kunit_try_run_case+0x1a5/0x480
[   26.532423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.532449]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.532483]  ? __kthread_parkme+0x82/0x180
[   26.532527]  ? preempt_count_sub+0x50/0x80
[   26.532552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.532579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.532605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.532631]  kthread+0x337/0x6f0
[   26.532653]  ? trace_preempt_on+0x20/0xc0
[   26.532677]  ? __pfx_kthread+0x10/0x10
[   26.532700]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.532725]  ? calculate_sigpending+0x7b/0xa0
[   26.532750]  ? __pfx_kthread+0x10/0x10
[   26.532773]  ret_from_fork+0x116/0x1d0
[   26.532794]  ? __pfx_kthread+0x10/0x10
[   26.532815]  ret_from_fork_asm+0x1a/0x30
[   26.532847]  </TASK>
[   26.532859] 
[   26.544748] Allocated by task 314:
[   26.545111]  kasan_save_stack+0x45/0x70
[   26.545550]  kasan_save_track+0x18/0x40
[   26.545892]  kasan_save_alloc_info+0x3b/0x50
[   26.546287]  __kasan_kmalloc+0xb7/0xc0
[   26.546650]  __kmalloc_cache_noprof+0x189/0x420
[   26.547042]  kasan_atomics+0x95/0x310
[   26.547423]  kunit_try_run_case+0x1a5/0x480
[   26.547623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.547794]  kthread+0x337/0x6f0
[   26.547909]  ret_from_fork+0x116/0x1d0
[   26.548037]  ret_from_fork_asm+0x1a/0x30
[   26.548172] 
[   26.548332] The buggy address belongs to the object at ffff888106195400
[   26.548332]  which belongs to the cache kmalloc-64 of size 64
[   26.549378] The buggy address is located 0 bytes to the right of
[   26.549378]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.550733] 
[   26.550891] The buggy address belongs to the physical page:
[   26.551464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.552317] flags: 0x200000000000000(node=0|zone=2)
[   26.552680] page_type: f5(slab)
[   26.552799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.553027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.553292] page dumped because: kasan: bad access detected
[   26.553524] 
[   26.553614] Memory state around the buggy address:
[   26.553832]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.554119]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.554489] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.554754]                                      ^
[   26.554968]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.555183]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.555479] ==================================================================
[   26.573477] ==================================================================
[   26.573794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   26.574095] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.574443] 
[   26.574560] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.574607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.574621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.574643] Call Trace:
[   26.574659]  <TASK>
[   26.574676]  dump_stack_lvl+0x73/0xb0
[   26.574703]  print_report+0xd1/0x650
[   26.574726]  ? __virt_addr_valid+0x1db/0x2d0
[   26.574750]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.574775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.574802]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.574828]  kasan_report+0x141/0x180
[   26.574851]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.574881]  kasan_check_range+0x10c/0x1c0
[   26.574905]  __kasan_check_write+0x18/0x20
[   26.574929]  kasan_atomics_helper+0x19e3/0x5450
[   26.574956]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.574983]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.575008]  ? kasan_atomics+0x152/0x310
[   26.575034]  kasan_atomics+0x1dc/0x310
[   26.575057]  ? __pfx_kasan_atomics+0x10/0x10
[   26.575081]  ? trace_hardirqs_on+0x37/0xe0
[   26.575103]  ? __pfx_read_tsc+0x10/0x10
[   26.575126]  ? ktime_get_ts64+0x86/0x230
[   26.575152]  kunit_try_run_case+0x1a5/0x480
[   26.575177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.575223]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.575247]  ? __kthread_parkme+0x82/0x180
[   26.575269]  ? preempt_count_sub+0x50/0x80
[   26.575293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.575318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.575344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.575369]  kthread+0x337/0x6f0
[   26.575390]  ? trace_preempt_on+0x20/0xc0
[   26.575413]  ? __pfx_kthread+0x10/0x10
[   26.575435]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.575470]  ? calculate_sigpending+0x7b/0xa0
[   26.575497]  ? __pfx_kthread+0x10/0x10
[   26.575520]  ret_from_fork+0x116/0x1d0
[   26.575540]  ? __pfx_kthread+0x10/0x10
[   26.575562]  ret_from_fork_asm+0x1a/0x30
[   26.575595]  </TASK>
[   26.575607] 
[   26.583027] Allocated by task 314:
[   26.583179]  kasan_save_stack+0x45/0x70
[   26.583379]  kasan_save_track+0x18/0x40
[   26.583574]  kasan_save_alloc_info+0x3b/0x50
[   26.583785]  __kasan_kmalloc+0xb7/0xc0
[   26.583971]  __kmalloc_cache_noprof+0x189/0x420
[   26.584187]  kasan_atomics+0x95/0x310
[   26.584365]  kunit_try_run_case+0x1a5/0x480
[   26.584562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.584782]  kthread+0x337/0x6f0
[   26.584946]  ret_from_fork+0x116/0x1d0
[   26.585106]  ret_from_fork_asm+0x1a/0x30
[   26.585334] 
[   26.585400] The buggy address belongs to the object at ffff888106195400
[   26.585400]  which belongs to the cache kmalloc-64 of size 64
[   26.585882] The buggy address is located 0 bytes to the right of
[   26.585882]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.586401] 
[   26.586476] The buggy address belongs to the physical page:
[   26.586642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.586876] flags: 0x200000000000000(node=0|zone=2)
[   26.587032] page_type: f5(slab)
[   26.587147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.587477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.587805] page dumped because: kasan: bad access detected
[   26.588049] 
[   26.588136] Memory state around the buggy address:
[   26.588308]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.588564]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.588778] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.588987]                                      ^
[   26.589141]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.589469]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.589732] ==================================================================
[   26.197329] ==================================================================
[   26.197681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   26.198018] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.198391] 
[   26.198483] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.198530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.198544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.198566] Call Trace:
[   26.198580]  <TASK>
[   26.198594]  dump_stack_lvl+0x73/0xb0
[   26.198621]  print_report+0xd1/0x650
[   26.198644]  ? __virt_addr_valid+0x1db/0x2d0
[   26.198668]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.198694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.198721]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.198748]  kasan_report+0x141/0x180
[   26.198770]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.198802]  __asan_report_load4_noabort+0x18/0x20
[   26.198827]  kasan_atomics_helper+0x4a1c/0x5450
[   26.198854]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.198881]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.198906]  ? kasan_atomics+0x152/0x310
[   26.198933]  kasan_atomics+0x1dc/0x310
[   26.198957]  ? __pfx_kasan_atomics+0x10/0x10
[   26.198981]  ? trace_hardirqs_on+0x37/0xe0
[   26.199004]  ? __pfx_read_tsc+0x10/0x10
[   26.199027]  ? ktime_get_ts64+0x86/0x230
[   26.199052]  kunit_try_run_case+0x1a5/0x480
[   26.199078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.199105]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.199128]  ? __kthread_parkme+0x82/0x180
[   26.199150]  ? preempt_count_sub+0x50/0x80
[   26.199175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.199201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.199226]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.199251]  kthread+0x337/0x6f0
[   26.199272]  ? trace_preempt_on+0x20/0xc0
[   26.199296]  ? __pfx_kthread+0x10/0x10
[   26.199318]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.199344]  ? calculate_sigpending+0x7b/0xa0
[   26.199369]  ? __pfx_kthread+0x10/0x10
[   26.199392]  ret_from_fork+0x116/0x1d0
[   26.199413]  ? __pfx_kthread+0x10/0x10
[   26.199435]  ret_from_fork_asm+0x1a/0x30
[   26.199477]  </TASK>
[   26.199489] 
[   26.207152] Allocated by task 314:
[   26.207309]  kasan_save_stack+0x45/0x70
[   26.207567]  kasan_save_track+0x18/0x40
[   26.207700]  kasan_save_alloc_info+0x3b/0x50
[   26.207842]  __kasan_kmalloc+0xb7/0xc0
[   26.207972]  __kmalloc_cache_noprof+0x189/0x420
[   26.208162]  kasan_atomics+0x95/0x310
[   26.208464]  kunit_try_run_case+0x1a5/0x480
[   26.208672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.208923]  kthread+0x337/0x6f0
[   26.209087]  ret_from_fork+0x116/0x1d0
[   26.209267]  ret_from_fork_asm+0x1a/0x30
[   26.209419] 
[   26.209522] The buggy address belongs to the object at ffff888106195400
[   26.209522]  which belongs to the cache kmalloc-64 of size 64
[   26.209905] The buggy address is located 0 bytes to the right of
[   26.209905]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.210471] 
[   26.210553] The buggy address belongs to the physical page:
[   26.210719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.211018] flags: 0x200000000000000(node=0|zone=2)
[   26.211242] page_type: f5(slab)
[   26.211406] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.211655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.211961] page dumped because: kasan: bad access detected
[   26.212214] 
[   26.212305] Memory state around the buggy address:
[   26.212536]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.212855]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.213127] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.213395]                                      ^
[   26.213582]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.213904]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.214190] ==================================================================
[   25.959892] ==================================================================
[   25.960372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   25.961047] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.961499] 
[   25.961583] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.961677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.961692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.961716] Call Trace:
[   25.961733]  <TASK>
[   25.961751]  dump_stack_lvl+0x73/0xb0
[   25.961780]  print_report+0xd1/0x650
[   25.961803]  ? __virt_addr_valid+0x1db/0x2d0
[   25.961827]  ? kasan_atomics_helper+0xa2b/0x5450
[   25.961859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.961886]  ? kasan_atomics_helper+0xa2b/0x5450
[   25.961914]  kasan_report+0x141/0x180
[   25.961959]  ? kasan_atomics_helper+0xa2b/0x5450
[   25.962051]  kasan_check_range+0x10c/0x1c0
[   25.962076]  __kasan_check_write+0x18/0x20
[   25.962100]  kasan_atomics_helper+0xa2b/0x5450
[   25.962127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.962154]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.962181]  ? kasan_atomics+0x152/0x310
[   25.962223]  kasan_atomics+0x1dc/0x310
[   25.962247]  ? __pfx_kasan_atomics+0x10/0x10
[   25.962270]  ? trace_hardirqs_on+0x37/0xe0
[   25.962294]  ? __pfx_read_tsc+0x10/0x10
[   25.962317]  ? ktime_get_ts64+0x86/0x230
[   25.962342]  kunit_try_run_case+0x1a5/0x480
[   25.962368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.962394]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.962438]  ? __kthread_parkme+0x82/0x180
[   25.962474]  ? preempt_count_sub+0x50/0x80
[   25.962500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.962746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.962772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.962797]  kthread+0x337/0x6f0
[   25.962819]  ? trace_preempt_on+0x20/0xc0
[   25.962842]  ? __pfx_kthread+0x10/0x10
[   25.962865]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.962890]  ? calculate_sigpending+0x7b/0xa0
[   25.962915]  ? __pfx_kthread+0x10/0x10
[   25.962938]  ret_from_fork+0x116/0x1d0
[   25.962959]  ? __pfx_kthread+0x10/0x10
[   25.962981]  ret_from_fork_asm+0x1a/0x30
[   25.963013]  </TASK>
[   25.963026] 
[   25.971375] Allocated by task 314:
[   25.971714]  kasan_save_stack+0x45/0x70
[   25.971926]  kasan_save_track+0x18/0x40
[   25.972104]  kasan_save_alloc_info+0x3b/0x50
[   25.973127]  __kasan_kmalloc+0xb7/0xc0
[   25.973898]  __kmalloc_cache_noprof+0x189/0x420
[   25.974484]  kasan_atomics+0x95/0x310
[   25.974795]  kunit_try_run_case+0x1a5/0x480
[   25.975008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.975473]  kthread+0x337/0x6f0
[   25.975708]  ret_from_fork+0x116/0x1d0
[   25.976007]  ret_from_fork_asm+0x1a/0x30
[   25.976412] 
[   25.976524] The buggy address belongs to the object at ffff888106195400
[   25.976524]  which belongs to the cache kmalloc-64 of size 64
[   25.977145] The buggy address is located 0 bytes to the right of
[   25.977145]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.978136] 
[   25.978255] The buggy address belongs to the physical page:
[   25.978674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.978997] flags: 0x200000000000000(node=0|zone=2)
[   25.979404] page_type: f5(slab)
[   25.979701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.980302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.980759] page dumped because: kasan: bad access detected
[   25.981006] 
[   25.981090] Memory state around the buggy address:
[   25.981626]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.982124]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.982801] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.983270]                                      ^
[   25.983636]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.983928]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.984478] ==================================================================
[   26.081309] ==================================================================
[   26.081667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   26.082007] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.082327] 
[   26.082427] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.082482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.082497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.082519] Call Trace:
[   26.082536]  <TASK>
[   26.082552]  dump_stack_lvl+0x73/0xb0
[   26.082578]  print_report+0xd1/0x650
[   26.082602]  ? __virt_addr_valid+0x1db/0x2d0
[   26.082626]  ? kasan_atomics_helper+0xde0/0x5450
[   26.082650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.082677]  ? kasan_atomics_helper+0xde0/0x5450
[   26.082703]  kasan_report+0x141/0x180
[   26.082726]  ? kasan_atomics_helper+0xde0/0x5450
[   26.082757]  kasan_check_range+0x10c/0x1c0
[   26.082781]  __kasan_check_write+0x18/0x20
[   26.082805]  kasan_atomics_helper+0xde0/0x5450
[   26.082832]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.082858]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.082884]  ? kasan_atomics+0x152/0x310
[   26.082911]  kasan_atomics+0x1dc/0x310
[   26.082934]  ? __pfx_kasan_atomics+0x10/0x10
[   26.082957]  ? trace_hardirqs_on+0x37/0xe0
[   26.082980]  ? __pfx_read_tsc+0x10/0x10
[   26.083002]  ? ktime_get_ts64+0x86/0x230
[   26.083027]  kunit_try_run_case+0x1a5/0x480
[   26.083053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.083080]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.083102]  ? __kthread_parkme+0x82/0x180
[   26.083124]  ? preempt_count_sub+0x50/0x80
[   26.083149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.083175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.083200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.083225]  kthread+0x337/0x6f0
[   26.083334]  ? trace_preempt_on+0x20/0xc0
[   26.083359]  ? __pfx_kthread+0x10/0x10
[   26.083382]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.083407]  ? calculate_sigpending+0x7b/0xa0
[   26.083433]  ? __pfx_kthread+0x10/0x10
[   26.083468]  ret_from_fork+0x116/0x1d0
[   26.083489]  ? __pfx_kthread+0x10/0x10
[   26.083511]  ret_from_fork_asm+0x1a/0x30
[   26.083544]  </TASK>
[   26.083556] 
[   26.091322] Allocated by task 314:
[   26.091509]  kasan_save_stack+0x45/0x70
[   26.091679]  kasan_save_track+0x18/0x40
[   26.091858]  kasan_save_alloc_info+0x3b/0x50
[   26.092024]  __kasan_kmalloc+0xb7/0xc0
[   26.092155]  __kmalloc_cache_noprof+0x189/0x420
[   26.092305]  kasan_atomics+0x95/0x310
[   26.092433]  kunit_try_run_case+0x1a5/0x480
[   26.092646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.092921]  kthread+0x337/0x6f0
[   26.093102]  ret_from_fork+0x116/0x1d0
[   26.093399]  ret_from_fork_asm+0x1a/0x30
[   26.093605] 
[   26.093672] The buggy address belongs to the object at ffff888106195400
[   26.093672]  which belongs to the cache kmalloc-64 of size 64
[   26.094080] The buggy address is located 0 bytes to the right of
[   26.094080]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.094932] 
[   26.095027] The buggy address belongs to the physical page:
[   26.095232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.095513] flags: 0x200000000000000(node=0|zone=2)
[   26.095672] page_type: f5(slab)
[   26.095791] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.096019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.096278] page dumped because: kasan: bad access detected
[   26.096532] 
[   26.096622] Memory state around the buggy address:
[   26.096836]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.097145]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.097463] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.097852]                                      ^
[   26.098058]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.098497]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.098761] ==================================================================
[   26.255181] ==================================================================
[   26.255687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   26.256028] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.256618] 
[   26.256702] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.256750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.256765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.256788] Call Trace:
[   26.256803]  <TASK>
[   26.256819]  dump_stack_lvl+0x73/0xb0
[   26.256849]  print_report+0xd1/0x650
[   26.256873]  ? __virt_addr_valid+0x1db/0x2d0
[   26.256897]  ? kasan_atomics_helper+0x1217/0x5450
[   26.256923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.256950]  ? kasan_atomics_helper+0x1217/0x5450
[   26.256976]  kasan_report+0x141/0x180
[   26.257001]  ? kasan_atomics_helper+0x1217/0x5450
[   26.257032]  kasan_check_range+0x10c/0x1c0
[   26.257057]  __kasan_check_write+0x18/0x20
[   26.257081]  kasan_atomics_helper+0x1217/0x5450
[   26.257108]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.257135]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.257160]  ? kasan_atomics+0x152/0x310
[   26.257198]  kasan_atomics+0x1dc/0x310
[   26.257222]  ? __pfx_kasan_atomics+0x10/0x10
[   26.257246]  ? trace_hardirqs_on+0x37/0xe0
[   26.257270]  ? __pfx_read_tsc+0x10/0x10
[   26.257293]  ? ktime_get_ts64+0x86/0x230
[   26.257371]  kunit_try_run_case+0x1a5/0x480
[   26.257400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.257426]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.257451]  ? __kthread_parkme+0x82/0x180
[   26.257486]  ? preempt_count_sub+0x50/0x80
[   26.257511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.257537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.257563]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.257589]  kthread+0x337/0x6f0
[   26.257610]  ? trace_preempt_on+0x20/0xc0
[   26.257634]  ? __pfx_kthread+0x10/0x10
[   26.257656]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.257682]  ? calculate_sigpending+0x7b/0xa0
[   26.257708]  ? __pfx_kthread+0x10/0x10
[   26.257731]  ret_from_fork+0x116/0x1d0
[   26.257752]  ? __pfx_kthread+0x10/0x10
[   26.257775]  ret_from_fork_asm+0x1a/0x30
[   26.257807]  </TASK>
[   26.257820] 
[   26.265280] Allocated by task 314:
[   26.265439]  kasan_save_stack+0x45/0x70
[   26.265630]  kasan_save_track+0x18/0x40
[   26.265788]  kasan_save_alloc_info+0x3b/0x50
[   26.265996]  __kasan_kmalloc+0xb7/0xc0
[   26.266154]  __kmalloc_cache_noprof+0x189/0x420
[   26.266393]  kasan_atomics+0x95/0x310
[   26.266572]  kunit_try_run_case+0x1a5/0x480
[   26.266714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.266963]  kthread+0x337/0x6f0
[   26.267125]  ret_from_fork+0x116/0x1d0
[   26.267410]  ret_from_fork_asm+0x1a/0x30
[   26.267600] 
[   26.267687] The buggy address belongs to the object at ffff888106195400
[   26.267687]  which belongs to the cache kmalloc-64 of size 64
[   26.268127] The buggy address is located 0 bytes to the right of
[   26.268127]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.268662] 
[   26.268753] The buggy address belongs to the physical page:
[   26.268962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.269286] flags: 0x200000000000000(node=0|zone=2)
[   26.269491] page_type: f5(slab)
[   26.269624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.269858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.270138] page dumped because: kasan: bad access detected
[   26.270385] 
[   26.270490] Memory state around the buggy address:
[   26.270706]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.270956]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.271164] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.271371]                                      ^
[   26.271530]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.271760]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.272067] ==================================================================
[   26.144834] ==================================================================
[   26.145385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   26.145683] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.146023] 
[   26.146115] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.146166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.146181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.146206] Call Trace:
[   26.146224]  <TASK>
[   26.146243]  dump_stack_lvl+0x73/0xb0
[   26.146271]  print_report+0xd1/0x650
[   26.146296]  ? __virt_addr_valid+0x1db/0x2d0
[   26.146322]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.146349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.146377]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.146405]  kasan_report+0x141/0x180
[   26.146430]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.146472]  kasan_check_range+0x10c/0x1c0
[   26.146499]  __kasan_check_write+0x18/0x20
[   26.146524]  kasan_atomics_helper+0xfa9/0x5450
[   26.146553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.146581]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.146608]  ? kasan_atomics+0x152/0x310
[   26.146636]  kasan_atomics+0x1dc/0x310
[   26.146661]  ? __pfx_kasan_atomics+0x10/0x10
[   26.146686]  ? trace_hardirqs_on+0x37/0xe0
[   26.146711]  ? __pfx_read_tsc+0x10/0x10
[   26.146736]  ? ktime_get_ts64+0x86/0x230
[   26.146762]  kunit_try_run_case+0x1a5/0x480
[   26.146790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.146818]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.146842]  ? __kthread_parkme+0x82/0x180
[   26.146865]  ? preempt_count_sub+0x50/0x80
[   26.146891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.146919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.146946]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.146973]  kthread+0x337/0x6f0
[   26.146995]  ? trace_preempt_on+0x20/0xc0
[   26.147020]  ? __pfx_kthread+0x10/0x10
[   26.147043]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.147069]  ? calculate_sigpending+0x7b/0xa0
[   26.147096]  ? __pfx_kthread+0x10/0x10
[   26.147120]  ret_from_fork+0x116/0x1d0
[   26.147142]  ? __pfx_kthread+0x10/0x10
[   26.147166]  ret_from_fork_asm+0x1a/0x30
[   26.147199]  </TASK>
[   26.147212] 
[   26.154607] Allocated by task 314:
[   26.154776]  kasan_save_stack+0x45/0x70
[   26.154947]  kasan_save_track+0x18/0x40
[   26.155135]  kasan_save_alloc_info+0x3b/0x50
[   26.155330]  __kasan_kmalloc+0xb7/0xc0
[   26.155502]  __kmalloc_cache_noprof+0x189/0x420
[   26.155652]  kasan_atomics+0x95/0x310
[   26.155779]  kunit_try_run_case+0x1a5/0x480
[   26.155980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.156223]  kthread+0x337/0x6f0
[   26.156384]  ret_from_fork+0x116/0x1d0
[   26.156573]  ret_from_fork_asm+0x1a/0x30
[   26.156765] 
[   26.157250] The buggy address belongs to the object at ffff888106195400
[   26.157250]  which belongs to the cache kmalloc-64 of size 64
[   26.157686] The buggy address is located 0 bytes to the right of
[   26.157686]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.158053] 
[   26.158130] The buggy address belongs to the physical page:
[   26.158371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.158725] flags: 0x200000000000000(node=0|zone=2)
[   26.158920] page_type: f5(slab)
[   26.159085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.159516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.159739] page dumped because: kasan: bad access detected
[   26.159906] 
[   26.159972] Memory state around the buggy address:
[   26.160180]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.160509]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.160821] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.161127]                                      ^
[   26.161543]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.161816]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.162092] ==================================================================
[   26.918438] ==================================================================
[   26.918731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   26.919319] Read of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.919703] 
[   26.919795] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.919842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.919856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.919878] Call Trace:
[   26.919895]  <TASK>
[   26.919912]  dump_stack_lvl+0x73/0xb0
[   26.919940]  print_report+0xd1/0x650
[   26.919963]  ? __virt_addr_valid+0x1db/0x2d0
[   26.919987]  ? kasan_atomics_helper+0x5115/0x5450
[   26.920013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.920039]  ? kasan_atomics_helper+0x5115/0x5450
[   26.920065]  kasan_report+0x141/0x180
[   26.920089]  ? kasan_atomics_helper+0x5115/0x5450
[   26.920119]  __asan_report_load8_noabort+0x18/0x20
[   26.920145]  kasan_atomics_helper+0x5115/0x5450
[   26.920172]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.920424]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.920453]  ? kasan_atomics+0x152/0x310
[   26.920494]  kasan_atomics+0x1dc/0x310
[   26.920518]  ? __pfx_kasan_atomics+0x10/0x10
[   26.920541]  ? trace_hardirqs_on+0x37/0xe0
[   26.920565]  ? __pfx_read_tsc+0x10/0x10
[   26.920587]  ? ktime_get_ts64+0x86/0x230
[   26.920613]  kunit_try_run_case+0x1a5/0x480
[   26.920639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.920665]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.920689]  ? __kthread_parkme+0x82/0x180
[   26.920712]  ? preempt_count_sub+0x50/0x80
[   26.920737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.920763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.920789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.920815]  kthread+0x337/0x6f0
[   26.920836]  ? trace_preempt_on+0x20/0xc0
[   26.920859]  ? __pfx_kthread+0x10/0x10
[   26.920881]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.920907]  ? calculate_sigpending+0x7b/0xa0
[   26.920932]  ? __pfx_kthread+0x10/0x10
[   26.920955]  ret_from_fork+0x116/0x1d0
[   26.920976]  ? __pfx_kthread+0x10/0x10
[   26.920998]  ret_from_fork_asm+0x1a/0x30
[   26.921030]  </TASK>
[   26.921041] 
[   26.928742] Allocated by task 314:
[   26.928912]  kasan_save_stack+0x45/0x70
[   26.929105]  kasan_save_track+0x18/0x40
[   26.929323]  kasan_save_alloc_info+0x3b/0x50
[   26.929545]  __kasan_kmalloc+0xb7/0xc0
[   26.929734]  __kmalloc_cache_noprof+0x189/0x420
[   26.929940]  kasan_atomics+0x95/0x310
[   26.930125]  kunit_try_run_case+0x1a5/0x480
[   26.930342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.930528]  kthread+0x337/0x6f0
[   26.930698]  ret_from_fork+0x116/0x1d0
[   26.930888]  ret_from_fork_asm+0x1a/0x30
[   26.931083] 
[   26.931208] The buggy address belongs to the object at ffff888106195400
[   26.931208]  which belongs to the cache kmalloc-64 of size 64
[   26.931709] The buggy address is located 0 bytes to the right of
[   26.931709]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.932113] 
[   26.932231] The buggy address belongs to the physical page:
[   26.932509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.932817] flags: 0x200000000000000(node=0|zone=2)
[   26.932974] page_type: f5(slab)
[   26.933092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.934141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.935080] page dumped because: kasan: bad access detected
[   26.935403] 
[   26.935550] Memory state around the buggy address:
[   26.935952]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.936189]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.936923] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.937855]                                      ^
[   26.938020]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.938262]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.938864] ==================================================================
[   25.730938] ==================================================================
[   25.731446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   25.731771] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.732066] 
[   25.732546] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.732781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.732797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.732820] Call Trace:
[   25.732837]  <TASK>
[   25.732855]  dump_stack_lvl+0x73/0xb0
[   25.732885]  print_report+0xd1/0x650
[   25.732910]  ? __virt_addr_valid+0x1db/0x2d0
[   25.732935]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.732960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.732988]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.733014]  kasan_report+0x141/0x180
[   25.733037]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.733069]  __asan_report_store4_noabort+0x1b/0x30
[   25.733096]  kasan_atomics_helper+0x4b3a/0x5450
[   25.733123]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.733752]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.733801]  ? kasan_atomics+0x152/0x310
[   25.733832]  kasan_atomics+0x1dc/0x310
[   25.733863]  ? __pfx_kasan_atomics+0x10/0x10
[   25.733889]  ? trace_hardirqs_on+0x37/0xe0
[   25.733913]  ? __pfx_read_tsc+0x10/0x10
[   25.733935]  ? ktime_get_ts64+0x86/0x230
[   25.733962]  kunit_try_run_case+0x1a5/0x480
[   25.733988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.734017]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.734041]  ? __kthread_parkme+0x82/0x180
[   25.734063]  ? preempt_count_sub+0x50/0x80
[   25.734087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.734112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.734146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.734172]  kthread+0x337/0x6f0
[   25.734193]  ? trace_preempt_on+0x20/0xc0
[   25.734217]  ? __pfx_kthread+0x10/0x10
[   25.734239]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.734264]  ? calculate_sigpending+0x7b/0xa0
[   25.734289]  ? __pfx_kthread+0x10/0x10
[   25.734313]  ret_from_fork+0x116/0x1d0
[   25.734332]  ? __pfx_kthread+0x10/0x10
[   25.734355]  ret_from_fork_asm+0x1a/0x30
[   25.734387]  </TASK>
[   25.734400] 
[   25.747632] Allocated by task 314:
[   25.748016]  kasan_save_stack+0x45/0x70
[   25.748483]  kasan_save_track+0x18/0x40
[   25.748836]  kasan_save_alloc_info+0x3b/0x50
[   25.749269]  __kasan_kmalloc+0xb7/0xc0
[   25.749616]  __kmalloc_cache_noprof+0x189/0x420
[   25.749784]  kasan_atomics+0x95/0x310
[   25.749922]  kunit_try_run_case+0x1a5/0x480
[   25.750067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.750246]  kthread+0x337/0x6f0
[   25.750429]  ret_from_fork+0x116/0x1d0
[   25.750648]  ret_from_fork_asm+0x1a/0x30
[   25.750850] 
[   25.750942] The buggy address belongs to the object at ffff888106195400
[   25.750942]  which belongs to the cache kmalloc-64 of size 64
[   25.751434] The buggy address is located 0 bytes to the right of
[   25.751434]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.752019] 
[   25.752085] The buggy address belongs to the physical page:
[   25.752363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.752739] flags: 0x200000000000000(node=0|zone=2)
[   25.752978] page_type: f5(slab)
[   25.753140] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.753632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.753942] page dumped because: kasan: bad access detected
[   25.754159] 
[   25.754235] Memory state around the buggy address:
[   25.754625]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.754893]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.755167] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.755495]                                      ^
[   25.755689]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.755970]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.756303] ==================================================================
[   25.661892] ==================================================================
[   25.662557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   25.662881] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.663185] 
[   25.663275] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.663323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.663338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.663361] Call Trace:
[   25.663380]  <TASK>
[   25.663398]  dump_stack_lvl+0x73/0xb0
[   25.663427]  print_report+0xd1/0x650
[   25.663450]  ? __virt_addr_valid+0x1db/0x2d0
[   25.663879]  ? kasan_atomics_helper+0x3df/0x5450
[   25.663908]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.663936]  ? kasan_atomics_helper+0x3df/0x5450
[   25.663962]  kasan_report+0x141/0x180
[   25.663987]  ? kasan_atomics_helper+0x3df/0x5450
[   25.664019]  kasan_check_range+0x10c/0x1c0
[   25.664044]  __kasan_check_read+0x15/0x20
[   25.664068]  kasan_atomics_helper+0x3df/0x5450
[   25.664096]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.664123]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.664290]  ? kasan_atomics+0x152/0x310
[   25.664324]  kasan_atomics+0x1dc/0x310
[   25.664349]  ? __pfx_kasan_atomics+0x10/0x10
[   25.664373]  ? trace_hardirqs_on+0x37/0xe0
[   25.664397]  ? __pfx_read_tsc+0x10/0x10
[   25.664420]  ? ktime_get_ts64+0x86/0x230
[   25.664446]  kunit_try_run_case+0x1a5/0x480
[   25.664490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.664518]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.664543]  ? __kthread_parkme+0x82/0x180
[   25.664566]  ? preempt_count_sub+0x50/0x80
[   25.664591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.664617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.664643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.664669]  kthread+0x337/0x6f0
[   25.664691]  ? trace_preempt_on+0x20/0xc0
[   25.664715]  ? __pfx_kthread+0x10/0x10
[   25.664738]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.664764]  ? calculate_sigpending+0x7b/0xa0
[   25.664791]  ? __pfx_kthread+0x10/0x10
[   25.664814]  ret_from_fork+0x116/0x1d0
[   25.664835]  ? __pfx_kthread+0x10/0x10
[   25.664857]  ret_from_fork_asm+0x1a/0x30
[   25.664891]  </TASK>
[   25.664904] 
[   25.676846] Allocated by task 314:
[   25.677025]  kasan_save_stack+0x45/0x70
[   25.677405]  kasan_save_track+0x18/0x40
[   25.677606]  kasan_save_alloc_info+0x3b/0x50
[   25.677792]  __kasan_kmalloc+0xb7/0xc0
[   25.677942]  __kmalloc_cache_noprof+0x189/0x420
[   25.678359]  kasan_atomics+0x95/0x310
[   25.678672]  kunit_try_run_case+0x1a5/0x480
[   25.678937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.679186]  kthread+0x337/0x6f0
[   25.679584]  ret_from_fork+0x116/0x1d0
[   25.679787]  ret_from_fork_asm+0x1a/0x30
[   25.679968] 
[   25.680043] The buggy address belongs to the object at ffff888106195400
[   25.680043]  which belongs to the cache kmalloc-64 of size 64
[   25.680906] The buggy address is located 0 bytes to the right of
[   25.680906]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.681693] 
[   25.681793] The buggy address belongs to the physical page:
[   25.682314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.682647] flags: 0x200000000000000(node=0|zone=2)
[   25.683021] page_type: f5(slab)
[   25.683291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.683636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.683967] page dumped because: kasan: bad access detected
[   25.684196] 
[   25.684427] Memory state around the buggy address:
[   25.684591]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.684900]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.685229] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.685795]                                      ^
[   25.685963]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.686473]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.686779] ==================================================================
[   25.797355] ==================================================================
[   25.798530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   25.799138] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.800150] 
[   25.800452] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.800518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.800534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.800557] Call Trace:
[   25.800573]  <TASK>
[   25.800592]  dump_stack_lvl+0x73/0xb0
[   25.800622]  print_report+0xd1/0x650
[   25.800647]  ? __virt_addr_valid+0x1db/0x2d0
[   25.800671]  ? kasan_atomics_helper+0x697/0x5450
[   25.800697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.800723]  ? kasan_atomics_helper+0x697/0x5450
[   25.800750]  kasan_report+0x141/0x180
[   25.800772]  ? kasan_atomics_helper+0x697/0x5450
[   25.800803]  kasan_check_range+0x10c/0x1c0
[   25.800827]  __kasan_check_write+0x18/0x20
[   25.800852]  kasan_atomics_helper+0x697/0x5450
[   25.800878]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.800905]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.800930]  ? kasan_atomics+0x152/0x310
[   25.800957]  kasan_atomics+0x1dc/0x310
[   25.800980]  ? __pfx_kasan_atomics+0x10/0x10
[   25.801002]  ? trace_hardirqs_on+0x37/0xe0
[   25.801026]  ? __pfx_read_tsc+0x10/0x10
[   25.801049]  ? ktime_get_ts64+0x86/0x230
[   25.801073]  kunit_try_run_case+0x1a5/0x480
[   25.801099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.801124]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.801148]  ? __kthread_parkme+0x82/0x180
[   25.801319]  ? preempt_count_sub+0x50/0x80
[   25.801347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.801414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.801440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.801476]  kthread+0x337/0x6f0
[   25.801498]  ? trace_preempt_on+0x20/0xc0
[   25.801522]  ? __pfx_kthread+0x10/0x10
[   25.801544]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.801571]  ? calculate_sigpending+0x7b/0xa0
[   25.801596]  ? __pfx_kthread+0x10/0x10
[   25.801618]  ret_from_fork+0x116/0x1d0
[   25.801639]  ? __pfx_kthread+0x10/0x10
[   25.801661]  ret_from_fork_asm+0x1a/0x30
[   25.801694]  </TASK>
[   25.801706] 
[   25.819486] Allocated by task 314:
[   25.819629]  kasan_save_stack+0x45/0x70
[   25.819780]  kasan_save_track+0x18/0x40
[   25.819913]  kasan_save_alloc_info+0x3b/0x50
[   25.820058]  __kasan_kmalloc+0xb7/0xc0
[   25.820575]  __kmalloc_cache_noprof+0x189/0x420
[   25.821349]  kasan_atomics+0x95/0x310
[   25.821830]  kunit_try_run_case+0x1a5/0x480
[   25.822421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.822666]  kthread+0x337/0x6f0
[   25.822790]  ret_from_fork+0x116/0x1d0
[   25.822919]  ret_from_fork_asm+0x1a/0x30
[   25.823055] 
[   25.823123] The buggy address belongs to the object at ffff888106195400
[   25.823123]  which belongs to the cache kmalloc-64 of size 64
[   25.824001] The buggy address is located 0 bytes to the right of
[   25.824001]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.825039] 
[   25.825297] The buggy address belongs to the physical page:
[   25.825551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.825889] flags: 0x200000000000000(node=0|zone=2)
[   25.826117] page_type: f5(slab)
[   25.826588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.827018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.827662] page dumped because: kasan: bad access detected
[   25.827910] 
[   25.828003] Memory state around the buggy address:
[   25.828716]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.829623]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.829928] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.830535]                                      ^
[   25.830810]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.831518]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.832001] ==================================================================
[   25.985311] ==================================================================
[   25.985929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   25.986539] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.987169] 
[   25.987419] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.987580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.987596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.987620] Call Trace:
[   25.987640]  <TASK>
[   25.987657]  dump_stack_lvl+0x73/0xb0
[   25.987724]  print_report+0xd1/0x650
[   25.987749]  ? __virt_addr_valid+0x1db/0x2d0
[   25.987774]  ? kasan_atomics_helper+0xac7/0x5450
[   25.987800]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.987827]  ? kasan_atomics_helper+0xac7/0x5450
[   25.987855]  kasan_report+0x141/0x180
[   25.987879]  ? kasan_atomics_helper+0xac7/0x5450
[   25.987909]  kasan_check_range+0x10c/0x1c0
[   25.987934]  __kasan_check_write+0x18/0x20
[   25.987958]  kasan_atomics_helper+0xac7/0x5450
[   25.987985]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.988012]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.988038]  ? kasan_atomics+0x152/0x310
[   25.988065]  kasan_atomics+0x1dc/0x310
[   25.988088]  ? __pfx_kasan_atomics+0x10/0x10
[   25.988111]  ? trace_hardirqs_on+0x37/0xe0
[   25.988136]  ? __pfx_read_tsc+0x10/0x10
[   25.988236]  ? ktime_get_ts64+0x86/0x230
[   25.988263]  kunit_try_run_case+0x1a5/0x480
[   25.988291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.988317]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.988342]  ? __kthread_parkme+0x82/0x180
[   25.988365]  ? preempt_count_sub+0x50/0x80
[   25.988389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.988416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.988441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.988480]  kthread+0x337/0x6f0
[   25.988501]  ? trace_preempt_on+0x20/0xc0
[   25.988525]  ? __pfx_kthread+0x10/0x10
[   25.988547]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.988573]  ? calculate_sigpending+0x7b/0xa0
[   25.988599]  ? __pfx_kthread+0x10/0x10
[   25.988622]  ret_from_fork+0x116/0x1d0
[   25.988643]  ? __pfx_kthread+0x10/0x10
[   25.988666]  ret_from_fork_asm+0x1a/0x30
[   25.988699]  </TASK>
[   25.988711] 
[   26.000518] Allocated by task 314:
[   26.000704]  kasan_save_stack+0x45/0x70
[   26.000909]  kasan_save_track+0x18/0x40
[   26.001093]  kasan_save_alloc_info+0x3b/0x50
[   26.001549]  __kasan_kmalloc+0xb7/0xc0
[   26.001749]  __kmalloc_cache_noprof+0x189/0x420
[   26.001950]  kasan_atomics+0x95/0x310
[   26.002080]  kunit_try_run_case+0x1a5/0x480
[   26.002450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.002795]  kthread+0x337/0x6f0
[   26.002941]  ret_from_fork+0x116/0x1d0
[   26.003069]  ret_from_fork_asm+0x1a/0x30
[   26.003244] 
[   26.003336] The buggy address belongs to the object at ffff888106195400
[   26.003336]  which belongs to the cache kmalloc-64 of size 64
[   26.003979] The buggy address is located 0 bytes to the right of
[   26.003979]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.004611] 
[   26.004695] The buggy address belongs to the physical page:
[   26.004959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.005189] flags: 0x200000000000000(node=0|zone=2)
[   26.005634] page_type: f5(slab)
[   26.005803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.006143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.006517] page dumped because: kasan: bad access detected
[   26.006736] 
[   26.006808] Memory state around the buggy address:
[   26.006981]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.007550]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.007815] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.008122]                                      ^
[   26.008389]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.008677]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.008906] ==================================================================
[   26.063953] ==================================================================
[   26.064432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   26.064679] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.064899] 
[   26.064976] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.065021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.065035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.065056] Call Trace:
[   26.065070]  <TASK>
[   26.065084]  dump_stack_lvl+0x73/0xb0
[   26.065110]  print_report+0xd1/0x650
[   26.065132]  ? __virt_addr_valid+0x1db/0x2d0
[   26.065155]  ? kasan_atomics_helper+0xd47/0x5450
[   26.065181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.065208]  ? kasan_atomics_helper+0xd47/0x5450
[   26.065234]  kasan_report+0x141/0x180
[   26.065256]  ? kasan_atomics_helper+0xd47/0x5450
[   26.065287]  kasan_check_range+0x10c/0x1c0
[   26.065312]  __kasan_check_write+0x18/0x20
[   26.065336]  kasan_atomics_helper+0xd47/0x5450
[   26.065364]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.065392]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.065417]  ? kasan_atomics+0x152/0x310
[   26.065443]  kasan_atomics+0x1dc/0x310
[   26.065478]  ? __pfx_kasan_atomics+0x10/0x10
[   26.065501]  ? trace_hardirqs_on+0x37/0xe0
[   26.065525]  ? __pfx_read_tsc+0x10/0x10
[   26.065547]  ? ktime_get_ts64+0x86/0x230
[   26.065571]  kunit_try_run_case+0x1a5/0x480
[   26.065597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.065624]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.065646]  ? __kthread_parkme+0x82/0x180
[   26.065669]  ? preempt_count_sub+0x50/0x80
[   26.065694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.065720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.065746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.065772]  kthread+0x337/0x6f0
[   26.065793]  ? trace_preempt_on+0x20/0xc0
[   26.065828]  ? __pfx_kthread+0x10/0x10
[   26.065856]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.065882]  ? calculate_sigpending+0x7b/0xa0
[   26.065907]  ? __pfx_kthread+0x10/0x10
[   26.065931]  ret_from_fork+0x116/0x1d0
[   26.065952]  ? __pfx_kthread+0x10/0x10
[   26.065975]  ret_from_fork_asm+0x1a/0x30
[   26.066007]  </TASK>
[   26.066019] 
[   26.073294] Allocated by task 314:
[   26.073488]  kasan_save_stack+0x45/0x70
[   26.073708]  kasan_save_track+0x18/0x40
[   26.073900]  kasan_save_alloc_info+0x3b/0x50
[   26.074107]  __kasan_kmalloc+0xb7/0xc0
[   26.074400]  __kmalloc_cache_noprof+0x189/0x420
[   26.074629]  kasan_atomics+0x95/0x310
[   26.074784]  kunit_try_run_case+0x1a5/0x480
[   26.074925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.075148]  kthread+0x337/0x6f0
[   26.075464]  ret_from_fork+0x116/0x1d0
[   26.075648]  ret_from_fork_asm+0x1a/0x30
[   26.075846] 
[   26.075917] The buggy address belongs to the object at ffff888106195400
[   26.075917]  which belongs to the cache kmalloc-64 of size 64
[   26.076403] The buggy address is located 0 bytes to the right of
[   26.076403]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.076900] 
[   26.076985] The buggy address belongs to the physical page:
[   26.077196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.077487] flags: 0x200000000000000(node=0|zone=2)
[   26.077690] page_type: f5(slab)
[   26.077850] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.078157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.078486] page dumped because: kasan: bad access detected
[   26.078712] 
[   26.078799] Memory state around the buggy address:
[   26.078960]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.079274]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.079555] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.079857]                                      ^
[   26.080026]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.080236]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.080444] ==================================================================
[   26.640690] ==================================================================
[   26.641027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   26.641388] Read of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.641682] 
[   26.641780] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.641824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.641838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.641867] Call Trace:
[   26.641882]  <TASK>
[   26.641899]  dump_stack_lvl+0x73/0xb0
[   26.641926]  print_report+0xd1/0x650
[   26.641949]  ? __virt_addr_valid+0x1db/0x2d0
[   26.641973]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.641998]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.642025]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.642051]  kasan_report+0x141/0x180
[   26.642074]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.642104]  __asan_report_load8_noabort+0x18/0x20
[   26.642130]  kasan_atomics_helper+0x4f30/0x5450
[   26.642157]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.642203]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.642230]  ? kasan_atomics+0x152/0x310
[   26.642257]  kasan_atomics+0x1dc/0x310
[   26.642280]  ? __pfx_kasan_atomics+0x10/0x10
[   26.642304]  ? trace_hardirqs_on+0x37/0xe0
[   26.642327]  ? __pfx_read_tsc+0x10/0x10
[   26.642349]  ? ktime_get_ts64+0x86/0x230
[   26.642375]  kunit_try_run_case+0x1a5/0x480
[   26.642401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.642428]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.642450]  ? __kthread_parkme+0x82/0x180
[   26.642480]  ? preempt_count_sub+0x50/0x80
[   26.642504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.642531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.642555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.642580]  kthread+0x337/0x6f0
[   26.642602]  ? trace_preempt_on+0x20/0xc0
[   26.642626]  ? __pfx_kthread+0x10/0x10
[   26.642648]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.642674]  ? calculate_sigpending+0x7b/0xa0
[   26.642699]  ? __pfx_kthread+0x10/0x10
[   26.642723]  ret_from_fork+0x116/0x1d0
[   26.642743]  ? __pfx_kthread+0x10/0x10
[   26.642765]  ret_from_fork_asm+0x1a/0x30
[   26.642796]  </TASK>
[   26.642809] 
[   26.649627] Allocated by task 314:
[   26.649748]  kasan_save_stack+0x45/0x70
[   26.649894]  kasan_save_track+0x18/0x40
[   26.650023]  kasan_save_alloc_info+0x3b/0x50
[   26.650164]  __kasan_kmalloc+0xb7/0xc0
[   26.650327]  __kmalloc_cache_noprof+0x189/0x420
[   26.650595]  kasan_atomics+0x95/0x310
[   26.650783]  kunit_try_run_case+0x1a5/0x480
[   26.650983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.651255]  kthread+0x337/0x6f0
[   26.651419]  ret_from_fork+0x116/0x1d0
[   26.651606]  ret_from_fork_asm+0x1a/0x30
[   26.651796] 
[   26.651886] The buggy address belongs to the object at ffff888106195400
[   26.651886]  which belongs to the cache kmalloc-64 of size 64
[   26.652430] The buggy address is located 0 bytes to the right of
[   26.652430]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.652970] 
[   26.653036] The buggy address belongs to the physical page:
[   26.653228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.653469] flags: 0x200000000000000(node=0|zone=2)
[   26.653626] page_type: f5(slab)
[   26.653739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.653969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.654213] page dumped because: kasan: bad access detected
[   26.654380] 
[   26.654446] Memory state around the buggy address:
[   26.654675]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.655017]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.655425] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.655800]                                      ^
[   26.656024]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.656423]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.656785] ==================================================================
[   26.813887] ==================================================================
[   26.814320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   26.814619] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.814926] 
[   26.815011] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.815056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.815070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.815092] Call Trace:
[   26.815107]  <TASK>
[   26.815122]  dump_stack_lvl+0x73/0xb0
[   26.815148]  print_report+0xd1/0x650
[   26.815172]  ? __virt_addr_valid+0x1db/0x2d0
[   26.815195]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.815223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.815250]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.815276]  kasan_report+0x141/0x180
[   26.815299]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.815330]  kasan_check_range+0x10c/0x1c0
[   26.815354]  __kasan_check_write+0x18/0x20
[   26.815378]  kasan_atomics_helper+0x20c8/0x5450
[   26.815406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.815433]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.815467]  ? kasan_atomics+0x152/0x310
[   26.815494]  kasan_atomics+0x1dc/0x310
[   26.815518]  ? __pfx_kasan_atomics+0x10/0x10
[   26.815541]  ? trace_hardirqs_on+0x37/0xe0
[   26.815566]  ? __pfx_read_tsc+0x10/0x10
[   26.815588]  ? ktime_get_ts64+0x86/0x230
[   26.815613]  kunit_try_run_case+0x1a5/0x480
[   26.815639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.815665]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.815689]  ? __kthread_parkme+0x82/0x180
[   26.815711]  ? preempt_count_sub+0x50/0x80
[   26.815735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.815761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.815786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.815812]  kthread+0x337/0x6f0
[   26.815833]  ? trace_preempt_on+0x20/0xc0
[   26.815855]  ? __pfx_kthread+0x10/0x10
[   26.815877]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.815902]  ? calculate_sigpending+0x7b/0xa0
[   26.815927]  ? __pfx_kthread+0x10/0x10
[   26.815949]  ret_from_fork+0x116/0x1d0
[   26.815970]  ? __pfx_kthread+0x10/0x10
[   26.815992]  ret_from_fork_asm+0x1a/0x30
[   26.816024]  </TASK>
[   26.816036] 
[   26.823145] Allocated by task 314:
[   26.823319]  kasan_save_stack+0x45/0x70
[   26.823713]  kasan_save_track+0x18/0x40
[   26.823904]  kasan_save_alloc_info+0x3b/0x50
[   26.824148]  __kasan_kmalloc+0xb7/0xc0
[   26.824372]  __kmalloc_cache_noprof+0x189/0x420
[   26.824538]  kasan_atomics+0x95/0x310
[   26.824665]  kunit_try_run_case+0x1a5/0x480
[   26.824805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.824986]  kthread+0x337/0x6f0
[   26.825154]  ret_from_fork+0x116/0x1d0
[   26.825336]  ret_from_fork_asm+0x1a/0x30
[   26.825591] 
[   26.825688] The buggy address belongs to the object at ffff888106195400
[   26.825688]  which belongs to the cache kmalloc-64 of size 64
[   26.826251] The buggy address is located 0 bytes to the right of
[   26.826251]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.826746] 
[   26.826831] The buggy address belongs to the physical page:
[   26.827030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.827337] flags: 0x200000000000000(node=0|zone=2)
[   26.827576] page_type: f5(slab)
[   26.827726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.827973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.828194] page dumped because: kasan: bad access detected
[   26.828558] 
[   26.828646] Memory state around the buggy address:
[   26.828962]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.829170]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.829376] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.830014]                                      ^
[   26.830260]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.830554]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.830761] ==================================================================
[   26.859312] ==================================================================
[   26.859560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   26.859793] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.860012] 
[   26.860092] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.860138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.860152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.860173] Call Trace:
[   26.860189]  <TASK>
[   26.860205]  dump_stack_lvl+0x73/0xb0
[   26.860233]  print_report+0xd1/0x650
[   26.860256]  ? __virt_addr_valid+0x1db/0x2d0
[   26.860280]  ? kasan_atomics_helper+0x218a/0x5450
[   26.860306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.860333]  ? kasan_atomics_helper+0x218a/0x5450
[   26.860359]  kasan_report+0x141/0x180
[   26.860382]  ? kasan_atomics_helper+0x218a/0x5450
[   26.860412]  kasan_check_range+0x10c/0x1c0
[   26.860437]  __kasan_check_write+0x18/0x20
[   26.860471]  kasan_atomics_helper+0x218a/0x5450
[   26.860498]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.860524]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.860914]  ? kasan_atomics+0x152/0x310
[   26.860947]  kasan_atomics+0x1dc/0x310
[   26.860972]  ? __pfx_kasan_atomics+0x10/0x10
[   26.860997]  ? trace_hardirqs_on+0x37/0xe0
[   26.861020]  ? __pfx_read_tsc+0x10/0x10
[   26.861051]  ? ktime_get_ts64+0x86/0x230
[   26.861077]  kunit_try_run_case+0x1a5/0x480
[   26.861102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.861128]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.861152]  ? __kthread_parkme+0x82/0x180
[   26.861175]  ? preempt_count_sub+0x50/0x80
[   26.861201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.861227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.861253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.861279]  kthread+0x337/0x6f0
[   26.861300]  ? trace_preempt_on+0x20/0xc0
[   26.861323]  ? __pfx_kthread+0x10/0x10
[   26.861345]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.861371]  ? calculate_sigpending+0x7b/0xa0
[   26.861396]  ? __pfx_kthread+0x10/0x10
[   26.861419]  ret_from_fork+0x116/0x1d0
[   26.861440]  ? __pfx_kthread+0x10/0x10
[   26.861472]  ret_from_fork_asm+0x1a/0x30
[   26.861504]  </TASK>
[   26.861517] 
[   26.868989] Allocated by task 314:
[   26.869115]  kasan_save_stack+0x45/0x70
[   26.869256]  kasan_save_track+0x18/0x40
[   26.869384]  kasan_save_alloc_info+0x3b/0x50
[   26.869609]  __kasan_kmalloc+0xb7/0xc0
[   26.869797]  __kmalloc_cache_noprof+0x189/0x420
[   26.870014]  kasan_atomics+0x95/0x310
[   26.870194]  kunit_try_run_case+0x1a5/0x480
[   26.870402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.870597]  kthread+0x337/0x6f0
[   26.870713]  ret_from_fork+0x116/0x1d0
[   26.870838]  ret_from_fork_asm+0x1a/0x30
[   26.870971] 
[   26.871036] The buggy address belongs to the object at ffff888106195400
[   26.871036]  which belongs to the cache kmalloc-64 of size 64
[   26.871493] The buggy address is located 0 bytes to the right of
[   26.871493]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.872041] 
[   26.872132] The buggy address belongs to the physical page:
[   26.872464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.872816] flags: 0x200000000000000(node=0|zone=2)
[   26.873039] page_type: f5(slab)
[   26.873174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.873490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.873758] page dumped because: kasan: bad access detected
[   26.873930] 
[   26.873995] Memory state around the buggy address:
[   26.874197]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.874528]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.874812] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.875113]                                      ^
[   26.875261]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.875480]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.875687] ==================================================================
[   26.180329] ==================================================================
[   26.180658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   26.180921] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.181142] 
[   26.181428] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.181491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.181505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.181528] Call Trace:
[   26.181542]  <TASK>
[   26.181558]  dump_stack_lvl+0x73/0xb0
[   26.181586]  print_report+0xd1/0x650
[   26.181609]  ? __virt_addr_valid+0x1db/0x2d0
[   26.181634]  ? kasan_atomics_helper+0x1079/0x5450
[   26.181660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.181686]  ? kasan_atomics_helper+0x1079/0x5450
[   26.181713]  kasan_report+0x141/0x180
[   26.181737]  ? kasan_atomics_helper+0x1079/0x5450
[   26.181768]  kasan_check_range+0x10c/0x1c0
[   26.181793]  __kasan_check_write+0x18/0x20
[   26.181817]  kasan_atomics_helper+0x1079/0x5450
[   26.181851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.181878]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.181904]  ? kasan_atomics+0x152/0x310
[   26.181931]  kasan_atomics+0x1dc/0x310
[   26.181955]  ? __pfx_kasan_atomics+0x10/0x10
[   26.181978]  ? trace_hardirqs_on+0x37/0xe0
[   26.182001]  ? __pfx_read_tsc+0x10/0x10
[   26.182024]  ? ktime_get_ts64+0x86/0x230
[   26.182050]  kunit_try_run_case+0x1a5/0x480
[   26.182075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.182103]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.182127]  ? __kthread_parkme+0x82/0x180
[   26.182163]  ? preempt_count_sub+0x50/0x80
[   26.182189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.182227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.182252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.182278]  kthread+0x337/0x6f0
[   26.182300]  ? trace_preempt_on+0x20/0xc0
[   26.182323]  ? __pfx_kthread+0x10/0x10
[   26.182346]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.182372]  ? calculate_sigpending+0x7b/0xa0
[   26.182397]  ? __pfx_kthread+0x10/0x10
[   26.182421]  ret_from_fork+0x116/0x1d0
[   26.182442]  ? __pfx_kthread+0x10/0x10
[   26.182475]  ret_from_fork_asm+0x1a/0x30
[   26.182508]  </TASK>
[   26.182520] 
[   26.189567] Allocated by task 314:
[   26.189738]  kasan_save_stack+0x45/0x70
[   26.189936]  kasan_save_track+0x18/0x40
[   26.190118]  kasan_save_alloc_info+0x3b/0x50
[   26.190260]  __kasan_kmalloc+0xb7/0xc0
[   26.190391]  __kmalloc_cache_noprof+0x189/0x420
[   26.190778]  kasan_atomics+0x95/0x310
[   26.190964]  kunit_try_run_case+0x1a5/0x480
[   26.191176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.191426]  kthread+0x337/0x6f0
[   26.191606]  ret_from_fork+0x116/0x1d0
[   26.191770]  ret_from_fork_asm+0x1a/0x30
[   26.191935] 
[   26.192008] The buggy address belongs to the object at ffff888106195400
[   26.192008]  which belongs to the cache kmalloc-64 of size 64
[   26.192500] The buggy address is located 0 bytes to the right of
[   26.192500]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.192943] 
[   26.193010] The buggy address belongs to the physical page:
[   26.193177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.193422] flags: 0x200000000000000(node=0|zone=2)
[   26.193794] page_type: f5(slab)
[   26.193960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.194299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.194640] page dumped because: kasan: bad access detected
[   26.194854] 
[   26.194928] Memory state around the buggy address:
[   26.195141]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.195404]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.195641] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.195957]                                      ^
[   26.196181]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.196482]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.196732] ==================================================================
[   26.237331] ==================================================================
[   26.237886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   26.238235] Read of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.238536] 
[   26.238644] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.238691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.238705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.238727] Call Trace:
[   26.238744]  <TASK>
[   26.238761]  dump_stack_lvl+0x73/0xb0
[   26.238790]  print_report+0xd1/0x650
[   26.238814]  ? __virt_addr_valid+0x1db/0x2d0
[   26.238838]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.238865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.238891]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.238917]  kasan_report+0x141/0x180
[   26.238941]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.238971]  __asan_report_load4_noabort+0x18/0x20
[   26.238997]  kasan_atomics_helper+0x4a02/0x5450
[   26.239026]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.239053]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.239078]  ? kasan_atomics+0x152/0x310
[   26.239105]  kasan_atomics+0x1dc/0x310
[   26.239129]  ? __pfx_kasan_atomics+0x10/0x10
[   26.239152]  ? trace_hardirqs_on+0x37/0xe0
[   26.239175]  ? __pfx_read_tsc+0x10/0x10
[   26.239209]  ? ktime_get_ts64+0x86/0x230
[   26.239235]  kunit_try_run_case+0x1a5/0x480
[   26.239261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.239288]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.239312]  ? __kthread_parkme+0x82/0x180
[   26.239334]  ? preempt_count_sub+0x50/0x80
[   26.239358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.239384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.239409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.239434]  kthread+0x337/0x6f0
[   26.239467]  ? trace_preempt_on+0x20/0xc0
[   26.239491]  ? __pfx_kthread+0x10/0x10
[   26.239513]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.239539]  ? calculate_sigpending+0x7b/0xa0
[   26.239564]  ? __pfx_kthread+0x10/0x10
[   26.239587]  ret_from_fork+0x116/0x1d0
[   26.239608]  ? __pfx_kthread+0x10/0x10
[   26.239630]  ret_from_fork_asm+0x1a/0x30
[   26.239664]  </TASK>
[   26.239676] 
[   26.246810] Allocated by task 314:
[   26.246979]  kasan_save_stack+0x45/0x70
[   26.247121]  kasan_save_track+0x18/0x40
[   26.247252]  kasan_save_alloc_info+0x3b/0x50
[   26.247395]  __kasan_kmalloc+0xb7/0xc0
[   26.247613]  __kmalloc_cache_noprof+0x189/0x420
[   26.247829]  kasan_atomics+0x95/0x310
[   26.248011]  kunit_try_run_case+0x1a5/0x480
[   26.248209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.248478]  kthread+0x337/0x6f0
[   26.248728]  ret_from_fork+0x116/0x1d0
[   26.248873]  ret_from_fork_asm+0x1a/0x30
[   26.249067] 
[   26.249150] The buggy address belongs to the object at ffff888106195400
[   26.249150]  which belongs to the cache kmalloc-64 of size 64
[   26.249592] The buggy address is located 0 bytes to the right of
[   26.249592]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.250014] 
[   26.250105] The buggy address belongs to the physical page:
[   26.250431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.250864] flags: 0x200000000000000(node=0|zone=2)
[   26.251057] page_type: f5(slab)
[   26.251187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.251529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.251813] page dumped because: kasan: bad access detected
[   26.252032] 
[   26.252119] Memory state around the buggy address:
[   26.252345]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.252647]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.252911] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.253168]                                      ^
[   26.253385]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.253641]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.253853] ==================================================================
[   26.339742] ==================================================================
[   26.340076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   26.340775] Read of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.341062] 
[   26.341140] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.341185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.341208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.341229] Call Trace:
[   26.341245]  <TASK>
[   26.341263]  dump_stack_lvl+0x73/0xb0
[   26.341289]  print_report+0xd1/0x650
[   26.341312]  ? __virt_addr_valid+0x1db/0x2d0
[   26.341335]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.341362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.341388]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.341414]  kasan_report+0x141/0x180
[   26.341437]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.341481]  __asan_report_load8_noabort+0x18/0x20
[   26.341506]  kasan_atomics_helper+0x4eae/0x5450
[   26.341534]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.341562]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.341587]  ? kasan_atomics+0x152/0x310
[   26.341614]  kasan_atomics+0x1dc/0x310
[   26.341638]  ? __pfx_kasan_atomics+0x10/0x10
[   26.341662]  ? trace_hardirqs_on+0x37/0xe0
[   26.341684]  ? __pfx_read_tsc+0x10/0x10
[   26.341706]  ? ktime_get_ts64+0x86/0x230
[   26.341732]  kunit_try_run_case+0x1a5/0x480
[   26.341757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.341784]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.341807]  ? __kthread_parkme+0x82/0x180
[   26.341830]  ? preempt_count_sub+0x50/0x80
[   26.341859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.341885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.341910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.341936]  kthread+0x337/0x6f0
[   26.341957]  ? trace_preempt_on+0x20/0xc0
[   26.341980]  ? __pfx_kthread+0x10/0x10
[   26.342003]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.342028]  ? calculate_sigpending+0x7b/0xa0
[   26.342053]  ? __pfx_kthread+0x10/0x10
[   26.342076]  ret_from_fork+0x116/0x1d0
[   26.342097]  ? __pfx_kthread+0x10/0x10
[   26.342119]  ret_from_fork_asm+0x1a/0x30
[   26.342152]  </TASK>
[   26.342165] 
[   26.349192] Allocated by task 314:
[   26.349346]  kasan_save_stack+0x45/0x70
[   26.349517]  kasan_save_track+0x18/0x40
[   26.349661]  kasan_save_alloc_info+0x3b/0x50
[   26.349804]  __kasan_kmalloc+0xb7/0xc0
[   26.349939]  __kmalloc_cache_noprof+0x189/0x420
[   26.350108]  kasan_atomics+0x95/0x310
[   26.350406]  kunit_try_run_case+0x1a5/0x480
[   26.350621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.350870]  kthread+0x337/0x6f0
[   26.351033]  ret_from_fork+0x116/0x1d0
[   26.351249]  ret_from_fork_asm+0x1a/0x30
[   26.351405] 
[   26.351507] The buggy address belongs to the object at ffff888106195400
[   26.351507]  which belongs to the cache kmalloc-64 of size 64
[   26.351958] The buggy address is located 0 bytes to the right of
[   26.351958]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.352489] 
[   26.352577] The buggy address belongs to the physical page:
[   26.352798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.353095] flags: 0x200000000000000(node=0|zone=2)
[   26.353311] page_type: f5(slab)
[   26.353465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.353752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.354055] page dumped because: kasan: bad access detected
[   26.354315] 
[   26.354404] Memory state around the buggy address:
[   26.354588]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.354800]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.355008] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.355372]                                      ^
[   26.355602]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.355916]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.356262] ==================================================================
[   25.775448] ==================================================================
[   25.775749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   25.776047] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.776521] 
[   25.776619] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.776667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.776682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.776704] Call Trace:
[   25.776718]  <TASK>
[   25.776734]  dump_stack_lvl+0x73/0xb0
[   25.776762]  print_report+0xd1/0x650
[   25.776785]  ? __virt_addr_valid+0x1db/0x2d0
[   25.776809]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.776835]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.776862]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.776888]  kasan_report+0x141/0x180
[   25.776911]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.776941]  kasan_check_range+0x10c/0x1c0
[   25.776966]  __kasan_check_write+0x18/0x20
[   25.776990]  kasan_atomics_helper+0x5fe/0x5450
[   25.777018]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.777044]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.777069]  ? kasan_atomics+0x152/0x310
[   25.777095]  kasan_atomics+0x1dc/0x310
[   25.777118]  ? __pfx_kasan_atomics+0x10/0x10
[   25.777141]  ? trace_hardirqs_on+0x37/0xe0
[   25.777164]  ? __pfx_read_tsc+0x10/0x10
[   25.777186]  ? ktime_get_ts64+0x86/0x230
[   25.777212]  kunit_try_run_case+0x1a5/0x480
[   25.777237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.777263]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.777287]  ? __kthread_parkme+0x82/0x180
[   25.777311]  ? preempt_count_sub+0x50/0x80
[   25.777335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.777361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.777385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.777426]  kthread+0x337/0x6f0
[   25.777448]  ? trace_preempt_on+0x20/0xc0
[   25.777481]  ? __pfx_kthread+0x10/0x10
[   25.777503]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.777528]  ? calculate_sigpending+0x7b/0xa0
[   25.777554]  ? __pfx_kthread+0x10/0x10
[   25.777577]  ret_from_fork+0x116/0x1d0
[   25.777597]  ? __pfx_kthread+0x10/0x10
[   25.777619]  ret_from_fork_asm+0x1a/0x30
[   25.777651]  </TASK>
[   25.777664] 
[   25.785311] Allocated by task 314:
[   25.785500]  kasan_save_stack+0x45/0x70
[   25.785699]  kasan_save_track+0x18/0x40
[   25.786072]  kasan_save_alloc_info+0x3b/0x50
[   25.786279]  __kasan_kmalloc+0xb7/0xc0
[   25.786563]  __kmalloc_cache_noprof+0x189/0x420
[   25.786750]  kasan_atomics+0x95/0x310
[   25.786878]  kunit_try_run_case+0x1a5/0x480
[   25.787019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.787426]  kthread+0x337/0x6f0
[   25.787610]  ret_from_fork+0x116/0x1d0
[   25.787796]  ret_from_fork_asm+0x1a/0x30
[   25.787987] 
[   25.788067] The buggy address belongs to the object at ffff888106195400
[   25.788067]  which belongs to the cache kmalloc-64 of size 64
[   25.788724] The buggy address is located 0 bytes to the right of
[   25.788724]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.789237] 
[   25.789472] The buggy address belongs to the physical page:
[   25.789752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.790029] flags: 0x200000000000000(node=0|zone=2)
[   25.790215] page_type: f5(slab)
[   25.790379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.790872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.791104] page dumped because: kasan: bad access detected
[   25.791522] 
[   25.791615] Memory state around the buggy address:
[   25.791796]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.792006]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.792217] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.792427]                                      ^
[   25.793792]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.794908]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.796042] ==================================================================
[   26.607318] ==================================================================
[   26.607676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   26.608010] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.608366] 
[   26.608480] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.608528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.608542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.608564] Call Trace:
[   26.608579]  <TASK>
[   26.608594]  dump_stack_lvl+0x73/0xb0
[   26.608621]  print_report+0xd1/0x650
[   26.608644]  ? __virt_addr_valid+0x1db/0x2d0
[   26.608669]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.608694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.608721]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.608747]  kasan_report+0x141/0x180
[   26.608769]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.608800]  kasan_check_range+0x10c/0x1c0
[   26.608825]  __kasan_check_write+0x18/0x20
[   26.608848]  kasan_atomics_helper+0x1b22/0x5450
[   26.608875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.608902]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.608927]  ? kasan_atomics+0x152/0x310
[   26.608954]  kasan_atomics+0x1dc/0x310
[   26.608977]  ? __pfx_kasan_atomics+0x10/0x10
[   26.609000]  ? trace_hardirqs_on+0x37/0xe0
[   26.609022]  ? __pfx_read_tsc+0x10/0x10
[   26.609045]  ? ktime_get_ts64+0x86/0x230
[   26.609070]  kunit_try_run_case+0x1a5/0x480
[   26.609095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.609121]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.609144]  ? __kthread_parkme+0x82/0x180
[   26.609166]  ? preempt_count_sub+0x50/0x80
[   26.609213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.609239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.609265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.609290]  kthread+0x337/0x6f0
[   26.609312]  ? trace_preempt_on+0x20/0xc0
[   26.609335]  ? __pfx_kthread+0x10/0x10
[   26.609357]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.609382]  ? calculate_sigpending+0x7b/0xa0
[   26.609408]  ? __pfx_kthread+0x10/0x10
[   26.609430]  ret_from_fork+0x116/0x1d0
[   26.609451]  ? __pfx_kthread+0x10/0x10
[   26.609482]  ret_from_fork_asm+0x1a/0x30
[   26.609514]  </TASK>
[   26.609525] 
[   26.616541] Allocated by task 314:
[   26.616701]  kasan_save_stack+0x45/0x70
[   26.616894]  kasan_save_track+0x18/0x40
[   26.617024]  kasan_save_alloc_info+0x3b/0x50
[   26.617165]  __kasan_kmalloc+0xb7/0xc0
[   26.617314]  __kmalloc_cache_noprof+0x189/0x420
[   26.617471]  kasan_atomics+0x95/0x310
[   26.617651]  kunit_try_run_case+0x1a5/0x480
[   26.617860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.618108]  kthread+0x337/0x6f0
[   26.618300]  ret_from_fork+0x116/0x1d0
[   26.618490]  ret_from_fork_asm+0x1a/0x30
[   26.618689] 
[   26.618779] The buggy address belongs to the object at ffff888106195400
[   26.618779]  which belongs to the cache kmalloc-64 of size 64
[   26.619272] The buggy address is located 0 bytes to the right of
[   26.619272]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.619768] 
[   26.619856] The buggy address belongs to the physical page:
[   26.620077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.620348] flags: 0x200000000000000(node=0|zone=2)
[   26.620544] page_type: f5(slab)
[   26.620710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.621050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.621386] page dumped because: kasan: bad access detected
[   26.621620] 
[   26.621712] Memory state around the buggy address:
[   26.621895]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.622137]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.622372] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.622590]                                      ^
[   26.622813]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.623129]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.623471] ==================================================================
[   26.897859] ==================================================================
[   26.898100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   26.898332] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.898566] 
[   26.898671] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.898720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.898735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.898758] Call Trace:
[   26.898773]  <TASK>
[   26.898790]  dump_stack_lvl+0x73/0xb0
[   26.898818]  print_report+0xd1/0x650
[   26.898841]  ? __virt_addr_valid+0x1db/0x2d0
[   26.898865]  ? kasan_atomics_helper+0x224c/0x5450
[   26.898890]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.898918]  ? kasan_atomics_helper+0x224c/0x5450
[   26.898944]  kasan_report+0x141/0x180
[   26.898967]  ? kasan_atomics_helper+0x224c/0x5450
[   26.898998]  kasan_check_range+0x10c/0x1c0
[   26.899022]  __kasan_check_write+0x18/0x20
[   26.899047]  kasan_atomics_helper+0x224c/0x5450
[   26.899074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.899101]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.899126]  ? kasan_atomics+0x152/0x310
[   26.899153]  kasan_atomics+0x1dc/0x310
[   26.899177]  ? __pfx_kasan_atomics+0x10/0x10
[   26.899516]  ? trace_hardirqs_on+0x37/0xe0
[   26.899545]  ? __pfx_read_tsc+0x10/0x10
[   26.899569]  ? ktime_get_ts64+0x86/0x230
[   26.899796]  kunit_try_run_case+0x1a5/0x480
[   26.899827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.899854]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.899879]  ? __kthread_parkme+0x82/0x180
[   26.899902]  ? preempt_count_sub+0x50/0x80
[   26.899927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.899953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.899978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.900004]  kthread+0x337/0x6f0
[   26.900025]  ? trace_preempt_on+0x20/0xc0
[   26.900049]  ? __pfx_kthread+0x10/0x10
[   26.900071]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.900097]  ? calculate_sigpending+0x7b/0xa0
[   26.900122]  ? __pfx_kthread+0x10/0x10
[   26.900146]  ret_from_fork+0x116/0x1d0
[   26.900167]  ? __pfx_kthread+0x10/0x10
[   26.900203]  ret_from_fork_asm+0x1a/0x30
[   26.900235]  </TASK>
[   26.900247] 
[   26.908818] Allocated by task 314:
[   26.909000]  kasan_save_stack+0x45/0x70
[   26.909152]  kasan_save_track+0x18/0x40
[   26.909671]  kasan_save_alloc_info+0x3b/0x50
[   26.909939]  __kasan_kmalloc+0xb7/0xc0
[   26.910099]  __kmalloc_cache_noprof+0x189/0x420
[   26.910365]  kasan_atomics+0x95/0x310
[   26.910669]  kunit_try_run_case+0x1a5/0x480
[   26.910845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.911080]  kthread+0x337/0x6f0
[   26.911237]  ret_from_fork+0x116/0x1d0
[   26.911666]  ret_from_fork_asm+0x1a/0x30
[   26.911840] 
[   26.912044] The buggy address belongs to the object at ffff888106195400
[   26.912044]  which belongs to the cache kmalloc-64 of size 64
[   26.912403] The buggy address is located 0 bytes to the right of
[   26.912403]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.912778] 
[   26.912850] The buggy address belongs to the physical page:
[   26.913026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.913808] flags: 0x200000000000000(node=0|zone=2)
[   26.914111] page_type: f5(slab)
[   26.914317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.914615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.914933] page dumped because: kasan: bad access detected
[   26.915160] 
[   26.915237] Memory state around the buggy address:
[   26.915789]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.916009]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.916229] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.916754]                                      ^
[   26.917079]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.917546]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.917818] ==================================================================
[   26.780260] ==================================================================
[   26.780610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   26.780987] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.781447] 
[   26.781538] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.781585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.781599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.781621] Call Trace:
[   26.781635]  <TASK>
[   26.781651]  dump_stack_lvl+0x73/0xb0
[   26.781677]  print_report+0xd1/0x650
[   26.781701]  ? __virt_addr_valid+0x1db/0x2d0
[   26.781725]  ? kasan_atomics_helper+0x2006/0x5450
[   26.781751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.781778]  ? kasan_atomics_helper+0x2006/0x5450
[   26.781805]  kasan_report+0x141/0x180
[   26.781828]  ? kasan_atomics_helper+0x2006/0x5450
[   26.781865]  kasan_check_range+0x10c/0x1c0
[   26.781889]  __kasan_check_write+0x18/0x20
[   26.781914]  kasan_atomics_helper+0x2006/0x5450
[   26.781941]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.781968]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.781994]  ? kasan_atomics+0x152/0x310
[   26.782020]  kasan_atomics+0x1dc/0x310
[   26.782044]  ? __pfx_kasan_atomics+0x10/0x10
[   26.782067]  ? trace_hardirqs_on+0x37/0xe0
[   26.782090]  ? __pfx_read_tsc+0x10/0x10
[   26.782112]  ? ktime_get_ts64+0x86/0x230
[   26.782137]  kunit_try_run_case+0x1a5/0x480
[   26.782163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.782189]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.782221]  ? __kthread_parkme+0x82/0x180
[   26.782242]  ? preempt_count_sub+0x50/0x80
[   26.782266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.782293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.782318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.782344]  kthread+0x337/0x6f0
[   26.782364]  ? trace_preempt_on+0x20/0xc0
[   26.782388]  ? __pfx_kthread+0x10/0x10
[   26.782409]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.782434]  ? calculate_sigpending+0x7b/0xa0
[   26.782469]  ? __pfx_kthread+0x10/0x10
[   26.782492]  ret_from_fork+0x116/0x1d0
[   26.782512]  ? __pfx_kthread+0x10/0x10
[   26.782535]  ret_from_fork_asm+0x1a/0x30
[   26.782567]  </TASK>
[   26.782580] 
[   26.789837] Allocated by task 314:
[   26.790012]  kasan_save_stack+0x45/0x70
[   26.790163]  kasan_save_track+0x18/0x40
[   26.790361]  kasan_save_alloc_info+0x3b/0x50
[   26.790520]  __kasan_kmalloc+0xb7/0xc0
[   26.790650]  __kmalloc_cache_noprof+0x189/0x420
[   26.790799]  kasan_atomics+0x95/0x310
[   26.790982]  kunit_try_run_case+0x1a5/0x480
[   26.791179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.791435]  kthread+0x337/0x6f0
[   26.791605]  ret_from_fork+0x116/0x1d0
[   26.791763]  ret_from_fork_asm+0x1a/0x30
[   26.791944] 
[   26.792035] The buggy address belongs to the object at ffff888106195400
[   26.792035]  which belongs to the cache kmalloc-64 of size 64
[   26.792383] The buggy address is located 0 bytes to the right of
[   26.792383]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.792938] 
[   26.793032] The buggy address belongs to the physical page:
[   26.793293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.793622] flags: 0x200000000000000(node=0|zone=2)
[   26.793784] page_type: f5(slab)
[   26.793920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.794339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.794621] page dumped because: kasan: bad access detected
[   26.794848] 
[   26.794922] Memory state around the buggy address:
[   26.795099]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.795424]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.795705] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.795966]                                      ^
[   26.796152]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.796556]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.796828] ==================================================================
[   25.832850] ==================================================================
[   25.833555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   25.833858] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   25.834152] 
[   25.834414] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   25.834682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.834701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.834724] Call Trace:
[   25.834742]  <TASK>
[   25.834759]  dump_stack_lvl+0x73/0xb0
[   25.834799]  print_report+0xd1/0x650
[   25.834823]  ? __virt_addr_valid+0x1db/0x2d0
[   25.834848]  ? kasan_atomics_helper+0x72f/0x5450
[   25.834874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.834900]  ? kasan_atomics_helper+0x72f/0x5450
[   25.834926]  kasan_report+0x141/0x180
[   25.834949]  ? kasan_atomics_helper+0x72f/0x5450
[   25.834980]  kasan_check_range+0x10c/0x1c0
[   25.835004]  __kasan_check_write+0x18/0x20
[   25.835028]  kasan_atomics_helper+0x72f/0x5450
[   25.835056]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.835083]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.835107]  ? kasan_atomics+0x152/0x310
[   25.835134]  kasan_atomics+0x1dc/0x310
[   25.835188]  ? __pfx_kasan_atomics+0x10/0x10
[   25.835211]  ? trace_hardirqs_on+0x37/0xe0
[   25.835246]  ? __pfx_read_tsc+0x10/0x10
[   25.835269]  ? ktime_get_ts64+0x86/0x230
[   25.835294]  kunit_try_run_case+0x1a5/0x480
[   25.835320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.835347]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.835370]  ? __kthread_parkme+0x82/0x180
[   25.835392]  ? preempt_count_sub+0x50/0x80
[   25.835417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.835443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.835478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.835505]  kthread+0x337/0x6f0
[   25.835527]  ? trace_preempt_on+0x20/0xc0
[   25.835551]  ? __pfx_kthread+0x10/0x10
[   25.835573]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.835599]  ? calculate_sigpending+0x7b/0xa0
[   25.835624]  ? __pfx_kthread+0x10/0x10
[   25.835648]  ret_from_fork+0x116/0x1d0
[   25.835669]  ? __pfx_kthread+0x10/0x10
[   25.835692]  ret_from_fork_asm+0x1a/0x30
[   25.835724]  </TASK>
[   25.835737] 
[   25.848090] Allocated by task 314:
[   25.848370]  kasan_save_stack+0x45/0x70
[   25.848787]  kasan_save_track+0x18/0x40
[   25.849078]  kasan_save_alloc_info+0x3b/0x50
[   25.849528]  __kasan_kmalloc+0xb7/0xc0
[   25.849734]  __kmalloc_cache_noprof+0x189/0x420
[   25.849937]  kasan_atomics+0x95/0x310
[   25.850106]  kunit_try_run_case+0x1a5/0x480
[   25.850558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.850902]  kthread+0x337/0x6f0
[   25.851290]  ret_from_fork+0x116/0x1d0
[   25.851537]  ret_from_fork_asm+0x1a/0x30
[   25.851935] 
[   25.852025] The buggy address belongs to the object at ffff888106195400
[   25.852025]  which belongs to the cache kmalloc-64 of size 64
[   25.853031] The buggy address is located 0 bytes to the right of
[   25.853031]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   25.854357] 
[   25.854452] The buggy address belongs to the physical page:
[   25.854877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   25.855695] flags: 0x200000000000000(node=0|zone=2)
[   25.856038] page_type: f5(slab)
[   25.856486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.856994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.857644] page dumped because: kasan: bad access detected
[   25.858087] 
[   25.858312] Memory state around the buggy address:
[   25.858645]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.858940]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.859439] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.859928]                                      ^
[   25.860504]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.860813]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.861088] ==================================================================
[   26.730092] ==================================================================
[   26.730643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   26.731010] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.731534] 
[   26.731659] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.731721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.731736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.731759] Call Trace:
[   26.731793]  <TASK>
[   26.731809]  dump_stack_lvl+0x73/0xb0
[   26.731836]  print_report+0xd1/0x650
[   26.731859]  ? __virt_addr_valid+0x1db/0x2d0
[   26.731883]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.731909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.731935]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.731961]  kasan_report+0x141/0x180
[   26.731985]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.732016]  kasan_check_range+0x10c/0x1c0
[   26.732040]  __kasan_check_write+0x18/0x20
[   26.732065]  kasan_atomics_helper+0x1f43/0x5450
[   26.732091]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.732136]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.732162]  ? kasan_atomics+0x152/0x310
[   26.732188]  kasan_atomics+0x1dc/0x310
[   26.732220]  ? __pfx_kasan_atomics+0x10/0x10
[   26.732244]  ? trace_hardirqs_on+0x37/0xe0
[   26.732268]  ? __pfx_read_tsc+0x10/0x10
[   26.732290]  ? ktime_get_ts64+0x86/0x230
[   26.732315]  kunit_try_run_case+0x1a5/0x480
[   26.732341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.732387]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.732410]  ? __kthread_parkme+0x82/0x180
[   26.732432]  ? preempt_count_sub+0x50/0x80
[   26.732466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.732492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.732517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.732561]  kthread+0x337/0x6f0
[   26.732582]  ? trace_preempt_on+0x20/0xc0
[   26.732604]  ? __pfx_kthread+0x10/0x10
[   26.732627]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.732652]  ? calculate_sigpending+0x7b/0xa0
[   26.732677]  ? __pfx_kthread+0x10/0x10
[   26.732717]  ret_from_fork+0x116/0x1d0
[   26.732737]  ? __pfx_kthread+0x10/0x10
[   26.732759]  ret_from_fork_asm+0x1a/0x30
[   26.732792]  </TASK>
[   26.732804] 
[   26.740676] Allocated by task 314:
[   26.740880]  kasan_save_stack+0x45/0x70
[   26.741100]  kasan_save_track+0x18/0x40
[   26.741419]  kasan_save_alloc_info+0x3b/0x50
[   26.741636]  __kasan_kmalloc+0xb7/0xc0
[   26.741857]  __kmalloc_cache_noprof+0x189/0x420
[   26.742083]  kasan_atomics+0x95/0x310
[   26.742238]  kunit_try_run_case+0x1a5/0x480
[   26.742479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.742922]  kthread+0x337/0x6f0
[   26.743255]  ret_from_fork+0x116/0x1d0
[   26.743431]  ret_from_fork_asm+0x1a/0x30
[   26.744062] 
[   26.744140] The buggy address belongs to the object at ffff888106195400
[   26.744140]  which belongs to the cache kmalloc-64 of size 64
[   26.744638] The buggy address is located 0 bytes to the right of
[   26.744638]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.744983] 
[   26.745048] The buggy address belongs to the physical page:
[   26.745210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.746181] flags: 0x200000000000000(node=0|zone=2)
[   26.746884] page_type: f5(slab)
[   26.747336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.748210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.749064] page dumped because: kasan: bad access detected
[   26.749886] 
[   26.750057] Memory state around the buggy address:
[   26.750827]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.751656]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.752520] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.753402]                                      ^
[   26.753988]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.754513]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.754735] ==================================================================
[   26.099266] ==================================================================
[   26.099991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   26.100339] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.100692] 
[   26.100778] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.100837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.100852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.100875] Call Trace:
[   26.100893]  <TASK>
[   26.100909]  dump_stack_lvl+0x73/0xb0
[   26.100937]  print_report+0xd1/0x650
[   26.100960]  ? __virt_addr_valid+0x1db/0x2d0
[   26.100985]  ? kasan_atomics_helper+0xe78/0x5450
[   26.101011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.101039]  ? kasan_atomics_helper+0xe78/0x5450
[   26.101066]  kasan_report+0x141/0x180
[   26.101089]  ? kasan_atomics_helper+0xe78/0x5450
[   26.101120]  kasan_check_range+0x10c/0x1c0
[   26.101145]  __kasan_check_write+0x18/0x20
[   26.101169]  kasan_atomics_helper+0xe78/0x5450
[   26.101197]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.101225]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.101251]  ? kasan_atomics+0x152/0x310
[   26.101278]  kasan_atomics+0x1dc/0x310
[   26.101302]  ? __pfx_kasan_atomics+0x10/0x10
[   26.101326]  ? trace_hardirqs_on+0x37/0xe0
[   26.101349]  ? __pfx_read_tsc+0x10/0x10
[   26.101372]  ? ktime_get_ts64+0x86/0x230
[   26.101399]  kunit_try_run_case+0x1a5/0x480
[   26.101424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.101450]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.101488]  ? __kthread_parkme+0x82/0x180
[   26.101511]  ? preempt_count_sub+0x50/0x80
[   26.101539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.101566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.101592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.101619]  kthread+0x337/0x6f0
[   26.101641]  ? trace_preempt_on+0x20/0xc0
[   26.101666]  ? __pfx_kthread+0x10/0x10
[   26.101689]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.101716]  ? calculate_sigpending+0x7b/0xa0
[   26.101741]  ? __pfx_kthread+0x10/0x10
[   26.101766]  ret_from_fork+0x116/0x1d0
[   26.101788]  ? __pfx_kthread+0x10/0x10
[   26.101812]  ret_from_fork_asm+0x1a/0x30
[   26.101867]  </TASK>
[   26.101880] 
[   26.108968] Allocated by task 314:
[   26.109143]  kasan_save_stack+0x45/0x70
[   26.109362]  kasan_save_track+0x18/0x40
[   26.109506]  kasan_save_alloc_info+0x3b/0x50
[   26.109652]  __kasan_kmalloc+0xb7/0xc0
[   26.109785]  __kmalloc_cache_noprof+0x189/0x420
[   26.110014]  kasan_atomics+0x95/0x310
[   26.110200]  kunit_try_run_case+0x1a5/0x480
[   26.110414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.110677]  kthread+0x337/0x6f0
[   26.110823]  ret_from_fork+0x116/0x1d0
[   26.110990]  ret_from_fork_asm+0x1a/0x30
[   26.111174] 
[   26.111278] The buggy address belongs to the object at ffff888106195400
[   26.111278]  which belongs to the cache kmalloc-64 of size 64
[   26.111768] The buggy address is located 0 bytes to the right of
[   26.111768]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.112349] 
[   26.112427] The buggy address belongs to the physical page:
[   26.112665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.112972] flags: 0x200000000000000(node=0|zone=2)
[   26.113187] page_type: f5(slab)
[   26.113338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.113644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.113949] page dumped because: kasan: bad access detected
[   26.114151] 
[   26.114270] Memory state around the buggy address:
[   26.114475]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.114756]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.115025] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.115311]                                      ^
[   26.115517]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.115731]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.115941] ==================================================================
[   26.675483] ==================================================================
[   26.675861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   26.676302] Write of size 8 at addr ffff888106195430 by task kunit_try_catch/314
[   26.676695] 
[   26.676821] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.676907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.676935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.676970] Call Trace:
[   26.676999]  <TASK>
[   26.677028]  dump_stack_lvl+0x73/0xb0
[   26.677069]  print_report+0xd1/0x650
[   26.677092]  ? __virt_addr_valid+0x1db/0x2d0
[   26.677142]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.677213]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.677241]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.677267]  kasan_report+0x141/0x180
[   26.677290]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.677321]  kasan_check_range+0x10c/0x1c0
[   26.677346]  __kasan_check_write+0x18/0x20
[   26.677370]  kasan_atomics_helper+0x1d7a/0x5450
[   26.677397]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.677423]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.677476]  ? kasan_atomics+0x152/0x310
[   26.677503]  kasan_atomics+0x1dc/0x310
[   26.677527]  ? __pfx_kasan_atomics+0x10/0x10
[   26.677567]  ? trace_hardirqs_on+0x37/0xe0
[   26.677591]  ? __pfx_read_tsc+0x10/0x10
[   26.677630]  ? ktime_get_ts64+0x86/0x230
[   26.677655]  kunit_try_run_case+0x1a5/0x480
[   26.677681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.677708]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.677731]  ? __kthread_parkme+0x82/0x180
[   26.677755]  ? preempt_count_sub+0x50/0x80
[   26.677799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.677825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.677854]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.677881]  kthread+0x337/0x6f0
[   26.677903]  ? trace_preempt_on+0x20/0xc0
[   26.677926]  ? __pfx_kthread+0x10/0x10
[   26.677948]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.677989]  ? calculate_sigpending+0x7b/0xa0
[   26.678028]  ? __pfx_kthread+0x10/0x10
[   26.678050]  ret_from_fork+0x116/0x1d0
[   26.678070]  ? __pfx_kthread+0x10/0x10
[   26.678093]  ret_from_fork_asm+0x1a/0x30
[   26.678125]  </TASK>
[   26.678136] 
[   26.685722] Allocated by task 314:
[   26.685865]  kasan_save_stack+0x45/0x70
[   26.686081]  kasan_save_track+0x18/0x40
[   26.686252]  kasan_save_alloc_info+0x3b/0x50
[   26.686397]  __kasan_kmalloc+0xb7/0xc0
[   26.686536]  __kmalloc_cache_noprof+0x189/0x420
[   26.686685]  kasan_atomics+0x95/0x310
[   26.686811]  kunit_try_run_case+0x1a5/0x480
[   26.686952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.687122]  kthread+0x337/0x6f0
[   26.687261]  ret_from_fork+0x116/0x1d0
[   26.687445]  ret_from_fork_asm+0x1a/0x30
[   26.687669] 
[   26.687778] The buggy address belongs to the object at ffff888106195400
[   26.687778]  which belongs to the cache kmalloc-64 of size 64
[   26.688358] The buggy address is located 0 bytes to the right of
[   26.688358]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.688932] 
[   26.689023] The buggy address belongs to the physical page:
[   26.689348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.689762] flags: 0x200000000000000(node=0|zone=2)
[   26.690050] page_type: f5(slab)
[   26.690261] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.690603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.690932] page dumped because: kasan: bad access detected
[   26.691176] 
[   26.691283] Memory state around the buggy address:
[   26.691504]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.691738]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.691946] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.692152]                                      ^
[   26.692325]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.692647]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.692979] ==================================================================
[   26.289368] ==================================================================
[   26.289694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   26.289943] Write of size 4 at addr ffff888106195430 by task kunit_try_catch/314
[   26.290213] 
[   26.290315] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   26.290361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.290375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.290397] Call Trace:
[   26.290412]  <TASK>
[   26.290429]  dump_stack_lvl+0x73/0xb0
[   26.290466]  print_report+0xd1/0x650
[   26.290490]  ? __virt_addr_valid+0x1db/0x2d0
[   26.290515]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.290541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.290567]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.290594]  kasan_report+0x141/0x180
[   26.290620]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.290652]  kasan_check_range+0x10c/0x1c0
[   26.290677]  __kasan_check_write+0x18/0x20
[   26.290701]  kasan_atomics_helper+0x12e6/0x5450
[   26.290729]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.290755]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.290781]  ? kasan_atomics+0x152/0x310
[   26.290808]  kasan_atomics+0x1dc/0x310
[   26.290832]  ? __pfx_kasan_atomics+0x10/0x10
[   26.290855]  ? trace_hardirqs_on+0x37/0xe0
[   26.290879]  ? __pfx_read_tsc+0x10/0x10
[   26.290901]  ? ktime_get_ts64+0x86/0x230
[   26.290926]  kunit_try_run_case+0x1a5/0x480
[   26.290951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.290977]  ? queued_spin_lock_slowpath+0x116/0xb40
[   26.291000]  ? __kthread_parkme+0x82/0x180
[   26.291022]  ? preempt_count_sub+0x50/0x80
[   26.291047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.291073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.291098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.291124]  kthread+0x337/0x6f0
[   26.291145]  ? trace_preempt_on+0x20/0xc0
[   26.291168]  ? __pfx_kthread+0x10/0x10
[   26.291191]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.291216]  ? calculate_sigpending+0x7b/0xa0
[   26.291241]  ? __pfx_kthread+0x10/0x10
[   26.291264]  ret_from_fork+0x116/0x1d0
[   26.291285]  ? __pfx_kthread+0x10/0x10
[   26.291307]  ret_from_fork_asm+0x1a/0x30
[   26.291339]  </TASK>
[   26.291351] 
[   26.298273] Allocated by task 314:
[   26.298465]  kasan_save_stack+0x45/0x70
[   26.298663]  kasan_save_track+0x18/0x40
[   26.298849]  kasan_save_alloc_info+0x3b/0x50
[   26.299062]  __kasan_kmalloc+0xb7/0xc0
[   26.299326]  __kmalloc_cache_noprof+0x189/0x420
[   26.299558]  kasan_atomics+0x95/0x310
[   26.299744]  kunit_try_run_case+0x1a5/0x480
[   26.299942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.300182]  kthread+0x337/0x6f0
[   26.300344]  ret_from_fork+0x116/0x1d0
[   26.300528]  ret_from_fork_asm+0x1a/0x30
[   26.300712] 
[   26.300786] The buggy address belongs to the object at ffff888106195400
[   26.300786]  which belongs to the cache kmalloc-64 of size 64
[   26.301262] The buggy address is located 0 bytes to the right of
[   26.301262]  allocated 48-byte region [ffff888106195400, ffff888106195430)
[   26.301740] 
[   26.301831] The buggy address belongs to the physical page:
[   26.302055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106195
[   26.302387] flags: 0x200000000000000(node=0|zone=2)
[   26.302607] page_type: f5(slab)
[   26.302751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.303043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.303371] page dumped because: kasan: bad access detected
[   26.303598] 
[   26.303691] Memory state around the buggy address:
[   26.303841]  ffff888106195300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.304054]  ffff888106195380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.304264] >ffff888106195400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.304487]                                      ^
[   26.304704]  ffff888106195480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.305270]  ffff888106195500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.305585] ==================================================================