Hay
Date
July 4, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.391234] ==================================================================
[   32.391444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   32.391530] Write of size 4 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.391728] 
[   32.391764] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.391939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.392002] Hardware name: linux,dummy-virt (DT)
[   32.392422] Call trace:
[   32.392469]  show_stack+0x20/0x38 (C)
[   32.392524]  dump_stack_lvl+0x8c/0xd0
[   32.392580]  print_report+0x118/0x608
[   32.392629]  kasan_report+0xdc/0x128
[   32.392699]  kasan_check_range+0x100/0x1a8
[   32.392762]  __kasan_check_write+0x20/0x30
[   32.392816]  kasan_atomics_helper+0xd3c/0x4858
[   32.392866]  kasan_atomics+0x198/0x2e0
[   32.392925]  kunit_try_run_case+0x170/0x3f0
[   32.392979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.393051]  kthread+0x328/0x630
[   32.393096]  ret_from_fork+0x10/0x20
[   32.393155] 
[   32.393176] Allocated by task 298:
[   32.393209]  kasan_save_stack+0x3c/0x68
[   32.393254]  kasan_save_track+0x20/0x40
[   32.393295]  kasan_save_alloc_info+0x40/0x58
[   32.393335]  __kasan_kmalloc+0xd4/0xd8
[   32.393376]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.393418]  kasan_atomics+0xb8/0x2e0
[   32.393458]  kunit_try_run_case+0x170/0x3f0
[   32.393500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.393547]  kthread+0x328/0x630
[   32.393583]  ret_from_fork+0x10/0x20
[   32.393623] 
[   32.393643] The buggy address belongs to the object at fff00000c5ae7400
[   32.393643]  which belongs to the cache kmalloc-64 of size 64
[   32.393702] The buggy address is located 0 bytes to the right of
[   32.393702]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.394069] 
[   32.394093] The buggy address belongs to the physical page:
[   32.394127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.394274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.394693] page_type: f5(slab)
[   32.394775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.395033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.395096] page dumped because: kasan: bad access detected
[   32.395132] 
[   32.395153] Memory state around the buggy address:
[   32.395228]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.395432]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.395509] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.395616]                                      ^
[   32.395674]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.395741]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.395887] ==================================================================
[   32.528358] ==================================================================
[   32.528599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   32.528659] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.528711] 
[   32.528930] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.529094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.529124] Hardware name: linux,dummy-virt (DT)
[   32.529157] Call trace:
[   32.529189]  show_stack+0x20/0x38 (C)
[   32.529241]  dump_stack_lvl+0x8c/0xd0
[   32.529287]  print_report+0x118/0x608
[   32.529588]  kasan_report+0xdc/0x128
[   32.529691]  kasan_check_range+0x100/0x1a8
[   32.529912]  __kasan_check_write+0x20/0x30
[   32.530008]  kasan_atomics_helper+0x15b4/0x4858
[   32.530073]  kasan_atomics+0x198/0x2e0
[   32.530121]  kunit_try_run_case+0x170/0x3f0
[   32.530190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.530245]  kthread+0x328/0x630
[   32.530288]  ret_from_fork+0x10/0x20
[   32.530337] 
[   32.530360] Allocated by task 298:
[   32.530389]  kasan_save_stack+0x3c/0x68
[   32.530754]  kasan_save_track+0x20/0x40
[   32.530809]  kasan_save_alloc_info+0x40/0x58
[   32.530947]  __kasan_kmalloc+0xd4/0xd8
[   32.531340]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.531512]  kasan_atomics+0xb8/0x2e0
[   32.531583]  kunit_try_run_case+0x170/0x3f0
[   32.531625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.531673]  kthread+0x328/0x630
[   32.531709]  ret_from_fork+0x10/0x20
[   32.531759] 
[   32.531792] The buggy address belongs to the object at fff00000c5ae7400
[   32.531792]  which belongs to the cache kmalloc-64 of size 64
[   32.531856] The buggy address is located 0 bytes to the right of
[   32.531856]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.531932] 
[   32.531966] The buggy address belongs to the physical page:
[   32.532012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.532065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.532113] page_type: f5(slab)
[   32.532154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.532204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.532257] page dumped because: kasan: bad access detected
[   32.532307] 
[   32.532328] Memory state around the buggy address:
[   32.532362]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.532408]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.532452] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.532491]                                      ^
[   32.532546]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.532615]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.532663] ==================================================================
[   32.408660] ==================================================================
[   32.408722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   32.408775] Read of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.408913] 
[   32.408951] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.409037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.409259] Hardware name: linux,dummy-virt (DT)
[   32.409411] Call trace:
[   32.409440]  show_stack+0x20/0x38 (C)
[   32.409495]  dump_stack_lvl+0x8c/0xd0
[   32.409784]  print_report+0x118/0x608
[   32.409931]  kasan_report+0xdc/0x128
[   32.410051]  __asan_report_load8_noabort+0x20/0x30
[   32.410232]  kasan_atomics_helper+0x3f58/0x4858
[   32.410293]  kasan_atomics+0x198/0x2e0
[   32.410343]  kunit_try_run_case+0x170/0x3f0
[   32.410394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.410794]  kthread+0x328/0x630
[   32.411218]  ret_from_fork+0x10/0x20
[   32.411492] 
[   32.411557] Allocated by task 298:
[   32.411589]  kasan_save_stack+0x3c/0x68
[   32.411844]  kasan_save_track+0x20/0x40
[   32.412003]  kasan_save_alloc_info+0x40/0x58
[   32.412121]  __kasan_kmalloc+0xd4/0xd8
[   32.412208]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.412604]  kasan_atomics+0xb8/0x2e0
[   32.412651]  kunit_try_run_case+0x170/0x3f0
[   32.412694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.412987]  kthread+0x328/0x630
[   32.413368]  ret_from_fork+0x10/0x20
[   32.413460] 
[   32.413538] The buggy address belongs to the object at fff00000c5ae7400
[   32.413538]  which belongs to the cache kmalloc-64 of size 64
[   32.413729] The buggy address is located 0 bytes to the right of
[   32.413729]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.414214] 
[   32.414417] The buggy address belongs to the physical page:
[   32.414486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.414660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.414911] page_type: f5(slab)
[   32.415002] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.415125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.415500] page dumped because: kasan: bad access detected
[   32.415656] 
[   32.415804] Memory state around the buggy address:
[   32.415997]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.416150]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.416200] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.416241]                                      ^
[   32.416293]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.416734]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.417075] ==================================================================
[   32.445437] ==================================================================
[   32.445487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   32.445538] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.445662] 
[   32.445695] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.446183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.446216] Hardware name: linux,dummy-virt (DT)
[   32.446252] Call trace:
[   32.446277]  show_stack+0x20/0x38 (C)
[   32.446330]  dump_stack_lvl+0x8c/0xd0
[   32.446379]  print_report+0x118/0x608
[   32.446427]  kasan_report+0xdc/0x128
[   32.446474]  kasan_check_range+0x100/0x1a8
[   32.446522]  __kasan_check_write+0x20/0x30
[   32.446570]  kasan_atomics_helper+0xf88/0x4858
[   32.446620]  kasan_atomics+0x198/0x2e0
[   32.446668]  kunit_try_run_case+0x170/0x3f0
[   32.446718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.446774]  kthread+0x328/0x630
[   32.446817]  ret_from_fork+0x10/0x20
[   32.446864] 
[   32.446887] Allocated by task 298:
[   32.448127]  kasan_save_stack+0x3c/0x68
[   32.448184]  kasan_save_track+0x20/0x40
[   32.448533]  kasan_save_alloc_info+0x40/0x58
[   32.448723]  __kasan_kmalloc+0xd4/0xd8
[   32.448772]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.448822]  kasan_atomics+0xb8/0x2e0
[   32.448870]  kunit_try_run_case+0x170/0x3f0
[   32.448933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.448981]  kthread+0x328/0x630
[   32.449017]  ret_from_fork+0x10/0x20
[   32.449055] 
[   32.449078] The buggy address belongs to the object at fff00000c5ae7400
[   32.449078]  which belongs to the cache kmalloc-64 of size 64
[   32.449140] The buggy address is located 0 bytes to the right of
[   32.449140]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.449205] 
[   32.449230] The buggy address belongs to the physical page:
[   32.449263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.449313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.449362] page_type: f5(slab)
[   32.449400] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.449454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.449497] page dumped because: kasan: bad access detected
[   32.449530] 
[   32.449551] Memory state around the buggy address:
[   32.449586]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.449628]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.449672] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.451010]                                      ^
[   32.451070]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.451149]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.451318] ==================================================================
[   32.396061] ==================================================================
[   32.396106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   32.396387] Read of size 4 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.396578] 
[   32.396618] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.396706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.396835] Hardware name: linux,dummy-virt (DT)
[   32.396892] Call trace:
[   32.396996]  show_stack+0x20/0x38 (C)
[   32.397071]  dump_stack_lvl+0x8c/0xd0
[   32.397152]  print_report+0x118/0x608
[   32.397205]  kasan_report+0xdc/0x128
[   32.397292]  __asan_report_load4_noabort+0x20/0x30
[   32.397401]  kasan_atomics_helper+0x3e04/0x4858
[   32.397454]  kasan_atomics+0x198/0x2e0
[   32.397717]  kunit_try_run_case+0x170/0x3f0
[   32.398028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.398344]  kthread+0x328/0x630
[   32.398518]  ret_from_fork+0x10/0x20
[   32.398728] 
[   32.398946] Allocated by task 298:
[   32.399067]  kasan_save_stack+0x3c/0x68
[   32.399116]  kasan_save_track+0x20/0x40
[   32.399303]  kasan_save_alloc_info+0x40/0x58
[   32.399526]  __kasan_kmalloc+0xd4/0xd8
[   32.399634]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.399934]  kasan_atomics+0xb8/0x2e0
[   32.400065]  kunit_try_run_case+0x170/0x3f0
[   32.400251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.400328]  kthread+0x328/0x630
[   32.400468]  ret_from_fork+0x10/0x20
[   32.400703] 
[   32.400769] The buggy address belongs to the object at fff00000c5ae7400
[   32.400769]  which belongs to the cache kmalloc-64 of size 64
[   32.401088] The buggy address is located 0 bytes to the right of
[   32.401088]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.401182] 
[   32.401274] The buggy address belongs to the physical page:
[   32.401372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.401496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.401558] page_type: f5(slab)
[   32.401599] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.401790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.401989] page dumped because: kasan: bad access detected
[   32.402176] 
[   32.402324] Memory state around the buggy address:
[   32.402398]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.402555]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.402608] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.402773]                                      ^
[   32.402939]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.403008]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.403166] ==================================================================
[   32.513948] ==================================================================
[   32.513999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   32.514051] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.514103] 
[   32.514134] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.514630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.514688] Hardware name: linux,dummy-virt (DT)
[   32.514723] Call trace:
[   32.514747]  show_stack+0x20/0x38 (C)
[   32.514802]  dump_stack_lvl+0x8c/0xd0
[   32.514868]  print_report+0x118/0x608
[   32.514929]  kasan_report+0xdc/0x128
[   32.514980]  kasan_check_range+0x100/0x1a8
[   32.515026]  __kasan_check_write+0x20/0x30
[   32.515072]  kasan_atomics_helper+0x147c/0x4858
[   32.515123]  kasan_atomics+0x198/0x2e0
[   32.515324]  kunit_try_run_case+0x170/0x3f0
[   32.515439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.515532]  kthread+0x328/0x630
[   32.515607]  ret_from_fork+0x10/0x20
[   32.515833] 
[   32.516101] Allocated by task 298:
[   32.516178]  kasan_save_stack+0x3c/0x68
[   32.516227]  kasan_save_track+0x20/0x40
[   32.516269]  kasan_save_alloc_info+0x40/0x58
[   32.516338]  __kasan_kmalloc+0xd4/0xd8
[   32.516425]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.516518]  kasan_atomics+0xb8/0x2e0
[   32.516564]  kunit_try_run_case+0x170/0x3f0
[   32.516607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.516691]  kthread+0x328/0x630
[   32.516747]  ret_from_fork+0x10/0x20
[   32.516838] 
[   32.516886] The buggy address belongs to the object at fff00000c5ae7400
[   32.516886]  which belongs to the cache kmalloc-64 of size 64
[   32.516985] The buggy address is located 0 bytes to the right of
[   32.516985]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.517058] 
[   32.517165] The buggy address belongs to the physical page:
[   32.517199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.517253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.517336] page_type: f5(slab)
[   32.517377] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.517427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.517471] page dumped because: kasan: bad access detected
[   32.517650] 
[   32.517838] Memory state around the buggy address:
[   32.518058]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.518109]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.518153] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.518192]                                      ^
[   32.518228]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.518273]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.518313] ==================================================================
[   32.524382] ==================================================================
[   32.524433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   32.524485] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.524536] 
[   32.524566] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.524652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.524679] Hardware name: linux,dummy-virt (DT)
[   32.524712] Call trace:
[   32.524735]  show_stack+0x20/0x38 (C)
[   32.524793]  dump_stack_lvl+0x8c/0xd0
[   32.524839]  print_report+0x118/0x608
[   32.524888]  kasan_report+0xdc/0x128
[   32.524952]  kasan_check_range+0x100/0x1a8
[   32.524998]  __kasan_check_write+0x20/0x30
[   32.525043]  kasan_atomics_helper+0x154c/0x4858
[   32.525094]  kasan_atomics+0x198/0x2e0
[   32.525141]  kunit_try_run_case+0x170/0x3f0
[   32.525192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.525247]  kthread+0x328/0x630
[   32.525290]  ret_from_fork+0x10/0x20
[   32.525338] 
[   32.525360] Allocated by task 298:
[   32.525388]  kasan_save_stack+0x3c/0x68
[   32.525431]  kasan_save_track+0x20/0x40
[   32.525472]  kasan_save_alloc_info+0x40/0x58
[   32.525512]  __kasan_kmalloc+0xd4/0xd8
[   32.525553]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.525595]  kasan_atomics+0xb8/0x2e0
[   32.525634]  kunit_try_run_case+0x170/0x3f0
[   32.525675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.525723]  kthread+0x328/0x630
[   32.525758]  ret_from_fork+0x10/0x20
[   32.525797] 
[   32.525818] The buggy address belongs to the object at fff00000c5ae7400
[   32.525818]  which belongs to the cache kmalloc-64 of size 64
[   32.525878] The buggy address is located 0 bytes to the right of
[   32.525878]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.525996] 
[   32.526019] The buggy address belongs to the physical page:
[   32.526053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.526124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.526171] page_type: f5(slab)
[   32.526211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.526261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.526305] page dumped because: kasan: bad access detected
[   32.526339] 
[   32.526360] Memory state around the buggy address:
[   32.526950]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.527123]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.527209] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.527523]                                      ^
[   32.527654]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.527759]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.527956] ==================================================================
[   32.477283] ==================================================================
[   32.477331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   32.477381] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.477433] 
[   32.477464] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.477549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.477576] Hardware name: linux,dummy-virt (DT)
[   32.477609] Call trace:
[   32.477632]  show_stack+0x20/0x38 (C)
[   32.477680]  dump_stack_lvl+0x8c/0xd0
[   32.477741]  print_report+0x118/0x608
[   32.477791]  kasan_report+0xdc/0x128
[   32.477837]  kasan_check_range+0x100/0x1a8
[   32.477884]  __kasan_check_write+0x20/0x30
[   32.477992]  kasan_atomics_helper+0x1190/0x4858
[   32.478165]  kasan_atomics+0x198/0x2e0
[   32.478240]  kunit_try_run_case+0x170/0x3f0
[   32.478291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.478347]  kthread+0x328/0x630
[   32.478391]  ret_from_fork+0x10/0x20
[   32.478464] 
[   32.478489] Allocated by task 298:
[   32.478520]  kasan_save_stack+0x3c/0x68
[   32.478776]  kasan_save_track+0x20/0x40
[   32.478885]  kasan_save_alloc_info+0x40/0x58
[   32.479040]  __kasan_kmalloc+0xd4/0xd8
[   32.479161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.479501]  kasan_atomics+0xb8/0x2e0
[   32.479605]  kunit_try_run_case+0x170/0x3f0
[   32.479728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.479844]  kthread+0x328/0x630
[   32.479918]  ret_from_fork+0x10/0x20
[   32.479959] 
[   32.479981] The buggy address belongs to the object at fff00000c5ae7400
[   32.479981]  which belongs to the cache kmalloc-64 of size 64
[   32.480254] The buggy address is located 0 bytes to the right of
[   32.480254]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.480432] 
[   32.480507] The buggy address belongs to the physical page:
[   32.480549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.480610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.480669] page_type: f5(slab)
[   32.480707] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.480760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.480807] page dumped because: kasan: bad access detected
[   32.480848] 
[   32.480878] Memory state around the buggy address:
[   32.480919]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.480967]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.481010] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.481050]                                      ^
[   32.481085]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.481314]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.481414] ==================================================================
[   32.314337] ==================================================================
[   32.314463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   32.314518] Write of size 4 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.314739] 
[   32.314776] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.314873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.314912] Hardware name: linux,dummy-virt (DT)
[   32.314945] Call trace:
[   32.314969]  show_stack+0x20/0x38 (C)
[   32.315021]  dump_stack_lvl+0x8c/0xd0
[   32.315165]  print_report+0x118/0x608
[   32.315289]  kasan_report+0xdc/0x128
[   32.315419]  kasan_check_range+0x100/0x1a8
[   32.315492]  __kasan_check_write+0x20/0x30
[   32.315813]  kasan_atomics_helper+0x99c/0x4858
[   32.315998]  kasan_atomics+0x198/0x2e0
[   32.316115]  kunit_try_run_case+0x170/0x3f0
[   32.316175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.316285]  kthread+0x328/0x630
[   32.316352]  ret_from_fork+0x10/0x20
[   32.316645] 
[   32.316738] Allocated by task 298:
[   32.316774]  kasan_save_stack+0x3c/0x68
[   32.316978]  kasan_save_track+0x20/0x40
[   32.317064]  kasan_save_alloc_info+0x40/0x58
[   32.317108]  __kasan_kmalloc+0xd4/0xd8
[   32.317148]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.317303]  kasan_atomics+0xb8/0x2e0
[   32.317394]  kunit_try_run_case+0x170/0x3f0
[   32.317441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.317507]  kthread+0x328/0x630
[   32.317610]  ret_from_fork+0x10/0x20
[   32.317655] 
[   32.317677] The buggy address belongs to the object at fff00000c5ae7400
[   32.317677]  which belongs to the cache kmalloc-64 of size 64
[   32.317760] The buggy address is located 0 bytes to the right of
[   32.317760]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.317827] 
[   32.317850] The buggy address belongs to the physical page:
[   32.317883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.317948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.318340] page_type: f5(slab)
[   32.318435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.318578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.318657] page dumped because: kasan: bad access detected
[   32.318718] 
[   32.318952] Memory state around the buggy address:
[   32.319144]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.319258]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.319338] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.319397]                                      ^
[   32.319786]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.319881]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.319972] ==================================================================
[   32.431246] ==================================================================
[   32.431300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   32.431353] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.431414] 
[   32.431445] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.431531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.431782] Hardware name: linux,dummy-virt (DT)
[   32.431852] Call trace:
[   32.431942]  show_stack+0x20/0x38 (C)
[   32.431998]  dump_stack_lvl+0x8c/0xd0
[   32.432044]  print_report+0x118/0x608
[   32.432091]  kasan_report+0xdc/0x128
[   32.432142]  kasan_check_range+0x100/0x1a8
[   32.432189]  __kasan_check_write+0x20/0x30
[   32.432236]  kasan_atomics_helper+0xeb8/0x4858
[   32.432288]  kasan_atomics+0x198/0x2e0
[   32.432335]  kunit_try_run_case+0x170/0x3f0
[   32.432385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.432441]  kthread+0x328/0x630
[   32.432485]  ret_from_fork+0x10/0x20
[   32.432532] 
[   32.432552] Allocated by task 298:
[   32.432582]  kasan_save_stack+0x3c/0x68
[   32.432626]  kasan_save_track+0x20/0x40
[   32.432667]  kasan_save_alloc_info+0x40/0x58
[   32.432707]  __kasan_kmalloc+0xd4/0xd8
[   32.433068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.433498]  kasan_atomics+0xb8/0x2e0
[   32.433667]  kunit_try_run_case+0x170/0x3f0
[   32.433807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.434053]  kthread+0x328/0x630
[   32.434159]  ret_from_fork+0x10/0x20
[   32.434300] 
[   32.434382] The buggy address belongs to the object at fff00000c5ae7400
[   32.434382]  which belongs to the cache kmalloc-64 of size 64
[   32.434584] The buggy address is located 0 bytes to the right of
[   32.434584]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.434667] 
[   32.434693] The buggy address belongs to the physical page:
[   32.434725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.434778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.434951] page_type: f5(slab)
[   32.435116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.435218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.435411] page dumped because: kasan: bad access detected
[   32.435448] 
[   32.435470] Memory state around the buggy address:
[   32.435661]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.435824]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.436001] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.436276]                                      ^
[   32.436365]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.436422]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.436574] ==================================================================
[   32.492202] ==================================================================
[   32.492251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   32.492330] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.492384] 
[   32.492415] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.492501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.492531] Hardware name: linux,dummy-virt (DT)
[   32.492571] Call trace:
[   32.492606]  show_stack+0x20/0x38 (C)
[   32.492666]  dump_stack_lvl+0x8c/0xd0
[   32.492721]  print_report+0x118/0x608
[   32.492769]  kasan_report+0xdc/0x128
[   32.492822]  kasan_check_range+0x100/0x1a8
[   32.492870]  __kasan_check_write+0x20/0x30
[   32.492928]  kasan_atomics_helper+0x12d8/0x4858
[   32.492979]  kasan_atomics+0x198/0x2e0
[   32.493025]  kunit_try_run_case+0x170/0x3f0
[   32.493075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.493364]  kthread+0x328/0x630
[   32.493434]  ret_from_fork+0x10/0x20
[   32.493486] 
[   32.493590] Allocated by task 298:
[   32.493628]  kasan_save_stack+0x3c/0x68
[   32.493674]  kasan_save_track+0x20/0x40
[   32.494106]  kasan_save_alloc_info+0x40/0x58
[   32.494159]  __kasan_kmalloc+0xd4/0xd8
[   32.494200]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.494243]  kasan_atomics+0xb8/0x2e0
[   32.494283]  kunit_try_run_case+0x170/0x3f0
[   32.494325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.494372]  kthread+0x328/0x630
[   32.494409]  ret_from_fork+0x10/0x20
[   32.494448] 
[   32.494470] The buggy address belongs to the object at fff00000c5ae7400
[   32.494470]  which belongs to the cache kmalloc-64 of size 64
[   32.494531] The buggy address is located 0 bytes to the right of
[   32.494531]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.494597] 
[   32.494620] The buggy address belongs to the physical page:
[   32.494653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.494707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.494754] page_type: f5(slab)
[   32.494792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.494844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.494889] page dumped because: kasan: bad access detected
[   32.495015] 
[   32.495177] Memory state around the buggy address:
[   32.495257]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.495351]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.495734] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.495796]                                      ^
[   32.495840]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.495886]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.495963] ==================================================================
[   32.540223] ==================================================================
[   32.540275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   32.540327] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.540427] 
[   32.540604] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.540863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.540916] Hardware name: linux,dummy-virt (DT)
[   32.540967] Call trace:
[   32.541153]  show_stack+0x20/0x38 (C)
[   32.541206]  dump_stack_lvl+0x8c/0xd0
[   32.541360]  print_report+0x118/0x608
[   32.541416]  kasan_report+0xdc/0x128
[   32.541660]  kasan_check_range+0x100/0x1a8
[   32.541779]  __kasan_check_write+0x20/0x30
[   32.542054]  kasan_atomics_helper+0x1644/0x4858
[   32.542126]  kasan_atomics+0x198/0x2e0
[   32.542173]  kunit_try_run_case+0x170/0x3f0
[   32.542223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.542640]  kthread+0x328/0x630
[   32.542758]  ret_from_fork+0x10/0x20
[   32.542973] 
[   32.543100] Allocated by task 298:
[   32.543408]  kasan_save_stack+0x3c/0x68
[   32.543679]  kasan_save_track+0x20/0x40
[   32.543770]  kasan_save_alloc_info+0x40/0x58
[   32.543979]  __kasan_kmalloc+0xd4/0xd8
[   32.544025]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.544068]  kasan_atomics+0xb8/0x2e0
[   32.544108]  kunit_try_run_case+0x170/0x3f0
[   32.544150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.544197]  kthread+0x328/0x630
[   32.544234]  ret_from_fork+0x10/0x20
[   32.544273] 
[   32.544295] The buggy address belongs to the object at fff00000c5ae7400
[   32.544295]  which belongs to the cache kmalloc-64 of size 64
[   32.544357] The buggy address is located 0 bytes to the right of
[   32.544357]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.544423] 
[   32.544446] The buggy address belongs to the physical page:
[   32.544479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.544545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.544592] page_type: f5(slab)
[   32.544668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.544731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.544774] page dumped because: kasan: bad access detected
[   32.544925] 
[   32.544960] Memory state around the buggy address:
[   32.545001]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.545058]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.545112] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.545152]                                      ^
[   32.545190]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.545236]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.545286] ==================================================================
[   32.468827] ==================================================================
[   32.468877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   32.469042] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.469098] 
[   32.469235] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.469329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.469359] Hardware name: linux,dummy-virt (DT)
[   32.469404] Call trace:
[   32.469432]  show_stack+0x20/0x38 (C)
[   32.469483]  dump_stack_lvl+0x8c/0xd0
[   32.469638]  print_report+0x118/0x608
[   32.469742]  kasan_report+0xdc/0x128
[   32.470036]  kasan_check_range+0x100/0x1a8
[   32.470151]  __kasan_check_write+0x20/0x30
[   32.470319]  kasan_atomics_helper+0x1128/0x4858
[   32.470495]  kasan_atomics+0x198/0x2e0
[   32.470573]  kunit_try_run_case+0x170/0x3f0
[   32.470624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.470680]  kthread+0x328/0x630
[   32.471287]  ret_from_fork+0x10/0x20
[   32.471658] 
[   32.471762] Allocated by task 298:
[   32.471797]  kasan_save_stack+0x3c/0x68
[   32.472137]  kasan_save_track+0x20/0x40
[   32.472323]  kasan_save_alloc_info+0x40/0x58
[   32.472434]  __kasan_kmalloc+0xd4/0xd8
[   32.472767]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.472947]  kasan_atomics+0xb8/0x2e0
[   32.473015]  kunit_try_run_case+0x170/0x3f0
[   32.473057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.473279]  kthread+0x328/0x630
[   32.473442]  ret_from_fork+0x10/0x20
[   32.473548] 
[   32.473746] The buggy address belongs to the object at fff00000c5ae7400
[   32.473746]  which belongs to the cache kmalloc-64 of size 64
[   32.473906] The buggy address is located 0 bytes to the right of
[   32.473906]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.474094] 
[   32.474142] The buggy address belongs to the physical page:
[   32.474175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.474229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.474280] page_type: f5(slab)
[   32.474318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.474738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.475265] page dumped because: kasan: bad access detected
[   32.475447] 
[   32.475610] Memory state around the buggy address:
[   32.475739]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.475881]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.476914] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.476956]                                      ^
[   32.476992]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.477037]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.477078] ==================================================================
[   32.423800] ==================================================================
[   32.423846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   32.423911] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.423964] 
[   32.424263] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.424413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.424446] Hardware name: linux,dummy-virt (DT)
[   32.424479] Call trace:
[   32.424503]  show_stack+0x20/0x38 (C)
[   32.424554]  dump_stack_lvl+0x8c/0xd0
[   32.424602]  print_report+0x118/0x608
[   32.424662]  kasan_report+0xdc/0x128
[   32.424712]  __asan_report_store8_noabort+0x20/0x30
[   32.424764]  kasan_atomics_helper+0x3e5c/0x4858
[   32.424819]  kasan_atomics+0x198/0x2e0
[   32.424873]  kunit_try_run_case+0x170/0x3f0
[   32.425261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.425356]  kthread+0x328/0x630
[   32.425535]  ret_from_fork+0x10/0x20
[   32.425602] 
[   32.425640] Allocated by task 298:
[   32.425714]  kasan_save_stack+0x3c/0x68
[   32.425796]  kasan_save_track+0x20/0x40
[   32.426142]  kasan_save_alloc_info+0x40/0x58
[   32.426201]  __kasan_kmalloc+0xd4/0xd8
[   32.426243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.426388]  kasan_atomics+0xb8/0x2e0
[   32.426549]  kunit_try_run_case+0x170/0x3f0
[   32.426706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.426762]  kthread+0x328/0x630
[   32.426869]  ret_from_fork+0x10/0x20
[   32.426937] 
[   32.426959] The buggy address belongs to the object at fff00000c5ae7400
[   32.426959]  which belongs to the cache kmalloc-64 of size 64
[   32.427390] The buggy address is located 0 bytes to the right of
[   32.427390]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.427489] 
[   32.427753] The buggy address belongs to the physical page:
[   32.427890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.428178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.428376] page_type: f5(slab)
[   32.428544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.428676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.429021] page dumped because: kasan: bad access detected
[   32.429201] 
[   32.429592] Memory state around the buggy address:
[   32.429766]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.429871]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.429925] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.429967]                                      ^
[   32.430151]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.430387]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.430500] ==================================================================
[   32.561601] ==================================================================
[   32.561646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   32.561697] Read of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.561750] 
[   32.561780] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.561864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.561891] Hardware name: linux,dummy-virt (DT)
[   32.561941] Call trace:
[   32.561964]  show_stack+0x20/0x38 (C)
[   32.562014]  dump_stack_lvl+0x8c/0xd0
[   32.562060]  print_report+0x118/0x608
[   32.562110]  kasan_report+0xdc/0x128
[   32.562157]  __asan_report_load8_noabort+0x20/0x30
[   32.562209]  kasan_atomics_helper+0x3e10/0x4858
[   32.562258]  kasan_atomics+0x198/0x2e0
[   32.562305]  kunit_try_run_case+0x170/0x3f0
[   32.562355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.562410]  kthread+0x328/0x630
[   32.562454]  ret_from_fork+0x10/0x20
[   32.562503] 
[   32.562525] Allocated by task 298:
[   32.562555]  kasan_save_stack+0x3c/0x68
[   32.562597]  kasan_save_track+0x20/0x40
[   32.562638]  kasan_save_alloc_info+0x40/0x58
[   32.562678]  __kasan_kmalloc+0xd4/0xd8
[   32.562716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.562759]  kasan_atomics+0xb8/0x2e0
[   32.562798]  kunit_try_run_case+0x170/0x3f0
[   32.562838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.562885]  kthread+0x328/0x630
[   32.563128]  ret_from_fork+0x10/0x20
[   32.563339] 
[   32.563369] The buggy address belongs to the object at fff00000c5ae7400
[   32.563369]  which belongs to the cache kmalloc-64 of size 64
[   32.563432] The buggy address is located 0 bytes to the right of
[   32.563432]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.563506] 
[   32.563530] The buggy address belongs to the physical page:
[   32.563562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.563617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.563668] page_type: f5(slab)
[   32.563708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.564110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.564376] page dumped because: kasan: bad access detected
[   32.564590] 
[   32.564661] Memory state around the buggy address:
[   32.564746]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.564811]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.565035] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.565085]                                      ^
[   32.565146]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.565192]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.565235] ==================================================================
[   32.566319] ==================================================================
[   32.566581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   32.566667] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.566729] 
[   32.566771] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.566861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.567027] Hardware name: linux,dummy-virt (DT)
[   32.567064] Call trace:
[   32.567177]  show_stack+0x20/0x38 (C)
[   32.567454]  dump_stack_lvl+0x8c/0xd0
[   32.567538]  print_report+0x118/0x608
[   32.567605]  kasan_report+0xdc/0x128
[   32.567657]  kasan_check_range+0x100/0x1a8
[   32.567884]  __kasan_check_write+0x20/0x30
[   32.568010]  kasan_atomics_helper+0x175c/0x4858
[   32.568083]  kasan_atomics+0x198/0x2e0
[   32.568141]  kunit_try_run_case+0x170/0x3f0
[   32.568193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.568249]  kthread+0x328/0x630
[   32.568293]  ret_from_fork+0x10/0x20
[   32.568500] 
[   32.568526] Allocated by task 298:
[   32.568596]  kasan_save_stack+0x3c/0x68
[   32.569130]  kasan_save_track+0x20/0x40
[   32.569191]  kasan_save_alloc_info+0x40/0x58
[   32.569243]  __kasan_kmalloc+0xd4/0xd8
[   32.569299]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.569345]  kasan_atomics+0xb8/0x2e0
[   32.569386]  kunit_try_run_case+0x170/0x3f0
[   32.569428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.569475]  kthread+0x328/0x630
[   32.569512]  ret_from_fork+0x10/0x20
[   32.569551] 
[   32.569575] The buggy address belongs to the object at fff00000c5ae7400
[   32.569575]  which belongs to the cache kmalloc-64 of size 64
[   32.569655] The buggy address is located 0 bytes to the right of
[   32.569655]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.569723] 
[   32.569748] The buggy address belongs to the physical page:
[   32.569781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.569940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.569995] page_type: f5(slab)
[   32.570035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.570086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.570129] page dumped because: kasan: bad access detected
[   32.570162] 
[   32.570195] Memory state around the buggy address:
[   32.570237]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.570280]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.570325] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.570364]                                      ^
[   32.570400]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.570450]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.570491] ==================================================================
[   32.578379] ==================================================================
[   32.578757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   32.578852] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.578929] 
[   32.578977] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.579064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.579091] Hardware name: linux,dummy-virt (DT)
[   32.579125] Call trace:
[   32.579254]  show_stack+0x20/0x38 (C)
[   32.579326]  dump_stack_lvl+0x8c/0xd0
[   32.579374]  print_report+0x118/0x608
[   32.579673]  kasan_report+0xdc/0x128
[   32.579728]  kasan_check_range+0x100/0x1a8
[   32.579994]  __kasan_check_write+0x20/0x30
[   32.580059]  kasan_atomics_helper+0x17ec/0x4858
[   32.580289]  kasan_atomics+0x198/0x2e0
[   32.580344]  kunit_try_run_case+0x170/0x3f0
[   32.580395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.580451]  kthread+0x328/0x630
[   32.580495]  ret_from_fork+0x10/0x20
[   32.580587] 
[   32.580668] Allocated by task 298:
[   32.580988]  kasan_save_stack+0x3c/0x68
[   32.581052]  kasan_save_track+0x20/0x40
[   32.581133]  kasan_save_alloc_info+0x40/0x58
[   32.581271]  __kasan_kmalloc+0xd4/0xd8
[   32.581355]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.581400]  kasan_atomics+0xb8/0x2e0
[   32.581445]  kunit_try_run_case+0x170/0x3f0
[   32.581488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.581823]  kthread+0x328/0x630
[   32.581891]  ret_from_fork+0x10/0x20
[   32.581943] 
[   32.581981] The buggy address belongs to the object at fff00000c5ae7400
[   32.581981]  which belongs to the cache kmalloc-64 of size 64
[   32.582052] The buggy address is located 0 bytes to the right of
[   32.582052]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.582470] 
[   32.582510] The buggy address belongs to the physical page:
[   32.582836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.582946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.583024] page_type: f5(slab)
[   32.583361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.583444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.583520] page dumped because: kasan: bad access detected
[   32.583584] 
[   32.583780] Memory state around the buggy address:
[   32.583821]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.583867]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.583950] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.584017]                                      ^
[   32.584166]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.584271]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.584515] ==================================================================
[   32.486840] ==================================================================
[   32.487062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   32.487138] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.487190] 
[   32.487231] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.487324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.487361] Hardware name: linux,dummy-virt (DT)
[   32.487419] Call trace:
[   32.487495]  show_stack+0x20/0x38 (C)
[   32.487580]  dump_stack_lvl+0x8c/0xd0
[   32.487702]  print_report+0x118/0x608
[   32.487778]  kasan_report+0xdc/0x128
[   32.487914]  kasan_check_range+0x100/0x1a8
[   32.487964]  __kasan_check_write+0x20/0x30
[   32.488010]  kasan_atomics_helper+0x126c/0x4858
[   32.488097]  kasan_atomics+0x198/0x2e0
[   32.488239]  kunit_try_run_case+0x170/0x3f0
[   32.488432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.488533]  kthread+0x328/0x630
[   32.488711]  ret_from_fork+0x10/0x20
[   32.488874] 
[   32.488954] Allocated by task 298:
[   32.488990]  kasan_save_stack+0x3c/0x68
[   32.489096]  kasan_save_track+0x20/0x40
[   32.489140]  kasan_save_alloc_info+0x40/0x58
[   32.489187]  __kasan_kmalloc+0xd4/0xd8
[   32.489228]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.489271]  kasan_atomics+0xb8/0x2e0
[   32.489502]  kunit_try_run_case+0x170/0x3f0
[   32.489565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.489613]  kthread+0x328/0x630
[   32.489649]  ret_from_fork+0x10/0x20
[   32.489719] 
[   32.490092] The buggy address belongs to the object at fff00000c5ae7400
[   32.490092]  which belongs to the cache kmalloc-64 of size 64
[   32.490266] The buggy address is located 0 bytes to the right of
[   32.490266]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.490413] 
[   32.490465] The buggy address belongs to the physical page:
[   32.490595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.490720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.490769] page_type: f5(slab)
[   32.490830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.490884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.490940] page dumped because: kasan: bad access detected
[   32.491133] 
[   32.491224] Memory state around the buggy address:
[   32.491279]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.491347]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.491463] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.491739]                                      ^
[   32.491782]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.491828]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.491964] ==================================================================
[   32.418038] ==================================================================
[   32.418173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   32.418233] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.418348] 
[   32.418434] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.418531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.418751] Hardware name: linux,dummy-virt (DT)
[   32.418844] Call trace:
[   32.418975]  show_stack+0x20/0x38 (C)
[   32.419048]  dump_stack_lvl+0x8c/0xd0
[   32.419175]  print_report+0x118/0x608
[   32.419325]  kasan_report+0xdc/0x128
[   32.419378]  kasan_check_range+0x100/0x1a8
[   32.419455]  __kasan_check_write+0x20/0x30
[   32.419652]  kasan_atomics_helper+0xe44/0x4858
[   32.419801]  kasan_atomics+0x198/0x2e0
[   32.419854]  kunit_try_run_case+0x170/0x3f0
[   32.419996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.420057]  kthread+0x328/0x630
[   32.420115]  ret_from_fork+0x10/0x20
[   32.420287] 
[   32.420319] Allocated by task 298:
[   32.420354]  kasan_save_stack+0x3c/0x68
[   32.420402]  kasan_save_track+0x20/0x40
[   32.420443]  kasan_save_alloc_info+0x40/0x58
[   32.420484]  __kasan_kmalloc+0xd4/0xd8
[   32.420681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.420847]  kasan_atomics+0xb8/0x2e0
[   32.420926]  kunit_try_run_case+0x170/0x3f0
[   32.421156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.421253]  kthread+0x328/0x630
[   32.421298]  ret_from_fork+0x10/0x20
[   32.421387] 
[   32.421412] The buggy address belongs to the object at fff00000c5ae7400
[   32.421412]  which belongs to the cache kmalloc-64 of size 64
[   32.421475] The buggy address is located 0 bytes to the right of
[   32.421475]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.421586] 
[   32.421610] The buggy address belongs to the physical page:
[   32.421643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.421694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.421745] page_type: f5(slab)
[   32.422047] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.422187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.422274] page dumped because: kasan: bad access detected
[   32.422496] 
[   32.422656] Memory state around the buggy address:
[   32.422774]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.423176]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.423289] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.423441]                                      ^
[   32.423509]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.423598]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.423641] ==================================================================
[   32.570569] ==================================================================
[   32.570611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   32.570658] Read of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.570726] 
[   32.570757] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.570841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.570870] Hardware name: linux,dummy-virt (DT)
[   32.571236] Call trace:
[   32.571270]  show_stack+0x20/0x38 (C)
[   32.571322]  dump_stack_lvl+0x8c/0xd0
[   32.571379]  print_report+0x118/0x608
[   32.571428]  kasan_report+0xdc/0x128
[   32.571478]  __asan_report_load8_noabort+0x20/0x30
[   32.571569]  kasan_atomics_helper+0x3e20/0x4858
[   32.571641]  kasan_atomics+0x198/0x2e0
[   32.571825]  kunit_try_run_case+0x170/0x3f0
[   32.571908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.572013]  kthread+0x328/0x630
[   32.572060]  ret_from_fork+0x10/0x20
[   32.572110] 
[   32.572618] Allocated by task 298:
[   32.572710]  kasan_save_stack+0x3c/0x68
[   32.572779]  kasan_save_track+0x20/0x40
[   32.572856]  kasan_save_alloc_info+0x40/0x58
[   32.573342]  __kasan_kmalloc+0xd4/0xd8
[   32.573397]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.573658]  kasan_atomics+0xb8/0x2e0
[   32.573748]  kunit_try_run_case+0x170/0x3f0
[   32.573934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.574327]  kthread+0x328/0x630
[   32.574423]  ret_from_fork+0x10/0x20
[   32.574521] 
[   32.574577] The buggy address belongs to the object at fff00000c5ae7400
[   32.574577]  which belongs to the cache kmalloc-64 of size 64
[   32.574638] The buggy address is located 0 bytes to the right of
[   32.574638]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.574705] 
[   32.574728] The buggy address belongs to the physical page:
[   32.574760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.574814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.575309] page_type: f5(slab)
[   32.575527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.575603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.575805] page dumped because: kasan: bad access detected
[   32.575839] 
[   32.575859] Memory state around the buggy address:
[   32.575948]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.576597]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.576668] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.576740]                                      ^
[   32.576791]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.576849]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.577410] ==================================================================
[   32.518502] ==================================================================
[   32.518551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   32.518602] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.518652] 
[   32.518683] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.518768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.518797] Hardware name: linux,dummy-virt (DT)
[   32.518831] Call trace:
[   32.518856]  show_stack+0x20/0x38 (C)
[   32.519061]  dump_stack_lvl+0x8c/0xd0
[   32.519166]  print_report+0x118/0x608
[   32.519219]  kasan_report+0xdc/0x128
[   32.519303]  kasan_check_range+0x100/0x1a8
[   32.519389]  __kasan_check_write+0x20/0x30
[   32.519464]  kasan_atomics_helper+0x14e4/0x4858
[   32.519518]  kasan_atomics+0x198/0x2e0
[   32.519603]  kunit_try_run_case+0x170/0x3f0
[   32.519703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.519778]  kthread+0x328/0x630
[   32.519938]  ret_from_fork+0x10/0x20
[   32.520027] 
[   32.520052] Allocated by task 298:
[   32.520081]  kasan_save_stack+0x3c/0x68
[   32.520214]  kasan_save_track+0x20/0x40
[   32.520256]  kasan_save_alloc_info+0x40/0x58
[   32.520297]  __kasan_kmalloc+0xd4/0xd8
[   32.520336]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.520378]  kasan_atomics+0xb8/0x2e0
[   32.520418]  kunit_try_run_case+0x170/0x3f0
[   32.520460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.520675]  kthread+0x328/0x630
[   32.520822]  ret_from_fork+0x10/0x20
[   32.520876] 
[   32.520933] The buggy address belongs to the object at fff00000c5ae7400
[   32.520933]  which belongs to the cache kmalloc-64 of size 64
[   32.521090] The buggy address is located 0 bytes to the right of
[   32.521090]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.521159] 
[   32.521188] The buggy address belongs to the physical page:
[   32.521252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.521306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.521353] page_type: f5(slab)
[   32.521393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.521558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.521610] page dumped because: kasan: bad access detected
[   32.521736] 
[   32.522022] Memory state around the buggy address:
[   32.522136]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.522386]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.522632] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.522819]                                      ^
[   32.523014]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.523232]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.523529] ==================================================================
[   32.308259] ==================================================================
[   32.308321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.308373] Read of size 4 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.308425] 
[   32.308455] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.308540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.308569] Hardware name: linux,dummy-virt (DT)
[   32.308607] Call trace:
[   32.308630]  show_stack+0x20/0x38 (C)
[   32.308680]  dump_stack_lvl+0x8c/0xd0
[   32.308728]  print_report+0x118/0x608
[   32.308790]  kasan_report+0xdc/0x128
[   32.308953]  kasan_atomics+0x198/0x2e0
[   32.310568]  __kasan_kmalloc+0xd4/0xd8
[   32.310862] 
[   32.311022] 
[   32.311131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.311182] page_type: f5(slab)
[   32.311346] 
[   32.311530]                                      ^
[   32.311859] Write of size 4 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.312358]  __kasan_check_write+0x20/0x30
[   32.312866]  __kasan_kmalloc+0xd4/0xd8
[   32.313097]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.313143]  kasan_atomics+0xb8/0x2e0
[   32.313184]  kunit_try_run_case+0x170/0x3f0
[   32.313224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.313269]  kthread+0x328/0x630
[   32.313305]  ret_from_fork+0x10/0x20
[   32.313344] 
[   32.313365] The buggy address belongs to the object at fff00000c5ae7400
[   32.313365]  which belongs to the cache kmalloc-64 of size 64
[   32.313425] The buggy address is located 0 bytes to the right of
[   32.313425]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.313490] 
[   32.313513] The buggy address belongs to the physical page:
[   32.313546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.313598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.313648] page_type: f5(slab)
[   32.313688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.313742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.313786] page dumped because: kasan: bad access detected
[   32.313820] 
[   32.313840] Memory state around the buggy address:
[   32.313874]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.313931]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.313976] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.314018]                                      ^
[   32.314054]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.314097]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.314139] ==================================================================
[   32.404084] ==================================================================
[   32.404138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   32.404190] Read of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.404502] 
[   32.404658] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.404754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.404793] Hardware name: linux,dummy-virt (DT)
[   32.404943] Call trace:
[   32.404979]  show_stack+0x20/0x38 (C)
[   32.405033]  dump_stack_lvl+0x8c/0xd0
[   32.405131]  print_report+0x118/0x608
[   32.405210]  kasan_report+0xdc/0x128
[   32.405262]  kasan_check_range+0x100/0x1a8
[   32.405395]  __kasan_check_read+0x20/0x30
[   32.405498]  kasan_atomics_helper+0xdd4/0x4858
[   32.405566]  kasan_atomics+0x198/0x2e0
[   32.405722]  kunit_try_run_case+0x170/0x3f0
[   32.405789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.405946]  kthread+0x328/0x630
[   32.406023]  ret_from_fork+0x10/0x20
[   32.406112] 
[   32.406137] Allocated by task 298:
[   32.406182]  kasan_save_stack+0x3c/0x68
[   32.406238]  kasan_save_track+0x20/0x40
[   32.406279]  kasan_save_alloc_info+0x40/0x58
[   32.406328]  __kasan_kmalloc+0xd4/0xd8
[   32.406377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.406420]  kasan_atomics+0xb8/0x2e0
[   32.406468]  kunit_try_run_case+0x170/0x3f0
[   32.406510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.406557]  kthread+0x328/0x630
[   32.406602]  ret_from_fork+0x10/0x20
[   32.406641] 
[   32.406664] The buggy address belongs to the object at fff00000c5ae7400
[   32.406664]  which belongs to the cache kmalloc-64 of size 64
[   32.406724] The buggy address is located 0 bytes to the right of
[   32.406724]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.406788] 
[   32.406818] The buggy address belongs to the physical page:
[   32.406851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.406936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.406986] page_type: f5(slab)
[   32.407024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.407078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.407121] page dumped because: kasan: bad access detected
[   32.407153] 
[   32.407185] Memory state around the buggy address:
[   32.407232]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.407286]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.407339] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.407380]                                      ^
[   32.407413]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.407458]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.407507] ==================================================================
[   32.509499] ==================================================================
[   32.509633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   32.509686] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.509772] 
[   32.510037] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.510309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.510544] Hardware name: linux,dummy-virt (DT)
[   32.510720] Call trace:
[   32.510812]  show_stack+0x20/0x38 (C)
[   32.510965]  dump_stack_lvl+0x8c/0xd0
[   32.511127]  print_report+0x118/0x608
[   32.511298]  kasan_report+0xdc/0x128
[   32.511423]  kasan_check_range+0x100/0x1a8
[   32.511471]  __kasan_check_write+0x20/0x30
[   32.511540]  kasan_atomics_helper+0x1414/0x4858
[   32.511592]  kasan_atomics+0x198/0x2e0
[   32.511638]  kunit_try_run_case+0x170/0x3f0
[   32.511705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.512006]  kthread+0x328/0x630
[   32.512146]  ret_from_fork+0x10/0x20
[   32.512217] 
[   32.512240] Allocated by task 298:
[   32.512281]  kasan_save_stack+0x3c/0x68
[   32.512340]  kasan_save_track+0x20/0x40
[   32.512382]  kasan_save_alloc_info+0x40/0x58
[   32.512429]  __kasan_kmalloc+0xd4/0xd8
[   32.512470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.512513]  kasan_atomics+0xb8/0x2e0
[   32.512571]  kunit_try_run_case+0x170/0x3f0
[   32.512614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.512662]  kthread+0x328/0x630
[   32.512698]  ret_from_fork+0x10/0x20
[   32.512737] 
[   32.512768] The buggy address belongs to the object at fff00000c5ae7400
[   32.512768]  which belongs to the cache kmalloc-64 of size 64
[   32.512832] The buggy address is located 0 bytes to the right of
[   32.512832]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.512908] 
[   32.512949] The buggy address belongs to the physical page:
[   32.512984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.513037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.513084] page_type: f5(slab)
[   32.513130] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.513199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.513243] page dumped because: kasan: bad access detected
[   32.513277] 
[   32.513297] Memory state around the buggy address:
[   32.513342]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.513393]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.513447] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.513494]                                      ^
[   32.513537]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.513591]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.513651] ==================================================================
[   32.482207] ==================================================================
[   32.482321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   32.482403] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.482489] 
[   32.482566] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.482654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.482690] Hardware name: linux,dummy-virt (DT)
[   32.482722] Call trace:
[   32.482747]  show_stack+0x20/0x38 (C)
[   32.482812]  dump_stack_lvl+0x8c/0xd0
[   32.482861]  print_report+0x118/0x608
[   32.483131]  kasan_report+0xdc/0x128
[   32.483192]  kasan_check_range+0x100/0x1a8
[   32.483239]  __kasan_check_write+0x20/0x30
[   32.483385]  kasan_atomics_helper+0x11f8/0x4858
[   32.483494]  kasan_atomics+0x198/0x2e0
[   32.483570]  kunit_try_run_case+0x170/0x3f0
[   32.483622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.483680]  kthread+0x328/0x630
[   32.483724]  ret_from_fork+0x10/0x20
[   32.483912] 
[   32.484148] Allocated by task 298:
[   32.484222]  kasan_save_stack+0x3c/0x68
[   32.484325]  kasan_save_track+0x20/0x40
[   32.484368]  kasan_save_alloc_info+0x40/0x58
[   32.484415]  __kasan_kmalloc+0xd4/0xd8
[   32.484462]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.484653]  kasan_atomics+0xb8/0x2e0
[   32.484720]  kunit_try_run_case+0x170/0x3f0
[   32.484850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.484927]  kthread+0x328/0x630
[   32.484966]  ret_from_fork+0x10/0x20
[   32.485005] 
[   32.485027] The buggy address belongs to the object at fff00000c5ae7400
[   32.485027]  which belongs to the cache kmalloc-64 of size 64
[   32.485299] The buggy address is located 0 bytes to the right of
[   32.485299]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.485404] 
[   32.485488] The buggy address belongs to the physical page:
[   32.485523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.485607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.485657] page_type: f5(slab)
[   32.485845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.485926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.486146] page dumped because: kasan: bad access detected
[   32.486205] 
[   32.486237] Memory state around the buggy address:
[   32.486271]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.486336]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.486382] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.486433]                                      ^
[   32.486476]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.486523]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.486575] ==================================================================
[   32.503536] ==================================================================
[   32.503594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   32.503648] Read of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.504168] 
[   32.504214] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.504302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.504368] Hardware name: linux,dummy-virt (DT)
[   32.504532] Call trace:
[   32.504583]  show_stack+0x20/0x38 (C)
[   32.504760]  dump_stack_lvl+0x8c/0xd0
[   32.504855]  print_report+0x118/0x608
[   32.504955]  kasan_report+0xdc/0x128
[   32.505007]  __asan_report_load8_noabort+0x20/0x30
[   32.505067]  kasan_atomics_helper+0x3f04/0x4858
[   32.505119]  kasan_atomics+0x198/0x2e0
[   32.505166]  kunit_try_run_case+0x170/0x3f0
[   32.505216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.505273]  kthread+0x328/0x630
[   32.505317]  ret_from_fork+0x10/0x20
[   32.505367] 
[   32.505399] Allocated by task 298:
[   32.505441]  kasan_save_stack+0x3c/0x68
[   32.505484]  kasan_save_track+0x20/0x40
[   32.505525]  kasan_save_alloc_info+0x40/0x58
[   32.505573]  __kasan_kmalloc+0xd4/0xd8
[   32.505622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.505665]  kasan_atomics+0xb8/0x2e0
[   32.505734]  kunit_try_run_case+0x170/0x3f0
[   32.505777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.505842]  kthread+0x328/0x630
[   32.505879]  ret_from_fork+0x10/0x20
[   32.505927] 
[   32.505948] The buggy address belongs to the object at fff00000c5ae7400
[   32.505948]  which belongs to the cache kmalloc-64 of size 64
[   32.506368] The buggy address is located 0 bytes to the right of
[   32.506368]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.506496] 
[   32.506692] The buggy address belongs to the physical page:
[   32.506814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.506977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.507029] page_type: f5(slab)
[   32.507069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.507122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.507505] page dumped because: kasan: bad access detected
[   32.507547] 
[   32.507579] Memory state around the buggy address:
[   32.507697]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.508013]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.508081] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.508123]                                      ^
[   32.508409]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.508556]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.508646] ==================================================================
[   32.437315] ==================================================================
[   32.437379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   32.437463] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.437518] 
[   32.437551] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.437750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.437997] Hardware name: linux,dummy-virt (DT)
[   32.438083] Call trace:
[   32.438180]  show_stack+0x20/0x38 (C)
[   32.438372]  dump_stack_lvl+0x8c/0xd0
[   32.438533]  print_report+0x118/0x608
[   32.438589]  kasan_report+0xdc/0x128
[   32.438873]  kasan_check_range+0x100/0x1a8
[   32.439018]  __kasan_check_write+0x20/0x30
[   32.439190]  kasan_atomics_helper+0xf20/0x4858
[   32.439519]  kasan_atomics+0x198/0x2e0
[   32.439610]  kunit_try_run_case+0x170/0x3f0
[   32.439765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.439850]  kthread+0x328/0x630
[   32.440050]  ret_from_fork+0x10/0x20
[   32.440219] 
[   32.440242] Allocated by task 298:
[   32.440279]  kasan_save_stack+0x3c/0x68
[   32.440326]  kasan_save_track+0x20/0x40
[   32.440368]  kasan_save_alloc_info+0x40/0x58
[   32.440409]  __kasan_kmalloc+0xd4/0xd8
[   32.440449]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.440531]  kasan_atomics+0xb8/0x2e0
[   32.440595]  kunit_try_run_case+0x170/0x3f0
[   32.440653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.440701]  kthread+0x328/0x630
[   32.440761]  ret_from_fork+0x10/0x20
[   32.440806] 
[   32.440838] The buggy address belongs to the object at fff00000c5ae7400
[   32.440838]  which belongs to the cache kmalloc-64 of size 64
[   32.441206] The buggy address is located 0 bytes to the right of
[   32.441206]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.441415] 
[   32.441478] The buggy address belongs to the physical page:
[   32.441642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.444617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.444682] page_type: f5(slab)
[   32.444731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.444791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.444835] page dumped because: kasan: bad access detected
[   32.444870] 
[   32.444891] Memory state around the buggy address:
[   32.444981]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.445027]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.445071] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.445113]                                      ^
[   32.445149]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.445193]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.445233] ==================================================================
[   32.496197] ==================================================================
[   32.496395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   32.496458] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.496550] 
[   32.496609] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.496719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.496767] Hardware name: linux,dummy-virt (DT)
[   32.496829] Call trace:
[   32.497013]  show_stack+0x20/0x38 (C)
[   32.497219]  dump_stack_lvl+0x8c/0xd0
[   32.497283]  print_report+0x118/0x608
[   32.497444]  kasan_report+0xdc/0x128
[   32.497496]  kasan_check_range+0x100/0x1a8
[   32.497573]  __kasan_check_write+0x20/0x30
[   32.497622]  kasan_atomics_helper+0x1384/0x4858
[   32.497735]  kasan_atomics+0x198/0x2e0
[   32.497792]  kunit_try_run_case+0x170/0x3f0
[   32.497846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.497912]  kthread+0x328/0x630
[   32.498251]  ret_from_fork+0x10/0x20
[   32.498338] 
[   32.498390] Allocated by task 298:
[   32.498588]  kasan_save_stack+0x3c/0x68
[   32.498861]  kasan_save_track+0x20/0x40
[   32.499080]  kasan_save_alloc_info+0x40/0x58
[   32.499148]  __kasan_kmalloc+0xd4/0xd8
[   32.499189]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.499232]  kasan_atomics+0xb8/0x2e0
[   32.499296]  kunit_try_run_case+0x170/0x3f0
[   32.499338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.499386]  kthread+0x328/0x630
[   32.499615]  ret_from_fork+0x10/0x20
[   32.499787] 
[   32.499866] The buggy address belongs to the object at fff00000c5ae7400
[   32.499866]  which belongs to the cache kmalloc-64 of size 64
[   32.500124] The buggy address is located 0 bytes to the right of
[   32.500124]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.500377] 
[   32.500452] The buggy address belongs to the physical page:
[   32.500584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.500679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.500728] page_type: f5(slab)
[   32.501139] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.501358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.501444] page dumped because: kasan: bad access detected
[   32.501661] 
[   32.501922] Memory state around the buggy address:
[   32.502046]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.502171]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.502341] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.502458]                                      ^
[   32.502698]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.502929]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.502993] ==================================================================
[   32.554093] ==================================================================
[   32.554146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   32.554197] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.554250] 
[   32.554522] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.554772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.554841] Hardware name: linux,dummy-virt (DT)
[   32.554877] Call trace:
[   32.555075]  show_stack+0x20/0x38 (C)
[   32.555132]  dump_stack_lvl+0x8c/0xd0
[   32.555185]  print_report+0x118/0x608
[   32.555235]  kasan_report+0xdc/0x128
[   32.555516]  kasan_check_range+0x100/0x1a8
[   32.555746]  __kasan_check_write+0x20/0x30
[   32.555849]  kasan_atomics_helper+0x16d0/0x4858
[   32.555919]  kasan_atomics+0x198/0x2e0
[   32.555967]  kunit_try_run_case+0x170/0x3f0
[   32.556017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.556290]  kthread+0x328/0x630
[   32.556645]  ret_from_fork+0x10/0x20
[   32.556864] 
[   32.556892] Allocated by task 298:
[   32.556962]  kasan_save_stack+0x3c/0x68
[   32.557017]  kasan_save_track+0x20/0x40
[   32.557069]  kasan_save_alloc_info+0x40/0x58
[   32.557112]  __kasan_kmalloc+0xd4/0xd8
[   32.557373]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.557431]  kasan_atomics+0xb8/0x2e0
[   32.557521]  kunit_try_run_case+0x170/0x3f0
[   32.557565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.557613]  kthread+0x328/0x630
[   32.557648]  ret_from_fork+0x10/0x20
[   32.560625] 
[   32.560664] The buggy address belongs to the object at fff00000c5ae7400
[   32.560664]  which belongs to the cache kmalloc-64 of size 64
[   32.560732] The buggy address is located 0 bytes to the right of
[   32.560732]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.560810] 
[   32.560834] The buggy address belongs to the physical page:
[   32.560868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.560931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.560981] page_type: f5(slab)
[   32.561020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.561072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.561113] page dumped because: kasan: bad access detected
[   32.561148] 
[   32.561169] Memory state around the buggy address:
[   32.561202]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.561246]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.561291] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.561330]                                      ^
[   32.561364]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561409]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.561450] ==================================================================
[   32.532858] ==================================================================
[   32.532919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   32.532972] Read of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.533023] 
[   32.533053] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.533159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.533187] Hardware name: linux,dummy-virt (DT)
[   32.533221] Call trace:
[   32.533245]  show_stack+0x20/0x38 (C)
[   32.533294]  dump_stack_lvl+0x8c/0xd0
[   32.533340]  print_report+0x118/0x608
[   32.533838]  kasan_report+0xdc/0x128
[   32.533921]  __asan_report_load8_noabort+0x20/0x30
[   32.533973]  kasan_atomics_helper+0x3db0/0x4858
[   32.534024]  kasan_atomics+0x198/0x2e0
[   32.534071]  kunit_try_run_case+0x170/0x3f0
[   32.534247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.534489]  kthread+0x328/0x630
[   32.534566]  ret_from_fork+0x10/0x20
[   32.534908] 
[   32.535154] Allocated by task 298:
[   32.535231]  kasan_save_stack+0x3c/0x68
[   32.535378]  kasan_save_track+0x20/0x40
[   32.535438]  kasan_save_alloc_info+0x40/0x58
[   32.535478]  __kasan_kmalloc+0xd4/0xd8
[   32.535544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.535587]  kasan_atomics+0xb8/0x2e0
[   32.535627]  kunit_try_run_case+0x170/0x3f0
[   32.536006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.536101]  kthread+0x328/0x630
[   32.536253]  ret_from_fork+0x10/0x20
[   32.536367] 
[   32.536447] The buggy address belongs to the object at fff00000c5ae7400
[   32.536447]  which belongs to the cache kmalloc-64 of size 64
[   32.536773] The buggy address is located 0 bytes to the right of
[   32.536773]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.536852] 
[   32.536875] The buggy address belongs to the physical page:
[   32.536920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.537247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.537389] page_type: f5(slab)
[   32.537494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.537916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.538109] page dumped because: kasan: bad access detected
[   32.538180] 
[   32.538201] Memory state around the buggy address:
[   32.538234]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.538307]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.538353] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.538845]                                      ^
[   32.539070]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.539179]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.539499] ==================================================================
[   32.451760] ==================================================================
[   32.451851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   32.451959] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.452014] 
[   32.452047] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.452135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.452162] Hardware name: linux,dummy-virt (DT)
[   32.452194] Call trace:
[   32.452268]  show_stack+0x20/0x38 (C)
[   32.452496]  dump_stack_lvl+0x8c/0xd0
[   32.452619]  print_report+0x118/0x608
[   32.452823]  kasan_report+0xdc/0x128
[   32.453049]  kasan_check_range+0x100/0x1a8
[   32.453160]  __kasan_check_write+0x20/0x30
[   32.453247]  kasan_atomics_helper+0xff0/0x4858
[   32.453301]  kasan_atomics+0x198/0x2e0
[   32.453414]  kunit_try_run_case+0x170/0x3f0
[   32.453468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.453524]  kthread+0x328/0x630
[   32.453606]  ret_from_fork+0x10/0x20
[   32.453672] 
[   32.453749] Allocated by task 298:
[   32.453862]  kasan_save_stack+0x3c/0x68
[   32.453930]  kasan_save_track+0x20/0x40
[   32.453974]  kasan_save_alloc_info+0x40/0x58
[   32.454014]  __kasan_kmalloc+0xd4/0xd8
[   32.454055]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.454097]  kasan_atomics+0xb8/0x2e0
[   32.454137]  kunit_try_run_case+0x170/0x3f0
[   32.454470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.454531]  kthread+0x328/0x630
[   32.454585]  ret_from_fork+0x10/0x20
[   32.454626] 
[   32.454650] The buggy address belongs to the object at fff00000c5ae7400
[   32.454650]  which belongs to the cache kmalloc-64 of size 64
[   32.454713] The buggy address is located 0 bytes to the right of
[   32.454713]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.454787] 
[   32.454812] The buggy address belongs to the physical page:
[   32.454846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.454924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.454976] page_type: f5(slab)
[   32.455015] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.455334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.455435] page dumped because: kasan: bad access detected
[   32.455572] 
[   32.455866] Memory state around the buggy address:
[   32.455922]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.456115]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.456334] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.456526]                                      ^
[   32.456808]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.456877]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.456987] ==================================================================
[   32.328263] ==================================================================
[   32.328415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   32.328478] Write of size 4 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.328532] 
[   32.328584] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.328673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.328928] Hardware name: linux,dummy-virt (DT)
[   32.329117] Call trace:
[   32.329195]  show_stack+0x20/0x38 (C)
[   32.329416]  dump_stack_lvl+0x8c/0xd0
[   32.329518]  print_report+0x118/0x608
[   32.329619]  kasan_report+0xdc/0x128
[   32.329674]  kasan_check_range+0x100/0x1a8
[   32.329823]  __kasan_check_write+0x20/0x30
[   32.329876]  kasan_atomics_helper+0xa6c/0x4858
[   32.330049]  kasan_atomics+0x198/0x2e0
[   32.330260]  kunit_try_run_case+0x170/0x3f0
[   32.330374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.330628]  kthread+0x328/0x630
[   32.330790]  ret_from_fork+0x10/0x20
[   32.330987] 
[   32.331048] Allocated by task 298:
[   32.331113]  kasan_save_stack+0x3c/0x68
[   32.331161]  kasan_save_track+0x20/0x40
[   32.331543]  kasan_save_alloc_info+0x40/0x58
[   32.331673]  __kasan_kmalloc+0xd4/0xd8
[   32.331886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.332076]  kasan_atomics+0xb8/0x2e0
[   32.332181]  kunit_try_run_case+0x170/0x3f0
[   32.332291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.332466]  kthread+0x328/0x630
[   32.332697]  ret_from_fork+0x10/0x20
[   32.332833] 
[   32.333095] The buggy address belongs to the object at fff00000c5ae7400
[   32.333095]  which belongs to the cache kmalloc-64 of size 64
[   32.333277] The buggy address is located 0 bytes to the right of
[   32.333277]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.333478] 
[   32.333579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.333641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.333692] page_type: f5(slab)
[   32.333864] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.333990] page dumped because: kasan: bad access detected
[   32.334498]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.337010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.338210]  kasan_save_stack+0x3c/0x68
[   32.340924] 
[   32.341206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.341442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.341932] page_type: f5(slab)
[   32.342016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.342096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.342262] page dumped because: kasan: bad access detected
[   32.342524] 
[   32.342635] Memory state around the buggy address:
[   32.342776]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.342822]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.342874] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.342922]                                      ^
[   32.343202]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.343369]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.343454] ==================================================================
[   32.461172] ==================================================================
[   32.461220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   32.461271] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.461822] 
[   32.461941] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.462057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.462086] Hardware name: linux,dummy-virt (DT)
[   32.462119] Call trace:
[   32.462144]  show_stack+0x20/0x38 (C)
[   32.462238]  dump_stack_lvl+0x8c/0xd0
[   32.462289]  print_report+0x118/0x608
[   32.462348]  kasan_report+0xdc/0x128
[   32.462594]  kasan_check_range+0x100/0x1a8
[   32.462694]  __kasan_check_write+0x20/0x30
[   32.462816]  kasan_atomics_helper+0x10c0/0x4858
[   32.463255]  kasan_atomics+0x198/0x2e0
[   32.463351]  kunit_try_run_case+0x170/0x3f0
[   32.463493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.463611]  kthread+0x328/0x630
[   32.463744]  ret_from_fork+0x10/0x20
[   32.463910] 
[   32.464018] Allocated by task 298:
[   32.464098]  kasan_save_stack+0x3c/0x68
[   32.464230]  kasan_save_track+0x20/0x40
[   32.464351]  kasan_save_alloc_info+0x40/0x58
[   32.464494]  __kasan_kmalloc+0xd4/0xd8
[   32.464564]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.464608]  kasan_atomics+0xb8/0x2e0
[   32.464649]  kunit_try_run_case+0x170/0x3f0
[   32.464920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.465185]  kthread+0x328/0x630
[   32.465245]  ret_from_fork+0x10/0x20
[   32.465646] 
[   32.465794] The buggy address belongs to the object at fff00000c5ae7400
[   32.465794]  which belongs to the cache kmalloc-64 of size 64
[   32.465881] The buggy address is located 0 bytes to the right of
[   32.465881]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.465962] 
[   32.465986] The buggy address belongs to the physical page:
[   32.466022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.466372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.466488] page_type: f5(slab)
[   32.466675] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.466806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.467013] page dumped because: kasan: bad access detected
[   32.467049] 
[   32.467070] Memory state around the buggy address:
[   32.467338]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.467435]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.467541] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.467621]                                      ^
[   32.468130]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.468267]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.468367] ==================================================================
[   32.381581] ==================================================================
[   32.381622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   32.381670] Read of size 4 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.381736] 
[   32.381768] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.382403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.382494] Hardware name: linux,dummy-virt (DT)
[   32.382574] Call trace:
[   32.382769]  show_stack+0x20/0x38 (C)
[   32.382824]  dump_stack_lvl+0x8c/0xd0
[   32.382873]  print_report+0x118/0x608
[   32.382935]  kasan_report+0xdc/0x128
[   32.383090]  __asan_report_load4_noabort+0x20/0x30
[   32.383305]  kasan_atomics_helper+0x3dd8/0x4858
[   32.383636]  kasan_atomics+0x198/0x2e0
[   32.383833]  kunit_try_run_case+0x170/0x3f0
[   32.383970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.384030]  kthread+0x328/0x630
[   32.384306]  ret_from_fork+0x10/0x20
[   32.384594] 
[   32.384756] Allocated by task 298:
[   32.384995]  kasan_save_stack+0x3c/0x68
[   32.385086]  kasan_save_track+0x20/0x40
[   32.385136]  kasan_save_alloc_info+0x40/0x58
[   32.385374]  __kasan_kmalloc+0xd4/0xd8
[   32.385572]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.386081]  kasan_atomics+0xb8/0x2e0
[   32.386191]  kunit_try_run_case+0x170/0x3f0
[   32.386250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.386297]  kthread+0x328/0x630
[   32.386597]  ret_from_fork+0x10/0x20
[   32.386811] 
[   32.387259] The buggy address belongs to the object at fff00000c5ae7400
[   32.387259]  which belongs to the cache kmalloc-64 of size 64
[   32.387347] The buggy address is located 0 bytes to the right of
[   32.387347]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.387428] 
[   32.387452] The buggy address belongs to the physical page:
[   32.387667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.387873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.387981] page_type: f5(slab)
[   32.388275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.388404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.388525] page dumped because: kasan: bad access detected
[   32.388664] 
[   32.389123] Memory state around the buggy address:
[   32.389219]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.389274]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.389686] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.389757]                                      ^
[   32.389825]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.390263]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.390353] ==================================================================
[   32.545504] ==================================================================
[   32.545551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   32.545602] Read of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.545654] 
[   32.545686] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.545780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.545810] Hardware name: linux,dummy-virt (DT)
[   32.545842] Call trace:
[   32.546417]  show_stack+0x20/0x38 (C)
[   32.546489]  dump_stack_lvl+0x8c/0xd0
[   32.546558]  print_report+0x118/0x608
[   32.546615]  kasan_report+0xdc/0x128
[   32.547000]  __asan_report_load8_noabort+0x20/0x30
[   32.547081]  kasan_atomics_helper+0x3df4/0x4858
[   32.547385]  kasan_atomics+0x198/0x2e0
[   32.547478]  kunit_try_run_case+0x170/0x3f0
[   32.547561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.547823]  kthread+0x328/0x630
[   32.548092]  ret_from_fork+0x10/0x20
[   32.548204] 
[   32.548332] Allocated by task 298:
[   32.548487]  kasan_save_stack+0x3c/0x68
[   32.548551]  kasan_save_track+0x20/0x40
[   32.548940]  kasan_save_alloc_info+0x40/0x58
[   32.549012]  __kasan_kmalloc+0xd4/0xd8
[   32.549184]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.549432]  kasan_atomics+0xb8/0x2e0
[   32.549533]  kunit_try_run_case+0x170/0x3f0
[   32.549757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.549847]  kthread+0x328/0x630
[   32.549885]  ret_from_fork+0x10/0x20
[   32.550273] 
[   32.550362] The buggy address belongs to the object at fff00000c5ae7400
[   32.550362]  which belongs to the cache kmalloc-64 of size 64
[   32.550499] The buggy address is located 0 bytes to the right of
[   32.550499]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.550651] 
[   32.550844] The buggy address belongs to the physical page:
[   32.551149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.551305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.551394] page_type: f5(slab)
[   32.551443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.551653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.551865] page dumped because: kasan: bad access detected
[   32.552088] 
[   32.552148] Memory state around the buggy address:
[   32.552184]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.552247]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.552305] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.552624]                                      ^
[   32.552729]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.552803]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.553254] ==================================================================
[   32.457631] ==================================================================
[   32.457766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   32.457915] Write of size 8 at addr fff00000c5ae7430 by task kunit_try_catch/298
[   32.458097] 
[   32.458210] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.458345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.458394] Hardware name: linux,dummy-virt (DT)
[   32.458427] Call trace:
[   32.458452]  show_stack+0x20/0x38 (C)
[   32.458532]  dump_stack_lvl+0x8c/0xd0
[   32.458894]  print_report+0x118/0x608
[   32.458968]  kasan_report+0xdc/0x128
[   32.459018]  kasan_check_range+0x100/0x1a8
[   32.459065]  __kasan_check_write+0x20/0x30
[   32.459114]  kasan_atomics_helper+0x1058/0x4858
[   32.459177]  kasan_atomics+0x198/0x2e0
[   32.459246]  kunit_try_run_case+0x170/0x3f0
[   32.459322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.459391]  kthread+0x328/0x630
[   32.459444]  ret_from_fork+0x10/0x20
[   32.459515] 
[   32.459547] Allocated by task 298:
[   32.459577]  kasan_save_stack+0x3c/0x68
[   32.459623]  kasan_save_track+0x20/0x40
[   32.459666]  kasan_save_alloc_info+0x40/0x58
[   32.459726]  __kasan_kmalloc+0xd4/0xd8
[   32.459766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.459810]  kasan_atomics+0xb8/0x2e0
[   32.459861]  kunit_try_run_case+0x170/0x3f0
[   32.459920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.459970]  kthread+0x328/0x630
[   32.460007]  ret_from_fork+0x10/0x20
[   32.460046] 
[   32.460070] The buggy address belongs to the object at fff00000c5ae7400
[   32.460070]  which belongs to the cache kmalloc-64 of size 64
[   32.460141] The buggy address is located 0 bytes to the right of
[   32.460141]  allocated 48-byte region [fff00000c5ae7400, fff00000c5ae7430)
[   32.460218] 
[   32.460271] The buggy address belongs to the physical page:
[   32.460317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae7
[   32.460381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.460439] page_type: f5(slab)
[   32.460498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.460559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.460606] page dumped because: kasan: bad access detected
[   32.460648] 
[   32.460678] Memory state around the buggy address:
[   32.460712]  fff00000c5ae7300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.460758]  fff00000c5ae7380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.460807] >fff00000c5ae7400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.460857]                                      ^
[   32.460893]  fff00000c5ae7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.460948]  fff00000c5ae7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.460989] ==================================================================

[   27.765836] ==================================================================
[   27.766296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   27.767235] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.767608] 
[   27.767737] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.767796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.767814] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.767842] Call Trace:
[   27.767867]  <TASK>
[   27.767893]  dump_stack_lvl+0x73/0xb0
[   27.767928]  print_report+0xd1/0x650
[   27.768267]  ? __virt_addr_valid+0x1db/0x2d0
[   27.768300]  ? kasan_atomics_helper+0x4b54/0x5450
[   27.768330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.768361]  ? kasan_atomics_helper+0x4b54/0x5450
[   27.768407]  kasan_report+0x141/0x180
[   27.768433]  ? kasan_atomics_helper+0x4b54/0x5450
[   27.768469]  __asan_report_load4_noabort+0x18/0x20
[   27.768497]  kasan_atomics_helper+0x4b54/0x5450
[   27.768530]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.768561]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.768591]  ? kasan_atomics+0x152/0x310
[   27.768622]  kasan_atomics+0x1dc/0x310
[   27.768648]  ? __pfx_kasan_atomics+0x10/0x10
[   27.768678]  ? __pfx_read_tsc+0x10/0x10
[   27.768709]  ? ktime_get_ts64+0x86/0x230
[   27.768741]  kunit_try_run_case+0x1a5/0x480
[   27.768772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.768800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.768830]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.768860]  ? __kthread_parkme+0x82/0x180
[   27.768885]  ? preempt_count_sub+0x50/0x80
[   27.768914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.768960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.768990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.769020]  kthread+0x337/0x6f0
[   27.769044]  ? trace_preempt_on+0x20/0xc0
[   27.769073]  ? __pfx_kthread+0x10/0x10
[   27.769098]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.769126]  ? calculate_sigpending+0x7b/0xa0
[   27.769155]  ? __pfx_kthread+0x10/0x10
[   27.769181]  ret_from_fork+0x116/0x1d0
[   27.769205]  ? __pfx_kthread+0x10/0x10
[   27.769230]  ret_from_fork_asm+0x1a/0x30
[   27.769268]  </TASK>
[   27.769283] 
[   27.781509] Allocated by task 314:
[   27.781730]  kasan_save_stack+0x45/0x70
[   27.782093]  kasan_save_track+0x18/0x40
[   27.782331]  kasan_save_alloc_info+0x3b/0x50
[   27.782773]  __kasan_kmalloc+0xb7/0xc0
[   27.783054]  __kmalloc_cache_noprof+0x189/0x420
[   27.783424]  kasan_atomics+0x95/0x310
[   27.783607]  kunit_try_run_case+0x1a5/0x480
[   27.783827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.784411]  kthread+0x337/0x6f0
[   27.784602]  ret_from_fork+0x116/0x1d0
[   27.784791]  ret_from_fork_asm+0x1a/0x30
[   27.785013] 
[   27.785139] The buggy address belongs to the object at ffff88810625b900
[   27.785139]  which belongs to the cache kmalloc-64 of size 64
[   27.786013] The buggy address is located 0 bytes to the right of
[   27.786013]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.786903] 
[   27.787100] The buggy address belongs to the physical page:
[   27.787445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.787987] flags: 0x200000000000000(node=0|zone=2)
[   27.788230] page_type: f5(slab)
[   27.788548] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.788916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.789415] page dumped because: kasan: bad access detected
[   27.789658] 
[   27.789749] Memory state around the buggy address:
[   27.790268]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.790589]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.791051] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.791678]                                      ^
[   27.792049]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.792625]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.793285] ==================================================================
[   28.882082] ==================================================================
[   28.882846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   28.883304] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.883766] 
[   28.883946] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.884001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.884015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.884041] Call Trace:
[   28.884063]  <TASK>
[   28.884085]  dump_stack_lvl+0x73/0xb0
[   28.884116]  print_report+0xd1/0x650
[   28.884142]  ? __virt_addr_valid+0x1db/0x2d0
[   28.884170]  ? kasan_atomics_helper+0x19e3/0x5450
[   28.884196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.884231]  ? kasan_atomics_helper+0x19e3/0x5450
[   28.884259]  kasan_report+0x141/0x180
[   28.884283]  ? kasan_atomics_helper+0x19e3/0x5450
[   28.884316]  kasan_check_range+0x10c/0x1c0
[   28.884342]  __kasan_check_write+0x18/0x20
[   28.884367]  kasan_atomics_helper+0x19e3/0x5450
[   28.884407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.884470]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.884497]  ? kasan_atomics+0x152/0x310
[   28.884536]  kasan_atomics+0x1dc/0x310
[   28.884561]  ? __pfx_kasan_atomics+0x10/0x10
[   28.884587]  ? __pfx_read_tsc+0x10/0x10
[   28.884612]  ? ktime_get_ts64+0x86/0x230
[   28.884667]  kunit_try_run_case+0x1a5/0x480
[   28.884696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.884734]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.884762]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.884815]  ? __kthread_parkme+0x82/0x180
[   28.884838]  ? preempt_count_sub+0x50/0x80
[   28.884865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.884915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.884942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.884996]  kthread+0x337/0x6f0
[   28.885019]  ? trace_preempt_on+0x20/0xc0
[   28.885058]  ? __pfx_kthread+0x10/0x10
[   28.885081]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.885123]  ? calculate_sigpending+0x7b/0xa0
[   28.885162]  ? __pfx_kthread+0x10/0x10
[   28.885187]  ret_from_fork+0x116/0x1d0
[   28.885219]  ? __pfx_kthread+0x10/0x10
[   28.885243]  ret_from_fork_asm+0x1a/0x30
[   28.885305]  </TASK>
[   28.885319] 
[   28.893932] Allocated by task 314:
[   28.894133]  kasan_save_stack+0x45/0x70
[   28.894342]  kasan_save_track+0x18/0x40
[   28.894576]  kasan_save_alloc_info+0x3b/0x50
[   28.894800]  __kasan_kmalloc+0xb7/0xc0
[   28.895092]  __kmalloc_cache_noprof+0x189/0x420
[   28.895342]  kasan_atomics+0x95/0x310
[   28.895596]  kunit_try_run_case+0x1a5/0x480
[   28.895913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.896175]  kthread+0x337/0x6f0
[   28.896348]  ret_from_fork+0x116/0x1d0
[   28.896547]  ret_from_fork_asm+0x1a/0x30
[   28.896741] 
[   28.896841] The buggy address belongs to the object at ffff88810625b900
[   28.896841]  which belongs to the cache kmalloc-64 of size 64
[   28.897223] The buggy address is located 0 bytes to the right of
[   28.897223]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.897756] 
[   28.897931] The buggy address belongs to the physical page:
[   28.898194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.898612] flags: 0x200000000000000(node=0|zone=2)
[   28.898830] page_type: f5(slab)
[   28.899137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.899520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.899889] page dumped because: kasan: bad access detected
[   28.900157] 
[   28.900253] Memory state around the buggy address:
[   28.900507]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.900861]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.901226] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.901563]                                      ^
[   28.901795]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.902457]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.902699] ==================================================================
[   28.903418] ==================================================================
[   28.903802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   28.904318] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.904642] 
[   28.904759] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.904814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.904829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.904854] Call Trace:
[   28.904899]  <TASK>
[   28.904933]  dump_stack_lvl+0x73/0xb0
[   28.904991]  print_report+0xd1/0x650
[   28.905033]  ? __virt_addr_valid+0x1db/0x2d0
[   28.905074]  ? kasan_atomics_helper+0x1a7f/0x5450
[   28.905116]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.905158]  ? kasan_atomics_helper+0x1a7f/0x5450
[   28.905212]  kasan_report+0x141/0x180
[   28.905250]  ? kasan_atomics_helper+0x1a7f/0x5450
[   28.905296]  kasan_check_range+0x10c/0x1c0
[   28.905336]  __kasan_check_write+0x18/0x20
[   28.905375]  kasan_atomics_helper+0x1a7f/0x5450
[   28.905427]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.905469]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.905496]  ? kasan_atomics+0x152/0x310
[   28.905525]  kasan_atomics+0x1dc/0x310
[   28.905550]  ? __pfx_kasan_atomics+0x10/0x10
[   28.905577]  ? __pfx_read_tsc+0x10/0x10
[   28.905602]  ? ktime_get_ts64+0x86/0x230
[   28.905629]  kunit_try_run_case+0x1a5/0x480
[   28.905657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.905683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.905710]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.905737]  ? __kthread_parkme+0x82/0x180
[   28.905760]  ? preempt_count_sub+0x50/0x80
[   28.905787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.905813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.905842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.905870]  kthread+0x337/0x6f0
[   28.905902]  ? trace_preempt_on+0x20/0xc0
[   28.905938]  ? __pfx_kthread+0x10/0x10
[   28.905962]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.905999]  ? calculate_sigpending+0x7b/0xa0
[   28.906026]  ? __pfx_kthread+0x10/0x10
[   28.906050]  ret_from_fork+0x116/0x1d0
[   28.906074]  ? __pfx_kthread+0x10/0x10
[   28.906098]  ret_from_fork_asm+0x1a/0x30
[   28.906133]  </TASK>
[   28.906148] 
[   28.914740] Allocated by task 314:
[   28.914951]  kasan_save_stack+0x45/0x70
[   28.915232]  kasan_save_track+0x18/0x40
[   28.915445]  kasan_save_alloc_info+0x3b/0x50
[   28.915681]  __kasan_kmalloc+0xb7/0xc0
[   28.915918]  __kmalloc_cache_noprof+0x189/0x420
[   28.916156]  kasan_atomics+0x95/0x310
[   28.916368]  kunit_try_run_case+0x1a5/0x480
[   28.916581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.916827]  kthread+0x337/0x6f0
[   28.917052]  ret_from_fork+0x116/0x1d0
[   28.917273]  ret_from_fork_asm+0x1a/0x30
[   28.917504] 
[   28.917641] The buggy address belongs to the object at ffff88810625b900
[   28.917641]  which belongs to the cache kmalloc-64 of size 64
[   28.918211] The buggy address is located 0 bytes to the right of
[   28.918211]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.918821] 
[   28.918944] The buggy address belongs to the physical page:
[   28.919165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.919571] flags: 0x200000000000000(node=0|zone=2)
[   28.919810] page_type: f5(slab)
[   28.920084] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.920442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.920851] page dumped because: kasan: bad access detected
[   28.921136] 
[   28.921265] Memory state around the buggy address:
[   28.921565]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.921786]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.922103] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.922432]                                      ^
[   28.922665]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.923078]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.923297] ==================================================================
[   29.078619] ==================================================================
[   29.079067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   29.079378] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.079691] 
[   29.079808] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.079861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.079877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.079944] Call Trace:
[   29.079966]  <TASK>
[   29.080001]  dump_stack_lvl+0x73/0xb0
[   29.080032]  print_report+0xd1/0x650
[   29.080058]  ? __virt_addr_valid+0x1db/0x2d0
[   29.080088]  ? kasan_atomics_helper+0x1f43/0x5450
[   29.080116]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.080145]  ? kasan_atomics_helper+0x1f43/0x5450
[   29.080173]  kasan_report+0x141/0x180
[   29.080198]  ? kasan_atomics_helper+0x1f43/0x5450
[   29.080236]  kasan_check_range+0x10c/0x1c0
[   29.080263]  __kasan_check_write+0x18/0x20
[   29.080320]  kasan_atomics_helper+0x1f43/0x5450
[   29.080350]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.080399]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.080427]  ? kasan_atomics+0x152/0x310
[   29.080456]  kasan_atomics+0x1dc/0x310
[   29.080482]  ? __pfx_kasan_atomics+0x10/0x10
[   29.080508]  ? __pfx_read_tsc+0x10/0x10
[   29.080532]  ? ktime_get_ts64+0x86/0x230
[   29.080561]  kunit_try_run_case+0x1a5/0x480
[   29.080589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.080614]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.080642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.080669]  ? __kthread_parkme+0x82/0x180
[   29.080693]  ? preempt_count_sub+0x50/0x80
[   29.080721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.080749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.080811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.080840]  kthread+0x337/0x6f0
[   29.080873]  ? trace_preempt_on+0x20/0xc0
[   29.080914]  ? __pfx_kthread+0x10/0x10
[   29.080938]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.080987]  ? calculate_sigpending+0x7b/0xa0
[   29.081015]  ? __pfx_kthread+0x10/0x10
[   29.081040]  ret_from_fork+0x116/0x1d0
[   29.081083]  ? __pfx_kthread+0x10/0x10
[   29.081106]  ret_from_fork_asm+0x1a/0x30
[   29.081152]  </TASK>
[   29.081166] 
[   29.091905] Allocated by task 314:
[   29.092081]  kasan_save_stack+0x45/0x70
[   29.092530]  kasan_save_track+0x18/0x40
[   29.092922]  kasan_save_alloc_info+0x3b/0x50
[   29.093291]  __kasan_kmalloc+0xb7/0xc0
[   29.093616]  __kmalloc_cache_noprof+0x189/0x420
[   29.093973]  kasan_atomics+0x95/0x310
[   29.094339]  kunit_try_run_case+0x1a5/0x480
[   29.094506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.095133]  kthread+0x337/0x6f0
[   29.095532]  ret_from_fork+0x116/0x1d0
[   29.095756]  ret_from_fork_asm+0x1a/0x30
[   29.096208] 
[   29.096329] The buggy address belongs to the object at ffff88810625b900
[   29.096329]  which belongs to the cache kmalloc-64 of size 64
[   29.097091] The buggy address is located 0 bytes to the right of
[   29.097091]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.097505] 
[   29.097608] The buggy address belongs to the physical page:
[   29.097839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.098248] flags: 0x200000000000000(node=0|zone=2)
[   29.098481] page_type: f5(slab)
[   29.098619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.098955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.099456] page dumped because: kasan: bad access detected
[   29.099691] 
[   29.099775] Memory state around the buggy address:
[   29.100056]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.100314]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.100661] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.101039]                                      ^
[   29.101235]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.101582]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.101900] ==================================================================
[   28.680285] ==================================================================
[   28.681428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   28.682457] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.683044] 
[   28.683384] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.683461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.683478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.683506] Call Trace:
[   28.683529]  <TASK>
[   28.683552]  dump_stack_lvl+0x73/0xb0
[   28.683587]  print_report+0xd1/0x650
[   28.683614]  ? __virt_addr_valid+0x1db/0x2d0
[   28.683643]  ? kasan_atomics_helper+0x151d/0x5450
[   28.683673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.683703]  ? kasan_atomics_helper+0x151d/0x5450
[   28.683733]  kasan_report+0x141/0x180
[   28.683759]  ? kasan_atomics_helper+0x151d/0x5450
[   28.683793]  kasan_check_range+0x10c/0x1c0
[   28.683821]  __kasan_check_write+0x18/0x20
[   28.683849]  kasan_atomics_helper+0x151d/0x5450
[   28.683993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.684048]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.684093]  ? kasan_atomics+0x152/0x310
[   28.684126]  kasan_atomics+0x1dc/0x310
[   28.684192]  ? __pfx_kasan_atomics+0x10/0x10
[   28.684225]  ? __pfx_read_tsc+0x10/0x10
[   28.684252]  ? ktime_get_ts64+0x86/0x230
[   28.684282]  kunit_try_run_case+0x1a5/0x480
[   28.684312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.684341]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.684371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.684411]  ? __kthread_parkme+0x82/0x180
[   28.684436]  ? preempt_count_sub+0x50/0x80
[   28.684466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.684496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.684526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.684555]  kthread+0x337/0x6f0
[   28.684580]  ? trace_preempt_on+0x20/0xc0
[   28.684611]  ? __pfx_kthread+0x10/0x10
[   28.684636]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.684663]  ? calculate_sigpending+0x7b/0xa0
[   28.684691]  ? __pfx_kthread+0x10/0x10
[   28.684717]  ret_from_fork+0x116/0x1d0
[   28.684740]  ? __pfx_kthread+0x10/0x10
[   28.684764]  ret_from_fork_asm+0x1a/0x30
[   28.684802]  </TASK>
[   28.684818] 
[   28.701087] Allocated by task 314:
[   28.701347]  kasan_save_stack+0x45/0x70
[   28.702494]  kasan_save_track+0x18/0x40
[   28.703109]  kasan_save_alloc_info+0x3b/0x50
[   28.703566]  __kasan_kmalloc+0xb7/0xc0
[   28.703739]  __kmalloc_cache_noprof+0x189/0x420
[   28.703929]  kasan_atomics+0x95/0x310
[   28.704082]  kunit_try_run_case+0x1a5/0x480
[   28.704259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.704502]  kthread+0x337/0x6f0
[   28.704644]  ret_from_fork+0x116/0x1d0
[   28.704822]  ret_from_fork_asm+0x1a/0x30
[   28.705086] 
[   28.705194] The buggy address belongs to the object at ffff88810625b900
[   28.705194]  which belongs to the cache kmalloc-64 of size 64
[   28.706022] The buggy address is located 0 bytes to the right of
[   28.706022]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.706998] 
[   28.707086] The buggy address belongs to the physical page:
[   28.707285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.708011] flags: 0x200000000000000(node=0|zone=2)
[   28.708550] page_type: f5(slab)
[   28.708944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.709705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.710122] page dumped because: kasan: bad access detected
[   28.710316] 
[   28.710404] Memory state around the buggy address:
[   28.710584]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.710827]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.711569] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.712298]                                      ^
[   28.712800]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.713524]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.714229] ==================================================================
[   28.793489] ==================================================================
[   28.793839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   28.794273] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.794691] 
[   28.794848] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.794968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.794987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.795029] Call Trace:
[   28.795052]  <TASK>
[   28.795092]  dump_stack_lvl+0x73/0xb0
[   28.795143]  print_report+0xd1/0x650
[   28.795172]  ? __virt_addr_valid+0x1db/0x2d0
[   28.795201]  ? kasan_atomics_helper+0x177f/0x5450
[   28.795230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.795273]  ? kasan_atomics_helper+0x177f/0x5450
[   28.795304]  kasan_report+0x141/0x180
[   28.795342]  ? kasan_atomics_helper+0x177f/0x5450
[   28.795377]  kasan_check_range+0x10c/0x1c0
[   28.795416]  __kasan_check_write+0x18/0x20
[   28.795444]  kasan_atomics_helper+0x177f/0x5450
[   28.795475]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.795505]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.795534]  ? kasan_atomics+0x152/0x310
[   28.795566]  kasan_atomics+0x1dc/0x310
[   28.795592]  ? __pfx_kasan_atomics+0x10/0x10
[   28.795653]  ? __pfx_read_tsc+0x10/0x10
[   28.795681]  ? ktime_get_ts64+0x86/0x230
[   28.795724]  kunit_try_run_case+0x1a5/0x480
[   28.795755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.795784]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.795814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.795844]  ? __kthread_parkme+0x82/0x180
[   28.795921]  ? preempt_count_sub+0x50/0x80
[   28.795951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.795994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.796024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.796084]  kthread+0x337/0x6f0
[   28.796108]  ? trace_preempt_on+0x20/0xc0
[   28.796150]  ? __pfx_kthread+0x10/0x10
[   28.796176]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.796204]  ? calculate_sigpending+0x7b/0xa0
[   28.796240]  ? __pfx_kthread+0x10/0x10
[   28.796267]  ret_from_fork+0x116/0x1d0
[   28.796290]  ? __pfx_kthread+0x10/0x10
[   28.796316]  ret_from_fork_asm+0x1a/0x30
[   28.796354]  </TASK>
[   28.796369] 
[   28.805255] Allocated by task 314:
[   28.805467]  kasan_save_stack+0x45/0x70
[   28.805712]  kasan_save_track+0x18/0x40
[   28.805994]  kasan_save_alloc_info+0x3b/0x50
[   28.806264]  __kasan_kmalloc+0xb7/0xc0
[   28.806570]  __kmalloc_cache_noprof+0x189/0x420
[   28.806884]  kasan_atomics+0x95/0x310
[   28.807094]  kunit_try_run_case+0x1a5/0x480
[   28.807303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.807556]  kthread+0x337/0x6f0
[   28.807741]  ret_from_fork+0x116/0x1d0
[   28.808021]  ret_from_fork_asm+0x1a/0x30
[   28.808249] 
[   28.808353] The buggy address belongs to the object at ffff88810625b900
[   28.808353]  which belongs to the cache kmalloc-64 of size 64
[   28.809054] The buggy address is located 0 bytes to the right of
[   28.809054]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.809680] 
[   28.809835] The buggy address belongs to the physical page:
[   28.810210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.810620] flags: 0x200000000000000(node=0|zone=2)
[   28.810973] page_type: f5(slab)
[   28.811162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.811594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.811996] page dumped because: kasan: bad access detected
[   28.812194] 
[   28.812275] Memory state around the buggy address:
[   28.812464]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.812862]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.813272] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.813639]                                      ^
[   28.813951]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.814278]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.814566] ==================================================================
[   28.268300] ==================================================================
[   28.269028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   28.269576] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.270157] 
[   28.270255] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.270332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.270347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.270373] Call Trace:
[   28.270406]  <TASK>
[   28.270431]  dump_stack_lvl+0x73/0xb0
[   28.270463]  print_report+0xd1/0x650
[   28.270490]  ? __virt_addr_valid+0x1db/0x2d0
[   28.270517]  ? kasan_atomics_helper+0xe78/0x5450
[   28.270545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.270574]  ? kasan_atomics_helper+0xe78/0x5450
[   28.270601]  kasan_report+0x141/0x180
[   28.270626]  ? kasan_atomics_helper+0xe78/0x5450
[   28.270659]  kasan_check_range+0x10c/0x1c0
[   28.270685]  __kasan_check_write+0x18/0x20
[   28.270710]  kasan_atomics_helper+0xe78/0x5450
[   28.270739]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.270767]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.270795]  ? kasan_atomics+0x152/0x310
[   28.270824]  kasan_atomics+0x1dc/0x310
[   28.270849]  ? __pfx_kasan_atomics+0x10/0x10
[   28.270875]  ? __pfx_read_tsc+0x10/0x10
[   28.270900]  ? ktime_get_ts64+0x86/0x230
[   28.270929]  kunit_try_run_case+0x1a5/0x480
[   28.270957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.270983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.271011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.271045]  ? __kthread_parkme+0x82/0x180
[   28.271068]  ? preempt_count_sub+0x50/0x80
[   28.271095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.271123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.271161]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.271189]  kthread+0x337/0x6f0
[   28.271212]  ? trace_preempt_on+0x20/0xc0
[   28.271239]  ? __pfx_kthread+0x10/0x10
[   28.271263]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.271288]  ? calculate_sigpending+0x7b/0xa0
[   28.271315]  ? __pfx_kthread+0x10/0x10
[   28.271340]  ret_from_fork+0x116/0x1d0
[   28.271362]  ? __pfx_kthread+0x10/0x10
[   28.271385]  ret_from_fork_asm+0x1a/0x30
[   28.271429]  </TASK>
[   28.271444] 
[   28.283981] Allocated by task 314:
[   28.284399]  kasan_save_stack+0x45/0x70
[   28.284843]  kasan_save_track+0x18/0x40
[   28.285265]  kasan_save_alloc_info+0x3b/0x50
[   28.285769]  __kasan_kmalloc+0xb7/0xc0
[   28.286164]  __kmalloc_cache_noprof+0x189/0x420
[   28.286648]  kasan_atomics+0x95/0x310
[   28.286994]  kunit_try_run_case+0x1a5/0x480
[   28.287470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.288042]  kthread+0x337/0x6f0
[   28.288420]  ret_from_fork+0x116/0x1d0
[   28.288828]  ret_from_fork_asm+0x1a/0x30
[   28.289251] 
[   28.289439] The buggy address belongs to the object at ffff88810625b900
[   28.289439]  which belongs to the cache kmalloc-64 of size 64
[   28.290718] The buggy address is located 0 bytes to the right of
[   28.290718]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.292009] 
[   28.292204] The buggy address belongs to the physical page:
[   28.292760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.293292] flags: 0x200000000000000(node=0|zone=2)
[   28.293480] page_type: f5(slab)
[   28.293608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.294489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.295334] page dumped because: kasan: bad access detected
[   28.295865] 
[   28.296067] Memory state around the buggy address:
[   28.296563]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.297255]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.298057] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.298712]                                      ^
[   28.299146]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.299863]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.300100] ==================================================================
[   28.815208] ==================================================================
[   28.815646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   28.815955] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.816276] 
[   28.816418] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.816512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.816529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.816588] Call Trace:
[   28.816610]  <TASK>
[   28.816645]  dump_stack_lvl+0x73/0xb0
[   28.816699]  print_report+0xd1/0x650
[   28.816740]  ? __virt_addr_valid+0x1db/0x2d0
[   28.816804]  ? kasan_atomics_helper+0x1818/0x5450
[   28.816834]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.816889]  ? kasan_atomics_helper+0x1818/0x5450
[   28.816921]  kasan_report+0x141/0x180
[   28.816947]  ? kasan_atomics_helper+0x1818/0x5450
[   28.816984]  kasan_check_range+0x10c/0x1c0
[   28.817012]  __kasan_check_write+0x18/0x20
[   28.817040]  kasan_atomics_helper+0x1818/0x5450
[   28.817072]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.817104]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.817167]  ? kasan_atomics+0x152/0x310
[   28.817204]  kasan_atomics+0x1dc/0x310
[   28.817246]  ? __pfx_kasan_atomics+0x10/0x10
[   28.817277]  ? __pfx_read_tsc+0x10/0x10
[   28.817332]  ? ktime_get_ts64+0x86/0x230
[   28.817364]  kunit_try_run_case+0x1a5/0x480
[   28.817416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.817446]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.817475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.817504]  ? __kthread_parkme+0x82/0x180
[   28.817561]  ? preempt_count_sub+0x50/0x80
[   28.817591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.817621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.817666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.817696]  kthread+0x337/0x6f0
[   28.817752]  ? trace_preempt_on+0x20/0xc0
[   28.817783]  ? __pfx_kthread+0x10/0x10
[   28.817822]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.817850]  ? calculate_sigpending+0x7b/0xa0
[   28.817900]  ? __pfx_kthread+0x10/0x10
[   28.817927]  ret_from_fork+0x116/0x1d0
[   28.817952]  ? __pfx_kthread+0x10/0x10
[   28.817997]  ret_from_fork_asm+0x1a/0x30
[   28.818050]  </TASK>
[   28.818066] 
[   28.827928] Allocated by task 314:
[   28.828136]  kasan_save_stack+0x45/0x70
[   28.828313]  kasan_save_track+0x18/0x40
[   28.828522]  kasan_save_alloc_info+0x3b/0x50
[   28.828808]  __kasan_kmalloc+0xb7/0xc0
[   28.829110]  __kmalloc_cache_noprof+0x189/0x420
[   28.829420]  kasan_atomics+0x95/0x310
[   28.829630]  kunit_try_run_case+0x1a5/0x480
[   28.829841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.830201]  kthread+0x337/0x6f0
[   28.830437]  ret_from_fork+0x116/0x1d0
[   28.830653]  ret_from_fork_asm+0x1a/0x30
[   28.830941] 
[   28.831068] The buggy address belongs to the object at ffff88810625b900
[   28.831068]  which belongs to the cache kmalloc-64 of size 64
[   28.831676] The buggy address is located 0 bytes to the right of
[   28.831676]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.832401] 
[   28.832527] The buggy address belongs to the physical page:
[   28.832802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.833239] flags: 0x200000000000000(node=0|zone=2)
[   28.833483] page_type: f5(slab)
[   28.833626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.833966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.834373] page dumped because: kasan: bad access detected
[   28.834681] 
[   28.834832] Memory state around the buggy address:
[   28.835067]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.835318]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.835697] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.836150]                                      ^
[   28.836520]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.836889]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.837136] ==================================================================
[   27.847618] ==================================================================
[   27.848146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   27.848598] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.849272] 
[   27.849465] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.849530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.849546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.849577] Call Trace:
[   27.849636]  <TASK>
[   27.849682]  dump_stack_lvl+0x73/0xb0
[   27.849734]  print_report+0xd1/0x650
[   27.849765]  ? __virt_addr_valid+0x1db/0x2d0
[   27.849795]  ? kasan_atomics_helper+0x565/0x5450
[   27.849824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.849855]  ? kasan_atomics_helper+0x565/0x5450
[   27.849885]  kasan_report+0x141/0x180
[   27.849911]  ? kasan_atomics_helper+0x565/0x5450
[   27.849945]  kasan_check_range+0x10c/0x1c0
[   27.850003]  __kasan_check_write+0x18/0x20
[   27.850030]  kasan_atomics_helper+0x565/0x5450
[   27.850089]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.850119]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.850182]  ? kasan_atomics+0x152/0x310
[   27.850216]  kasan_atomics+0x1dc/0x310
[   27.850243]  ? __pfx_kasan_atomics+0x10/0x10
[   27.850333]  ? __pfx_read_tsc+0x10/0x10
[   27.850359]  ? ktime_get_ts64+0x86/0x230
[   27.850404]  kunit_try_run_case+0x1a5/0x480
[   27.850436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.850463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.850492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.850522]  ? __kthread_parkme+0x82/0x180
[   27.850547]  ? preempt_count_sub+0x50/0x80
[   27.850575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.850605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.850636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.850664]  kthread+0x337/0x6f0
[   27.850689]  ? trace_preempt_on+0x20/0xc0
[   27.850718]  ? __pfx_kthread+0x10/0x10
[   27.850744]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.850772]  ? calculate_sigpending+0x7b/0xa0
[   27.850800]  ? __pfx_kthread+0x10/0x10
[   27.850826]  ret_from_fork+0x116/0x1d0
[   27.850849]  ? __pfx_kthread+0x10/0x10
[   27.850874]  ret_from_fork_asm+0x1a/0x30
[   27.850911]  </TASK>
[   27.850927] 
[   27.861651] Allocated by task 314:
[   27.862072]  kasan_save_stack+0x45/0x70
[   27.862361]  kasan_save_track+0x18/0x40
[   27.862629]  kasan_save_alloc_info+0x3b/0x50
[   27.862925]  __kasan_kmalloc+0xb7/0xc0
[   27.863265]  __kmalloc_cache_noprof+0x189/0x420
[   27.863507]  kasan_atomics+0x95/0x310
[   27.863910]  kunit_try_run_case+0x1a5/0x480
[   27.864148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.864583]  kthread+0x337/0x6f0
[   27.864785]  ret_from_fork+0x116/0x1d0
[   27.865111]  ret_from_fork_asm+0x1a/0x30
[   27.865479] 
[   27.865605] The buggy address belongs to the object at ffff88810625b900
[   27.865605]  which belongs to the cache kmalloc-64 of size 64
[   27.866192] The buggy address is located 0 bytes to the right of
[   27.866192]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.866640] 
[   27.866850] The buggy address belongs to the physical page:
[   27.867179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.867944] flags: 0x200000000000000(node=0|zone=2)
[   27.868351] page_type: f5(slab)
[   27.868511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.868876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.869422] page dumped because: kasan: bad access detected
[   27.869690] 
[   27.869763] Memory state around the buggy address:
[   27.870246]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.870642]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.871045] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.871611]                                      ^
[   27.871841]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.872425]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.872798] ==================================================================
[   28.767048] ==================================================================
[   28.767484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   28.767838] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.768611] 
[   28.768861] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.768962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.768980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.769008] Call Trace:
[   28.769031]  <TASK>
[   28.769055]  dump_stack_lvl+0x73/0xb0
[   28.769088]  print_report+0xd1/0x650
[   28.769115]  ? __virt_addr_valid+0x1db/0x2d0
[   28.769144]  ? kasan_atomics_helper+0x16e7/0x5450
[   28.769174]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.769203]  ? kasan_atomics_helper+0x16e7/0x5450
[   28.769233]  kasan_report+0x141/0x180
[   28.769259]  ? kasan_atomics_helper+0x16e7/0x5450
[   28.769293]  kasan_check_range+0x10c/0x1c0
[   28.769320]  __kasan_check_write+0x18/0x20
[   28.769348]  kasan_atomics_helper+0x16e7/0x5450
[   28.769379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.769550]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.769583]  ? kasan_atomics+0x152/0x310
[   28.769628]  kasan_atomics+0x1dc/0x310
[   28.769694]  ? __pfx_kasan_atomics+0x10/0x10
[   28.769724]  ? __pfx_read_tsc+0x10/0x10
[   28.769750]  ? ktime_get_ts64+0x86/0x230
[   28.769780]  kunit_try_run_case+0x1a5/0x480
[   28.769810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.769838]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.769891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.769921]  ? __kthread_parkme+0x82/0x180
[   28.769946]  ? preempt_count_sub+0x50/0x80
[   28.769974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.770004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.770033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.770062]  kthread+0x337/0x6f0
[   28.770086]  ? trace_preempt_on+0x20/0xc0
[   28.770116]  ? __pfx_kthread+0x10/0x10
[   28.770141]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.770168]  ? calculate_sigpending+0x7b/0xa0
[   28.770197]  ? __pfx_kthread+0x10/0x10
[   28.770223]  ret_from_fork+0x116/0x1d0
[   28.770246]  ? __pfx_kthread+0x10/0x10
[   28.770271]  ret_from_fork_asm+0x1a/0x30
[   28.770307]  </TASK>
[   28.770322] 
[   28.783265] Allocated by task 314:
[   28.783697]  kasan_save_stack+0x45/0x70
[   28.784212]  kasan_save_track+0x18/0x40
[   28.784537]  kasan_save_alloc_info+0x3b/0x50
[   28.784938]  __kasan_kmalloc+0xb7/0xc0
[   28.785144]  __kmalloc_cache_noprof+0x189/0x420
[   28.785364]  kasan_atomics+0x95/0x310
[   28.785522]  kunit_try_run_case+0x1a5/0x480
[   28.785781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.786004]  kthread+0x337/0x6f0
[   28.786188]  ret_from_fork+0x116/0x1d0
[   28.786424]  ret_from_fork_asm+0x1a/0x30
[   28.786603] 
[   28.786734] The buggy address belongs to the object at ffff88810625b900
[   28.786734]  which belongs to the cache kmalloc-64 of size 64
[   28.787276] The buggy address is located 0 bytes to the right of
[   28.787276]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.787909] 
[   28.788020] The buggy address belongs to the physical page:
[   28.788303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.788685] flags: 0x200000000000000(node=0|zone=2)
[   28.788892] page_type: f5(slab)
[   28.789084] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.789481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.789741] page dumped because: kasan: bad access detected
[   28.790047] 
[   28.790151] Memory state around the buggy address:
[   28.790433]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.790752]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.791142] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.791490]                                      ^
[   28.791760]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.792231]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.792574] ==================================================================
[   27.987904] ==================================================================
[   27.988353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   27.988810] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.989218] 
[   27.989387] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.989463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.989479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.989509] Call Trace:
[   27.989559]  <TASK>
[   27.989585]  dump_stack_lvl+0x73/0xb0
[   27.989618]  print_report+0xd1/0x650
[   27.989647]  ? __virt_addr_valid+0x1db/0x2d0
[   27.989678]  ? kasan_atomics_helper+0x860/0x5450
[   27.989727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.989774]  ? kasan_atomics_helper+0x860/0x5450
[   27.989805]  kasan_report+0x141/0x180
[   27.989847]  ? kasan_atomics_helper+0x860/0x5450
[   27.989899]  kasan_check_range+0x10c/0x1c0
[   27.989943]  __kasan_check_write+0x18/0x20
[   27.989987]  kasan_atomics_helper+0x860/0x5450
[   27.990020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.990051]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.990082]  ? kasan_atomics+0x152/0x310
[   27.990114]  kasan_atomics+0x1dc/0x310
[   27.990141]  ? __pfx_kasan_atomics+0x10/0x10
[   27.990170]  ? __pfx_read_tsc+0x10/0x10
[   27.990199]  ? ktime_get_ts64+0x86/0x230
[   27.990230]  kunit_try_run_case+0x1a5/0x480
[   27.990262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.990291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.990322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.990351]  ? __kthread_parkme+0x82/0x180
[   27.990378]  ? preempt_count_sub+0x50/0x80
[   27.990419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.990449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.990480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.990511]  kthread+0x337/0x6f0
[   27.990536]  ? trace_preempt_on+0x20/0xc0
[   27.990567]  ? __pfx_kthread+0x10/0x10
[   27.990894]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.990952]  ? calculate_sigpending+0x7b/0xa0
[   27.990983]  ? __pfx_kthread+0x10/0x10
[   27.991038]  ret_from_fork+0x116/0x1d0
[   27.991065]  ? __pfx_kthread+0x10/0x10
[   27.991092]  ret_from_fork_asm+0x1a/0x30
[   27.991131]  </TASK>
[   27.991202] 
[   28.001056] Allocated by task 314:
[   28.001281]  kasan_save_stack+0x45/0x70
[   28.001625]  kasan_save_track+0x18/0x40
[   28.001853]  kasan_save_alloc_info+0x3b/0x50
[   28.002112]  __kasan_kmalloc+0xb7/0xc0
[   28.002584]  __kmalloc_cache_noprof+0x189/0x420
[   28.002860]  kasan_atomics+0x95/0x310
[   28.003131]  kunit_try_run_case+0x1a5/0x480
[   28.003436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.003702]  kthread+0x337/0x6f0
[   28.003950]  ret_from_fork+0x116/0x1d0
[   28.004280]  ret_from_fork_asm+0x1a/0x30
[   28.004553] 
[   28.004664] The buggy address belongs to the object at ffff88810625b900
[   28.004664]  which belongs to the cache kmalloc-64 of size 64
[   28.005279] The buggy address is located 0 bytes to the right of
[   28.005279]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.005949] 
[   28.006107] The buggy address belongs to the physical page:
[   28.006665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.007101] flags: 0x200000000000000(node=0|zone=2)
[   28.007351] page_type: f5(slab)
[   28.007504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.008033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.008507] page dumped because: kasan: bad access detected
[   28.008710] 
[   28.008816] Memory state around the buggy address:
[   28.009129]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.009618]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.009924] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.010581]                                      ^
[   28.010815]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.011106]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.011510] ==================================================================
[   28.066809] ==================================================================
[   28.067150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   28.067687] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.068079] 
[   28.068182] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.068288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.068305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.068332] Call Trace:
[   28.068367]  <TASK>
[   28.068410]  dump_stack_lvl+0x73/0xb0
[   28.068444]  print_report+0xd1/0x650
[   28.068471]  ? __virt_addr_valid+0x1db/0x2d0
[   28.068500]  ? kasan_atomics_helper+0xa2b/0x5450
[   28.068530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.068571]  ? kasan_atomics_helper+0xa2b/0x5450
[   28.068600]  kasan_report+0x141/0x180
[   28.068638]  ? kasan_atomics_helper+0xa2b/0x5450
[   28.068672]  kasan_check_range+0x10c/0x1c0
[   28.068700]  __kasan_check_write+0x18/0x20
[   28.068727]  kasan_atomics_helper+0xa2b/0x5450
[   28.068758]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.068788]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.068819]  ? kasan_atomics+0x152/0x310
[   28.068849]  kasan_atomics+0x1dc/0x310
[   28.068876]  ? __pfx_kasan_atomics+0x10/0x10
[   28.068904]  ? __pfx_read_tsc+0x10/0x10
[   28.068931]  ? ktime_get_ts64+0x86/0x230
[   28.068961]  kunit_try_run_case+0x1a5/0x480
[   28.068992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.069020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.069051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.069080]  ? __kthread_parkme+0x82/0x180
[   28.069105]  ? preempt_count_sub+0x50/0x80
[   28.069133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.069403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.069443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.069473]  kthread+0x337/0x6f0
[   28.069498]  ? trace_preempt_on+0x20/0xc0
[   28.069527]  ? __pfx_kthread+0x10/0x10
[   28.069564]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.069592]  ? calculate_sigpending+0x7b/0xa0
[   28.069621]  ? __pfx_kthread+0x10/0x10
[   28.069661]  ret_from_fork+0x116/0x1d0
[   28.069684]  ? __pfx_kthread+0x10/0x10
[   28.069709]  ret_from_fork_asm+0x1a/0x30
[   28.069747]  </TASK>
[   28.069762] 
[   28.079273] Allocated by task 314:
[   28.079602]  kasan_save_stack+0x45/0x70
[   28.079826]  kasan_save_track+0x18/0x40
[   28.080041]  kasan_save_alloc_info+0x3b/0x50
[   28.080301]  __kasan_kmalloc+0xb7/0xc0
[   28.080544]  __kmalloc_cache_noprof+0x189/0x420
[   28.080857]  kasan_atomics+0x95/0x310
[   28.081068]  kunit_try_run_case+0x1a5/0x480
[   28.081358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.081662]  kthread+0x337/0x6f0
[   28.081848]  ret_from_fork+0x116/0x1d0
[   28.082060]  ret_from_fork_asm+0x1a/0x30
[   28.082212] 
[   28.082288] The buggy address belongs to the object at ffff88810625b900
[   28.082288]  which belongs to the cache kmalloc-64 of size 64
[   28.082703] The buggy address is located 0 bytes to the right of
[   28.082703]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.083794] 
[   28.083986] The buggy address belongs to the physical page:
[   28.084379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.084786] flags: 0x200000000000000(node=0|zone=2)
[   28.085132] page_type: f5(slab)
[   28.085366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.085648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.085977] page dumped because: kasan: bad access detected
[   28.086286] 
[   28.086527] Memory state around the buggy address:
[   28.086731]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.087094]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.087483] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.087789]                                      ^
[   28.088145]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.088701]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.089267] ==================================================================
[   27.700123] ==================================================================
[   27.700812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   27.701331] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.701837] 
[   27.702253] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.702316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.702334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.702362] Call Trace:
[   27.702388]  <TASK>
[   27.702427]  dump_stack_lvl+0x73/0xb0
[   27.702462]  print_report+0xd1/0x650
[   27.702488]  ? __virt_addr_valid+0x1db/0x2d0
[   27.702516]  ? kasan_atomics_helper+0x4b6e/0x5450
[   27.702544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.702574]  ? kasan_atomics_helper+0x4b6e/0x5450
[   27.702604]  kasan_report+0x141/0x180
[   27.702628]  ? kasan_atomics_helper+0x4b6e/0x5450
[   27.702662]  __asan_report_store4_noabort+0x1b/0x30
[   27.702689]  kasan_atomics_helper+0x4b6e/0x5450
[   27.702718]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.702749]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.702778]  ? kasan_atomics+0x152/0x310
[   27.702807]  kasan_atomics+0x1dc/0x310
[   27.702833]  ? __pfx_kasan_atomics+0x10/0x10
[   27.702860]  ? __pfx_read_tsc+0x10/0x10
[   27.702886]  ? ktime_get_ts64+0x86/0x230
[   27.702915]  kunit_try_run_case+0x1a5/0x480
[   27.702947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.702974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.703003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.703031]  ? __kthread_parkme+0x82/0x180
[   27.703056]  ? preempt_count_sub+0x50/0x80
[   27.703084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.703112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.703140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.703169]  kthread+0x337/0x6f0
[   27.703191]  ? trace_preempt_on+0x20/0xc0
[   27.703219]  ? __pfx_kthread+0x10/0x10
[   27.703243]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.703268]  ? calculate_sigpending+0x7b/0xa0
[   27.703296]  ? __pfx_kthread+0x10/0x10
[   27.703321]  ret_from_fork+0x116/0x1d0
[   27.703345]  ? __pfx_kthread+0x10/0x10
[   27.703369]  ret_from_fork_asm+0x1a/0x30
[   27.703418]  </TASK>
[   27.703432] 
[   27.717047] Allocated by task 314:
[   27.717472]  kasan_save_stack+0x45/0x70
[   27.717945]  kasan_save_track+0x18/0x40
[   27.718446]  kasan_save_alloc_info+0x3b/0x50
[   27.718916]  __kasan_kmalloc+0xb7/0xc0
[   27.719356]  __kmalloc_cache_noprof+0x189/0x420
[   27.719802]  kasan_atomics+0x95/0x310
[   27.719960]  kunit_try_run_case+0x1a5/0x480
[   27.720121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.720786]  kthread+0x337/0x6f0
[   27.721205]  ret_from_fork+0x116/0x1d0
[   27.721585]  ret_from_fork_asm+0x1a/0x30
[   27.721998] 
[   27.722074] The buggy address belongs to the object at ffff88810625b900
[   27.722074]  which belongs to the cache kmalloc-64 of size 64
[   27.723097] The buggy address is located 0 bytes to the right of
[   27.723097]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.724397] 
[   27.724502] The buggy address belongs to the physical page:
[   27.724694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.725538] flags: 0x200000000000000(node=0|zone=2)
[   27.726020] page_type: f5(slab)
[   27.726336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.726887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.727128] page dumped because: kasan: bad access detected
[   27.727768] 
[   27.727967] Memory state around the buggy address:
[   27.728532]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.729312]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.729921] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.730770]                                      ^
[   27.730964]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.731749]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.732307] ==================================================================
[   28.992842] ==================================================================
[   28.993179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   28.993764] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.994225] 
[   28.994352] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.994419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.994435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.994461] Call Trace:
[   28.994483]  <TASK>
[   28.994505]  dump_stack_lvl+0x73/0xb0
[   28.994537]  print_report+0xd1/0x650
[   28.994565]  ? __virt_addr_valid+0x1db/0x2d0
[   28.994593]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.994621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.994650]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.994677]  kasan_report+0x141/0x180
[   28.994702]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.994737]  kasan_check_range+0x10c/0x1c0
[   28.994764]  __kasan_check_write+0x18/0x20
[   28.994790]  kasan_atomics_helper+0x1ce1/0x5450
[   28.994819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.994850]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.994879]  ? kasan_atomics+0x152/0x310
[   28.994967]  kasan_atomics+0x1dc/0x310
[   28.994995]  ? __pfx_kasan_atomics+0x10/0x10
[   28.995035]  ? __pfx_read_tsc+0x10/0x10
[   28.995061]  ? ktime_get_ts64+0x86/0x230
[   28.995090]  kunit_try_run_case+0x1a5/0x480
[   28.995119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.995146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.995175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.995202]  ? __kthread_parkme+0x82/0x180
[   28.995226]  ? preempt_count_sub+0x50/0x80
[   28.995253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.995282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.995310]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.995338]  kthread+0x337/0x6f0
[   28.995464]  ? trace_preempt_on+0x20/0xc0
[   28.995493]  ? __pfx_kthread+0x10/0x10
[   28.995529]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.995556]  ? calculate_sigpending+0x7b/0xa0
[   28.995585]  ? __pfx_kthread+0x10/0x10
[   28.995609]  ret_from_fork+0x116/0x1d0
[   28.995632]  ? __pfx_kthread+0x10/0x10
[   28.995656]  ret_from_fork_asm+0x1a/0x30
[   28.995691]  </TASK>
[   28.995706] 
[   29.005938] Allocated by task 314:
[   29.006246]  kasan_save_stack+0x45/0x70
[   29.006429]  kasan_save_track+0x18/0x40
[   29.006579]  kasan_save_alloc_info+0x3b/0x50
[   29.006766]  __kasan_kmalloc+0xb7/0xc0
[   29.007097]  __kmalloc_cache_noprof+0x189/0x420
[   29.007588]  kasan_atomics+0x95/0x310
[   29.007800]  kunit_try_run_case+0x1a5/0x480
[   29.008143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.008446]  kthread+0x337/0x6f0
[   29.008580]  ret_from_fork+0x116/0x1d0
[   29.008783]  ret_from_fork_asm+0x1a/0x30
[   29.009154] 
[   29.009466] The buggy address belongs to the object at ffff88810625b900
[   29.009466]  which belongs to the cache kmalloc-64 of size 64
[   29.009994] The buggy address is located 0 bytes to the right of
[   29.009994]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.010664] 
[   29.010773] The buggy address belongs to the physical page:
[   29.011117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.011413] flags: 0x200000000000000(node=0|zone=2)
[   29.011670] page_type: f5(slab)
[   29.012011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.012377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.012767] page dumped because: kasan: bad access detected
[   29.013068] 
[   29.013280] Memory state around the buggy address:
[   29.013577]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.013982]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.014474] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.014847]                                      ^
[   29.015128]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.015538]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.015911] ==================================================================
[   28.971372] ==================================================================
[   28.972017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   28.972809] Read of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.973269] 
[   28.973412] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.973470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.973485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.973511] Call Trace:
[   28.973535]  <TASK>
[   28.973559]  dump_stack_lvl+0x73/0xb0
[   28.973590]  print_report+0xd1/0x650
[   28.973614]  ? __virt_addr_valid+0x1db/0x2d0
[   28.973642]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.973669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.973697]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.973724]  kasan_report+0x141/0x180
[   28.973749]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.973781]  __asan_report_load8_noabort+0x18/0x20
[   28.973807]  kasan_atomics_helper+0x4f30/0x5450
[   28.973835]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.973862]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.973889]  ? kasan_atomics+0x152/0x310
[   28.973916]  kasan_atomics+0x1dc/0x310
[   28.973940]  ? __pfx_kasan_atomics+0x10/0x10
[   28.973967]  ? __pfx_read_tsc+0x10/0x10
[   28.973991]  ? ktime_get_ts64+0x86/0x230
[   28.974018]  kunit_try_run_case+0x1a5/0x480
[   28.974046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.974072]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.974099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.974125]  ? __kthread_parkme+0x82/0x180
[   28.974179]  ? preempt_count_sub+0x50/0x80
[   28.974206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.974244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.974272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.974298]  kthread+0x337/0x6f0
[   28.974321]  ? trace_preempt_on+0x20/0xc0
[   28.974348]  ? __pfx_kthread+0x10/0x10
[   28.974372]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.974404]  ? calculate_sigpending+0x7b/0xa0
[   28.974431]  ? __pfx_kthread+0x10/0x10
[   28.974454]  ret_from_fork+0x116/0x1d0
[   28.974476]  ? __pfx_kthread+0x10/0x10
[   28.974499]  ret_from_fork_asm+0x1a/0x30
[   28.974534]  </TASK>
[   28.974547] 
[   28.982982] Allocated by task 314:
[   28.983194]  kasan_save_stack+0x45/0x70
[   28.983612]  kasan_save_track+0x18/0x40
[   28.983753]  kasan_save_alloc_info+0x3b/0x50
[   28.983900]  __kasan_kmalloc+0xb7/0xc0
[   28.984043]  __kmalloc_cache_noprof+0x189/0x420
[   28.984202]  kasan_atomics+0x95/0x310
[   28.984339]  kunit_try_run_case+0x1a5/0x480
[   28.984706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.985019]  kthread+0x337/0x6f0
[   28.985447]  ret_from_fork+0x116/0x1d0
[   28.985654]  ret_from_fork_asm+0x1a/0x30
[   28.985865] 
[   28.985961] The buggy address belongs to the object at ffff88810625b900
[   28.985961]  which belongs to the cache kmalloc-64 of size 64
[   28.986529] The buggy address is located 0 bytes to the right of
[   28.986529]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.987068] 
[   28.987226] The buggy address belongs to the physical page:
[   28.987584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.987910] flags: 0x200000000000000(node=0|zone=2)
[   28.988241] page_type: f5(slab)
[   28.988440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.988842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.989176] page dumped because: kasan: bad access detected
[   28.989353] 
[   28.989434] Memory state around the buggy address:
[   28.989596]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.989980]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.990574] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.990954]                                      ^
[   28.991271]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.991598]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.991857] ==================================================================
[   29.262722] ==================================================================
[   29.263072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   29.263528] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.263871] 
[   29.264033] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.264115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.264131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.264160] Call Trace:
[   29.264184]  <TASK>
[   29.264209]  dump_stack_lvl+0x73/0xb0
[   29.264250]  print_report+0xd1/0x650
[   29.264277]  ? __virt_addr_valid+0x1db/0x2d0
[   29.264307]  ? kasan_atomics_helper+0x224c/0x5450
[   29.264338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.264369]  ? kasan_atomics_helper+0x224c/0x5450
[   29.264436]  kasan_report+0x141/0x180
[   29.264463]  ? kasan_atomics_helper+0x224c/0x5450
[   29.264499]  kasan_check_range+0x10c/0x1c0
[   29.264546]  __kasan_check_write+0x18/0x20
[   29.264574]  kasan_atomics_helper+0x224c/0x5450
[   29.264604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.264635]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.264665]  ? kasan_atomics+0x152/0x310
[   29.264696]  kasan_atomics+0x1dc/0x310
[   29.264741]  ? __pfx_kasan_atomics+0x10/0x10
[   29.264770]  ? __pfx_read_tsc+0x10/0x10
[   29.264796]  ? ktime_get_ts64+0x86/0x230
[   29.264827]  kunit_try_run_case+0x1a5/0x480
[   29.264858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.264887]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.264919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.264950]  ? __kthread_parkme+0x82/0x180
[   29.264993]  ? preempt_count_sub+0x50/0x80
[   29.265023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.265065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.265095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.265125]  kthread+0x337/0x6f0
[   29.265149]  ? trace_preempt_on+0x20/0xc0
[   29.265180]  ? __pfx_kthread+0x10/0x10
[   29.265206]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.265253]  ? calculate_sigpending+0x7b/0xa0
[   29.265283]  ? __pfx_kthread+0x10/0x10
[   29.265310]  ret_from_fork+0x116/0x1d0
[   29.265333]  ? __pfx_kthread+0x10/0x10
[   29.265358]  ret_from_fork_asm+0x1a/0x30
[   29.265406]  </TASK>
[   29.265422] 
[   29.274322] Allocated by task 314:
[   29.274582]  kasan_save_stack+0x45/0x70
[   29.274817]  kasan_save_track+0x18/0x40
[   29.275015]  kasan_save_alloc_info+0x3b/0x50
[   29.275179]  __kasan_kmalloc+0xb7/0xc0
[   29.275360]  __kmalloc_cache_noprof+0x189/0x420
[   29.275644]  kasan_atomics+0x95/0x310
[   29.275877]  kunit_try_run_case+0x1a5/0x480
[   29.276189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.276471]  kthread+0x337/0x6f0
[   29.276680]  ret_from_fork+0x116/0x1d0
[   29.276875]  ret_from_fork_asm+0x1a/0x30
[   29.277116] 
[   29.277254] The buggy address belongs to the object at ffff88810625b900
[   29.277254]  which belongs to the cache kmalloc-64 of size 64
[   29.277901] The buggy address is located 0 bytes to the right of
[   29.277901]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.278511] 
[   29.278615] The buggy address belongs to the physical page:
[   29.278880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.279151] flags: 0x200000000000000(node=0|zone=2)
[   29.279334] page_type: f5(slab)
[   29.279476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.279895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.280277] page dumped because: kasan: bad access detected
[   29.280597] 
[   29.280739] Memory state around the buggy address:
[   29.281175]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.281487]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.281726] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.282237]                                      ^
[   29.282495]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.282905]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.283240] ==================================================================
[   27.605015] ==================================================================
[   27.605924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   27.606479] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.607052] 
[   27.607184] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.607246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.607260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.607287] Call Trace:
[   27.607303]  <TASK>
[   27.607326]  dump_stack_lvl+0x73/0xb0
[   27.607362]  print_report+0xd1/0x650
[   27.607388]  ? __virt_addr_valid+0x1db/0x2d0
[   27.607432]  ? kasan_atomics_helper+0x4bbc/0x5450
[   27.607459]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.607489]  ? kasan_atomics_helper+0x4bbc/0x5450
[   27.607517]  kasan_report+0x141/0x180
[   27.607542]  ? kasan_atomics_helper+0x4bbc/0x5450
[   27.607574]  __asan_report_load4_noabort+0x18/0x20
[   27.607600]  kasan_atomics_helper+0x4bbc/0x5450
[   27.607629]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.607658]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.607686]  ? kasan_atomics+0x152/0x310
[   27.607715]  kasan_atomics+0x1dc/0x310
[   27.607741]  ? __pfx_kasan_atomics+0x10/0x10
[   27.607768]  ? __pfx_read_tsc+0x10/0x10
[   27.607794]  ? ktime_get_ts64+0x86/0x230
[   27.607824]  kunit_try_run_case+0x1a5/0x480
[   27.607857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.607901]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.607931]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.607958]  ? __kthread_parkme+0x82/0x180
[   27.607983]  ? preempt_count_sub+0x50/0x80
[   27.608012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.608040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.608068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.608096]  kthread+0x337/0x6f0
[   27.608119]  ? trace_preempt_on+0x20/0xc0
[   27.608146]  ? __pfx_kthread+0x10/0x10
[   27.608169]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.608195]  ? calculate_sigpending+0x7b/0xa0
[   27.608230]  ? __pfx_kthread+0x10/0x10
[   27.608255]  ret_from_fork+0x116/0x1d0
[   27.608277]  ? __pfx_kthread+0x10/0x10
[   27.608301]  ret_from_fork_asm+0x1a/0x30
[   27.608338]  </TASK>
[   27.608353] 
[   27.619403] Allocated by task 314:
[   27.619646]  kasan_save_stack+0x45/0x70
[   27.619842]  kasan_save_track+0x18/0x40
[   27.620236]  kasan_save_alloc_info+0x3b/0x50
[   27.620493]  __kasan_kmalloc+0xb7/0xc0
[   27.620655]  __kmalloc_cache_noprof+0x189/0x420
[   27.621002]  kasan_atomics+0x95/0x310
[   27.621381]  kunit_try_run_case+0x1a5/0x480
[   27.621680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.621911]  kthread+0x337/0x6f0
[   27.622243]  ret_from_fork+0x116/0x1d0
[   27.622519]  ret_from_fork_asm+0x1a/0x30
[   27.622974] 
[   27.623065] The buggy address belongs to the object at ffff88810625b900
[   27.623065]  which belongs to the cache kmalloc-64 of size 64
[   27.623752] The buggy address is located 0 bytes to the right of
[   27.623752]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.624707] 
[   27.624831] The buggy address belongs to the physical page:
[   27.625185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.625683] flags: 0x200000000000000(node=0|zone=2)
[   27.626015] page_type: f5(slab)
[   27.626182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.626642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.627154] page dumped because: kasan: bad access detected
[   27.627421] 
[   27.627590] Memory state around the buggy address:
[   27.627941]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.628292]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.628947] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.629317]                                      ^
[   27.629554]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.629968]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.630280] ==================================================================
[   28.715808] ==================================================================
[   28.717137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   28.717439] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.717695] 
[   28.717800] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.717859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.717884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.717912] Call Trace:
[   28.717937]  <TASK>
[   28.717963]  dump_stack_lvl+0x73/0xb0
[   28.717995]  print_report+0xd1/0x650
[   28.718024]  ? __virt_addr_valid+0x1db/0x2d0
[   28.718053]  ? kasan_atomics_helper+0x15b6/0x5450
[   28.718083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.718115]  ? kasan_atomics_helper+0x15b6/0x5450
[   28.718146]  kasan_report+0x141/0x180
[   28.718173]  ? kasan_atomics_helper+0x15b6/0x5450
[   28.718209]  kasan_check_range+0x10c/0x1c0
[   28.718237]  __kasan_check_write+0x18/0x20
[   28.718266]  kasan_atomics_helper+0x15b6/0x5450
[   28.718297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.718328]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.718358]  ? kasan_atomics+0x152/0x310
[   28.718415]  kasan_atomics+0x1dc/0x310
[   28.718459]  ? __pfx_kasan_atomics+0x10/0x10
[   28.718488]  ? __pfx_read_tsc+0x10/0x10
[   28.718515]  ? ktime_get_ts64+0x86/0x230
[   28.718545]  kunit_try_run_case+0x1a5/0x480
[   28.718577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.718605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.718635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.718665]  ? __kthread_parkme+0x82/0x180
[   28.718691]  ? preempt_count_sub+0x50/0x80
[   28.718720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.718751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.718780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.718824]  kthread+0x337/0x6f0
[   28.718849]  ? trace_preempt_on+0x20/0xc0
[   28.718892]  ? __pfx_kthread+0x10/0x10
[   28.718918]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.718946]  ? calculate_sigpending+0x7b/0xa0
[   28.718976]  ? __pfx_kthread+0x10/0x10
[   28.719002]  ret_from_fork+0x116/0x1d0
[   28.719026]  ? __pfx_kthread+0x10/0x10
[   28.719062]  ret_from_fork_asm+0x1a/0x30
[   28.719113]  </TASK>
[   28.719140] 
[   28.734489] Allocated by task 314:
[   28.734892]  kasan_save_stack+0x45/0x70
[   28.735310]  kasan_save_track+0x18/0x40
[   28.735591]  kasan_save_alloc_info+0x3b/0x50
[   28.735981]  __kasan_kmalloc+0xb7/0xc0
[   28.736407]  __kmalloc_cache_noprof+0x189/0x420
[   28.736789]  kasan_atomics+0x95/0x310
[   28.737045]  kunit_try_run_case+0x1a5/0x480
[   28.737407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.737601]  kthread+0x337/0x6f0
[   28.737731]  ret_from_fork+0x116/0x1d0
[   28.737875]  ret_from_fork_asm+0x1a/0x30
[   28.738061] 
[   28.738194] The buggy address belongs to the object at ffff88810625b900
[   28.738194]  which belongs to the cache kmalloc-64 of size 64
[   28.738754] The buggy address is located 0 bytes to the right of
[   28.738754]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.739351] 
[   28.739470] The buggy address belongs to the physical page:
[   28.739723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.740096] flags: 0x200000000000000(node=0|zone=2)
[   28.740315] page_type: f5(slab)
[   28.740461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.741162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.741494] page dumped because: kasan: bad access detected
[   28.741763] 
[   28.741863] Memory state around the buggy address:
[   28.742194]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.742442]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.742795] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.743243]                                      ^
[   28.743469]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.743783]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.744091] ==================================================================
[   29.039010] ==================================================================
[   29.039475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   29.039860] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.040195] 
[   29.040318] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.040374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.040400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.040427] Call Trace:
[   29.040450]  <TASK>
[   29.040473]  dump_stack_lvl+0x73/0xb0
[   29.040503]  print_report+0xd1/0x650
[   29.040529]  ? __virt_addr_valid+0x1db/0x2d0
[   29.040556]  ? kasan_atomics_helper+0x1e12/0x5450
[   29.040583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.040612]  ? kasan_atomics_helper+0x1e12/0x5450
[   29.040641]  kasan_report+0x141/0x180
[   29.040665]  ? kasan_atomics_helper+0x1e12/0x5450
[   29.040697]  kasan_check_range+0x10c/0x1c0
[   29.040725]  __kasan_check_write+0x18/0x20
[   29.040750]  kasan_atomics_helper+0x1e12/0x5450
[   29.040777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.040806]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.040833]  ? kasan_atomics+0x152/0x310
[   29.040862]  kasan_atomics+0x1dc/0x310
[   29.040886]  ? __pfx_kasan_atomics+0x10/0x10
[   29.040953]  ? __pfx_read_tsc+0x10/0x10
[   29.040979]  ? ktime_get_ts64+0x86/0x230
[   29.041020]  kunit_try_run_case+0x1a5/0x480
[   29.041050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.041076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.041104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.041130]  ? __kthread_parkme+0x82/0x180
[   29.041154]  ? preempt_count_sub+0x50/0x80
[   29.041181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.041208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.041236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.041263]  kthread+0x337/0x6f0
[   29.041285]  ? trace_preempt_on+0x20/0xc0
[   29.041313]  ? __pfx_kthread+0x10/0x10
[   29.041339]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.041363]  ? calculate_sigpending+0x7b/0xa0
[   29.041399]  ? __pfx_kthread+0x10/0x10
[   29.041422]  ret_from_fork+0x116/0x1d0
[   29.041445]  ? __pfx_kthread+0x10/0x10
[   29.041468]  ret_from_fork_asm+0x1a/0x30
[   29.041502]  </TASK>
[   29.041516] 
[   29.049650] Allocated by task 314:
[   29.049860]  kasan_save_stack+0x45/0x70
[   29.050112]  kasan_save_track+0x18/0x40
[   29.050298]  kasan_save_alloc_info+0x3b/0x50
[   29.050502]  __kasan_kmalloc+0xb7/0xc0
[   29.050697]  __kmalloc_cache_noprof+0x189/0x420
[   29.050919]  kasan_atomics+0x95/0x310
[   29.051058]  kunit_try_run_case+0x1a5/0x480
[   29.051255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.051551]  kthread+0x337/0x6f0
[   29.051723]  ret_from_fork+0x116/0x1d0
[   29.051956]  ret_from_fork_asm+0x1a/0x30
[   29.052141] 
[   29.052277] The buggy address belongs to the object at ffff88810625b900
[   29.052277]  which belongs to the cache kmalloc-64 of size 64
[   29.052777] The buggy address is located 0 bytes to the right of
[   29.052777]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.053459] 
[   29.053560] The buggy address belongs to the physical page:
[   29.053865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.054162] flags: 0x200000000000000(node=0|zone=2)
[   29.054333] page_type: f5(slab)
[   29.054560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.054979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.055320] page dumped because: kasan: bad access detected
[   29.055613] 
[   29.055740] Memory state around the buggy address:
[   29.056052]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.056397]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.056626] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.056848]                                      ^
[   29.057007]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.057415]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.057885] ==================================================================
[   29.164862] ==================================================================
[   29.165257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   29.166081] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.166401] 
[   29.166522] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.166577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.166593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.166620] Call Trace:
[   29.166643]  <TASK>
[   29.166666]  dump_stack_lvl+0x73/0xb0
[   29.166697]  print_report+0xd1/0x650
[   29.166723]  ? __virt_addr_valid+0x1db/0x2d0
[   29.166750]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.166778]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.166807]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.166835]  kasan_report+0x141/0x180
[   29.166860]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.166893]  kasan_check_range+0x10c/0x1c0
[   29.166947]  __kasan_check_write+0x18/0x20
[   29.166974]  kasan_atomics_helper+0x20c8/0x5450
[   29.167004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.167036]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.167065]  ? kasan_atomics+0x152/0x310
[   29.167095]  kasan_atomics+0x1dc/0x310
[   29.167121]  ? __pfx_kasan_atomics+0x10/0x10
[   29.167148]  ? __pfx_read_tsc+0x10/0x10
[   29.167173]  ? ktime_get_ts64+0x86/0x230
[   29.167202]  kunit_try_run_case+0x1a5/0x480
[   29.167232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.167259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.167287]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.167315]  ? __kthread_parkme+0x82/0x180
[   29.167339]  ? preempt_count_sub+0x50/0x80
[   29.167366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.167436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.167465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.167506]  kthread+0x337/0x6f0
[   29.167529]  ? trace_preempt_on+0x20/0xc0
[   29.167587]  ? __pfx_kthread+0x10/0x10
[   29.167610]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.167664]  ? calculate_sigpending+0x7b/0xa0
[   29.167692]  ? __pfx_kthread+0x10/0x10
[   29.167717]  ret_from_fork+0x116/0x1d0
[   29.167739]  ? __pfx_kthread+0x10/0x10
[   29.167764]  ret_from_fork_asm+0x1a/0x30
[   29.167799]  </TASK>
[   29.167813] 
[   29.176544] Allocated by task 314:
[   29.176741]  kasan_save_stack+0x45/0x70
[   29.177050]  kasan_save_track+0x18/0x40
[   29.177227]  kasan_save_alloc_info+0x3b/0x50
[   29.177374]  __kasan_kmalloc+0xb7/0xc0
[   29.177520]  __kmalloc_cache_noprof+0x189/0x420
[   29.177676]  kasan_atomics+0x95/0x310
[   29.177807]  kunit_try_run_case+0x1a5/0x480
[   29.178191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.178536]  kthread+0x337/0x6f0
[   29.178773]  ret_from_fork+0x116/0x1d0
[   29.179176]  ret_from_fork_asm+0x1a/0x30
[   29.179428] 
[   29.179520] The buggy address belongs to the object at ffff88810625b900
[   29.179520]  which belongs to the cache kmalloc-64 of size 64
[   29.180076] The buggy address is located 0 bytes to the right of
[   29.180076]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.180470] 
[   29.180546] The buggy address belongs to the physical page:
[   29.180722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.180963] flags: 0x200000000000000(node=0|zone=2)
[   29.181144] page_type: f5(slab)
[   29.181327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.181740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.182240] page dumped because: kasan: bad access detected
[   29.182616] 
[   29.182777] Memory state around the buggy address:
[   29.183161]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.183581]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.183935] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.184266]                                      ^
[   29.184508]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.184833]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.185262] ==================================================================
[   28.166351] ==================================================================
[   28.168713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   28.170545] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.171771] 
[   28.172375] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.172465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.172484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.172513] Call Trace:
[   28.172538]  <TASK>
[   28.172565]  dump_stack_lvl+0x73/0xb0
[   28.172603]  print_report+0xd1/0x650
[   28.172633]  ? __virt_addr_valid+0x1db/0x2d0
[   28.172664]  ? kasan_atomics_helper+0x4a84/0x5450
[   28.172694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.172724]  ? kasan_atomics_helper+0x4a84/0x5450
[   28.172755]  kasan_report+0x141/0x180
[   28.172781]  ? kasan_atomics_helper+0x4a84/0x5450
[   28.172818]  __asan_report_load4_noabort+0x18/0x20
[   28.172848]  kasan_atomics_helper+0x4a84/0x5450
[   28.172879]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.172910]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.172940]  ? kasan_atomics+0x152/0x310
[   28.172972]  kasan_atomics+0x1dc/0x310
[   28.173001]  ? __pfx_kasan_atomics+0x10/0x10
[   28.173031]  ? __pfx_read_tsc+0x10/0x10
[   28.173059]  ? ktime_get_ts64+0x86/0x230
[   28.173090]  kunit_try_run_case+0x1a5/0x480
[   28.173121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.173150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.173180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.173210]  ? __kthread_parkme+0x82/0x180
[   28.173236]  ? preempt_count_sub+0x50/0x80
[   28.173267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.173298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.173329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.173359]  kthread+0x337/0x6f0
[   28.173383]  ? trace_preempt_on+0x20/0xc0
[   28.173427]  ? __pfx_kthread+0x10/0x10
[   28.173452]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.173480]  ? calculate_sigpending+0x7b/0xa0
[   28.173509]  ? __pfx_kthread+0x10/0x10
[   28.173536]  ret_from_fork+0x116/0x1d0
[   28.173559]  ? __pfx_kthread+0x10/0x10
[   28.173584]  ret_from_fork_asm+0x1a/0x30
[   28.173622]  </TASK>
[   28.173637] 
[   28.190763] Allocated by task 314:
[   28.191172]  kasan_save_stack+0x45/0x70
[   28.191373]  kasan_save_track+0x18/0x40
[   28.191617]  kasan_save_alloc_info+0x3b/0x50
[   28.192112]  __kasan_kmalloc+0xb7/0xc0
[   28.192568]  __kmalloc_cache_noprof+0x189/0x420
[   28.193043]  kasan_atomics+0x95/0x310
[   28.193299]  kunit_try_run_case+0x1a5/0x480
[   28.193818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.194356]  kthread+0x337/0x6f0
[   28.194500]  ret_from_fork+0x116/0x1d0
[   28.194700]  ret_from_fork_asm+0x1a/0x30
[   28.195141] 
[   28.195321] The buggy address belongs to the object at ffff88810625b900
[   28.195321]  which belongs to the cache kmalloc-64 of size 64
[   28.196721] The buggy address is located 0 bytes to the right of
[   28.196721]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.197784] 
[   28.197977] The buggy address belongs to the physical page:
[   28.198595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.198933] flags: 0x200000000000000(node=0|zone=2)
[   28.199446] page_type: f5(slab)
[   28.199811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.200615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.201317] page dumped because: kasan: bad access detected
[   28.201554] 
[   28.201630] Memory state around the buggy address:
[   28.201802]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.202406]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.203055] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.203304]                                      ^
[   28.203639]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.203873]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.204462] ==================================================================
[   29.058816] ==================================================================
[   29.059228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   29.059677] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.060126] 
[   29.060276] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.060346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.060361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.060387] Call Trace:
[   29.060421]  <TASK>
[   29.060445]  dump_stack_lvl+0x73/0xb0
[   29.060476]  print_report+0xd1/0x650
[   29.060517]  ? __virt_addr_valid+0x1db/0x2d0
[   29.060545]  ? kasan_atomics_helper+0x1eaa/0x5450
[   29.060572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.060602]  ? kasan_atomics_helper+0x1eaa/0x5450
[   29.060630]  kasan_report+0x141/0x180
[   29.060654]  ? kasan_atomics_helper+0x1eaa/0x5450
[   29.060687]  kasan_check_range+0x10c/0x1c0
[   29.060713]  __kasan_check_write+0x18/0x20
[   29.060771]  kasan_atomics_helper+0x1eaa/0x5450
[   29.060801]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.060859]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.060886]  ? kasan_atomics+0x152/0x310
[   29.060914]  kasan_atomics+0x1dc/0x310
[   29.060940]  ? __pfx_kasan_atomics+0x10/0x10
[   29.060965]  ? __pfx_read_tsc+0x10/0x10
[   29.060990]  ? ktime_get_ts64+0x86/0x230
[   29.061019]  kunit_try_run_case+0x1a5/0x480
[   29.061047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.061073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.061101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.061128]  ? __kthread_parkme+0x82/0x180
[   29.061152]  ? preempt_count_sub+0x50/0x80
[   29.061179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.061206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.061233]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.061264]  kthread+0x337/0x6f0
[   29.061287]  ? trace_preempt_on+0x20/0xc0
[   29.061345]  ? __pfx_kthread+0x10/0x10
[   29.061369]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.061411]  ? calculate_sigpending+0x7b/0xa0
[   29.061439]  ? __pfx_kthread+0x10/0x10
[   29.061464]  ret_from_fork+0x116/0x1d0
[   29.061487]  ? __pfx_kthread+0x10/0x10
[   29.061510]  ret_from_fork_asm+0x1a/0x30
[   29.061545]  </TASK>
[   29.061558] 
[   29.069689] Allocated by task 314:
[   29.069832]  kasan_save_stack+0x45/0x70
[   29.070028]  kasan_save_track+0x18/0x40
[   29.070268]  kasan_save_alloc_info+0x3b/0x50
[   29.070517]  __kasan_kmalloc+0xb7/0xc0
[   29.070805]  __kmalloc_cache_noprof+0x189/0x420
[   29.071197]  kasan_atomics+0x95/0x310
[   29.071477]  kunit_try_run_case+0x1a5/0x480
[   29.071805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.072126]  kthread+0x337/0x6f0
[   29.072261]  ret_from_fork+0x116/0x1d0
[   29.072411]  ret_from_fork_asm+0x1a/0x30
[   29.072555] 
[   29.072642] The buggy address belongs to the object at ffff88810625b900
[   29.072642]  which belongs to the cache kmalloc-64 of size 64
[   29.073252] The buggy address is located 0 bytes to the right of
[   29.073252]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.073911] 
[   29.073988] The buggy address belongs to the physical page:
[   29.074231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.074633] flags: 0x200000000000000(node=0|zone=2)
[   29.074874] page_type: f5(slab)
[   29.075065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.075307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.075553] page dumped because: kasan: bad access detected
[   29.075816] 
[   29.075960] Memory state around the buggy address:
[   29.076206]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.076556]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.076892] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.077133]                                      ^
[   29.077446]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.077676]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.077918] ==================================================================
[   28.462632] ==================================================================
[   28.463010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   28.463520] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.463767] 
[   28.463892] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.463950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.463966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.463993] Call Trace:
[   28.464016]  <TASK>
[   28.464040]  dump_stack_lvl+0x73/0xb0
[   28.464072]  print_report+0xd1/0x650
[   28.464098]  ? __virt_addr_valid+0x1db/0x2d0
[   28.464127]  ? kasan_atomics_helper+0x4a02/0x5450
[   28.464156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.464186]  ? kasan_atomics_helper+0x4a02/0x5450
[   28.464217]  kasan_report+0x141/0x180
[   28.464247]  ? kasan_atomics_helper+0x4a02/0x5450
[   28.464282]  __asan_report_load4_noabort+0x18/0x20
[   28.464309]  kasan_atomics_helper+0x4a02/0x5450
[   28.464340]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.464371]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.464411]  ? kasan_atomics+0x152/0x310
[   28.464441]  kasan_atomics+0x1dc/0x310
[   28.464467]  ? __pfx_kasan_atomics+0x10/0x10
[   28.464495]  ? __pfx_read_tsc+0x10/0x10
[   28.464521]  ? ktime_get_ts64+0x86/0x230
[   28.464550]  kunit_try_run_case+0x1a5/0x480
[   28.464581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.464609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.464660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.464690]  ? __kthread_parkme+0x82/0x180
[   28.464726]  ? preempt_count_sub+0x50/0x80
[   28.464754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.464784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.464814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.464843]  kthread+0x337/0x6f0
[   28.464867]  ? trace_preempt_on+0x20/0xc0
[   28.464896]  ? __pfx_kthread+0x10/0x10
[   28.464922]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.464949]  ? calculate_sigpending+0x7b/0xa0
[   28.464978]  ? __pfx_kthread+0x10/0x10
[   28.465005]  ret_from_fork+0x116/0x1d0
[   28.465028]  ? __pfx_kthread+0x10/0x10
[   28.465053]  ret_from_fork_asm+0x1a/0x30
[   28.465091]  </TASK>
[   28.465106] 
[   28.473241] Allocated by task 314:
[   28.473424]  kasan_save_stack+0x45/0x70
[   28.473608]  kasan_save_track+0x18/0x40
[   28.473794]  kasan_save_alloc_info+0x3b/0x50
[   28.474014]  __kasan_kmalloc+0xb7/0xc0
[   28.474187]  __kmalloc_cache_noprof+0x189/0x420
[   28.474410]  kasan_atomics+0x95/0x310
[   28.474581]  kunit_try_run_case+0x1a5/0x480
[   28.474781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.475089]  kthread+0x337/0x6f0
[   28.475248]  ret_from_fork+0x116/0x1d0
[   28.475422]  ret_from_fork_asm+0x1a/0x30
[   28.475616] 
[   28.475694] The buggy address belongs to the object at ffff88810625b900
[   28.475694]  which belongs to the cache kmalloc-64 of size 64
[   28.476210] The buggy address is located 0 bytes to the right of
[   28.476210]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.476616] 
[   28.476711] The buggy address belongs to the physical page:
[   28.476980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.477360] flags: 0x200000000000000(node=0|zone=2)
[   28.477578] page_type: f5(slab)
[   28.477708] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.477951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.478648] page dumped because: kasan: bad access detected
[   28.478929] 
[   28.479018] Memory state around the buggy address:
[   28.479251]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.479505]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.479733] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.479955]                                      ^
[   28.480115]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.480349]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.480918] ==================================================================
[   28.415150] ==================================================================
[   28.415535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   28.415921] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.416189] 
[   28.416319] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.416375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.416403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.416430] Call Trace:
[   28.416452]  <TASK>
[   28.416474]  dump_stack_lvl+0x73/0xb0
[   28.416506]  print_report+0xd1/0x650
[   28.416532]  ? __virt_addr_valid+0x1db/0x2d0
[   28.416560]  ? kasan_atomics_helper+0x4a1c/0x5450
[   28.416590]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.416620]  ? kasan_atomics_helper+0x4a1c/0x5450
[   28.416650]  kasan_report+0x141/0x180
[   28.416677]  ? kasan_atomics_helper+0x4a1c/0x5450
[   28.416711]  __asan_report_load4_noabort+0x18/0x20
[   28.416740]  kasan_atomics_helper+0x4a1c/0x5450
[   28.416771]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.416801]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.416831]  ? kasan_atomics+0x152/0x310
[   28.416861]  kasan_atomics+0x1dc/0x310
[   28.416888]  ? __pfx_kasan_atomics+0x10/0x10
[   28.416917]  ? __pfx_read_tsc+0x10/0x10
[   28.416944]  ? ktime_get_ts64+0x86/0x230
[   28.416974]  kunit_try_run_case+0x1a5/0x480
[   28.417005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.417034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.417062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.417105]  ? __kthread_parkme+0x82/0x180
[   28.417131]  ? preempt_count_sub+0x50/0x80
[   28.417160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.417190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.417219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.417249]  kthread+0x337/0x6f0
[   28.417274]  ? trace_preempt_on+0x20/0xc0
[   28.417304]  ? __pfx_kthread+0x10/0x10
[   28.417329]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.417356]  ? calculate_sigpending+0x7b/0xa0
[   28.417385]  ? __pfx_kthread+0x10/0x10
[   28.417424]  ret_from_fork+0x116/0x1d0
[   28.417448]  ? __pfx_kthread+0x10/0x10
[   28.417473]  ret_from_fork_asm+0x1a/0x30
[   28.417510]  </TASK>
[   28.417525] 
[   28.425530] Allocated by task 314:
[   28.425680]  kasan_save_stack+0x45/0x70
[   28.425839]  kasan_save_track+0x18/0x40
[   28.425982]  kasan_save_alloc_info+0x3b/0x50
[   28.426140]  __kasan_kmalloc+0xb7/0xc0
[   28.428440]  __kmalloc_cache_noprof+0x189/0x420
[   28.428658]  kasan_atomics+0x95/0x310
[   28.428807]  kunit_try_run_case+0x1a5/0x480
[   28.429031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.429372]  kthread+0x337/0x6f0
[   28.429519]  ret_from_fork+0x116/0x1d0
[   28.429665]  ret_from_fork_asm+0x1a/0x30
[   28.429817] 
[   28.429894] The buggy address belongs to the object at ffff88810625b900
[   28.429894]  which belongs to the cache kmalloc-64 of size 64
[   28.430541] The buggy address is located 0 bytes to the right of
[   28.430541]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.430973] 
[   28.431058] The buggy address belongs to the physical page:
[   28.431249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.431733] flags: 0x200000000000000(node=0|zone=2)
[   28.434707] page_type: f5(slab)
[   28.434957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.435227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.435506] page dumped because: kasan: bad access detected
[   28.435697] 
[   28.435804] Memory state around the buggy address:
[   28.435998]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.436239]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.436581] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.436870]                                      ^
[   28.437106]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.437339]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.438659] ==================================================================
[   28.329490] ==================================================================
[   28.330013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   28.331071] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.331501] 
[   28.331610] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.331670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.331688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.331717] Call Trace:
[   28.331742]  <TASK>
[   28.331767]  dump_stack_lvl+0x73/0xb0
[   28.331802]  print_report+0xd1/0x650
[   28.331830]  ? __virt_addr_valid+0x1db/0x2d0
[   28.331897]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.331930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.331975]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.332006]  kasan_report+0x141/0x180
[   28.332032]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.332067]  kasan_check_range+0x10c/0x1c0
[   28.332095]  __kasan_check_write+0x18/0x20
[   28.332123]  kasan_atomics_helper+0xfa9/0x5450
[   28.332154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.332358]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.332402]  ? kasan_atomics+0x152/0x310
[   28.332434]  kasan_atomics+0x1dc/0x310
[   28.332462]  ? __pfx_kasan_atomics+0x10/0x10
[   28.332490]  ? __pfx_read_tsc+0x10/0x10
[   28.332517]  ? ktime_get_ts64+0x86/0x230
[   28.332548]  kunit_try_run_case+0x1a5/0x480
[   28.332579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.332607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.332639]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.332668]  ? __kthread_parkme+0x82/0x180
[   28.332694]  ? preempt_count_sub+0x50/0x80
[   28.332723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.332875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.332906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.332936]  kthread+0x337/0x6f0
[   28.332961]  ? trace_preempt_on+0x20/0xc0
[   28.332991]  ? __pfx_kthread+0x10/0x10
[   28.333017]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.333045]  ? calculate_sigpending+0x7b/0xa0
[   28.333075]  ? __pfx_kthread+0x10/0x10
[   28.333101]  ret_from_fork+0x116/0x1d0
[   28.333262]  ? __pfx_kthread+0x10/0x10
[   28.333300]  ret_from_fork_asm+0x1a/0x30
[   28.333340]  </TASK>
[   28.333356] 
[   28.350075] Allocated by task 314:
[   28.350610]  kasan_save_stack+0x45/0x70
[   28.351008]  kasan_save_track+0x18/0x40
[   28.351215]  kasan_save_alloc_info+0x3b/0x50
[   28.351705]  __kasan_kmalloc+0xb7/0xc0
[   28.352131]  __kmalloc_cache_noprof+0x189/0x420
[   28.352693]  kasan_atomics+0x95/0x310
[   28.352857]  kunit_try_run_case+0x1a5/0x480
[   28.353021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.353440]  kthread+0x337/0x6f0
[   28.353825]  ret_from_fork+0x116/0x1d0
[   28.354341]  ret_from_fork_asm+0x1a/0x30
[   28.354776] 
[   28.354948] The buggy address belongs to the object at ffff88810625b900
[   28.354948]  which belongs to the cache kmalloc-64 of size 64
[   28.356615] The buggy address is located 0 bytes to the right of
[   28.356615]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.357415] 
[   28.357641] The buggy address belongs to the physical page:
[   28.358000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.358631] flags: 0x200000000000000(node=0|zone=2)
[   28.359155] page_type: f5(slab)
[   28.359622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.360169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.360849] page dumped because: kasan: bad access detected
[   28.361623] 
[   28.361828] Memory state around the buggy address:
[   28.362093]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.362834]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.363758] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.364526]                                      ^
[   28.364892]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.365689]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.366051] ==================================================================
[   28.543982] ==================================================================
[   28.544315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   28.544726] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.545033] 
[   28.545156] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.545213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.545229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.545257] Call Trace:
[   28.545279]  <TASK>
[   28.545301]  dump_stack_lvl+0x73/0xb0
[   28.545331]  print_report+0xd1/0x650
[   28.545359]  ? __virt_addr_valid+0x1db/0x2d0
[   28.545387]  ? kasan_atomics_helper+0x49ce/0x5450
[   28.545428]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.545457]  ? kasan_atomics_helper+0x49ce/0x5450
[   28.545487]  kasan_report+0x141/0x180
[   28.545512]  ? kasan_atomics_helper+0x49ce/0x5450
[   28.545545]  __asan_report_load4_noabort+0x18/0x20
[   28.545572]  kasan_atomics_helper+0x49ce/0x5450
[   28.545602]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.545632]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.545661]  ? kasan_atomics+0x152/0x310
[   28.545690]  kasan_atomics+0x1dc/0x310
[   28.545717]  ? __pfx_kasan_atomics+0x10/0x10
[   28.545743]  ? __pfx_read_tsc+0x10/0x10
[   28.545769]  ? ktime_get_ts64+0x86/0x230
[   28.545797]  kunit_try_run_case+0x1a5/0x480
[   28.545826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.545853]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.545882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.545909]  ? __kthread_parkme+0x82/0x180
[   28.545933]  ? preempt_count_sub+0x50/0x80
[   28.545960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.545989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.546016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.546044]  kthread+0x337/0x6f0
[   28.546067]  ? trace_preempt_on+0x20/0xc0
[   28.546094]  ? __pfx_kthread+0x10/0x10
[   28.546119]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.546145]  ? calculate_sigpending+0x7b/0xa0
[   28.546173]  ? __pfx_kthread+0x10/0x10
[   28.546198]  ret_from_fork+0x116/0x1d0
[   28.546220]  ? __pfx_kthread+0x10/0x10
[   28.546244]  ret_from_fork_asm+0x1a/0x30
[   28.546279]  </TASK>
[   28.546293] 
[   28.562235] Allocated by task 314:
[   28.562409]  kasan_save_stack+0x45/0x70
[   28.562573]  kasan_save_track+0x18/0x40
[   28.562712]  kasan_save_alloc_info+0x3b/0x50
[   28.562892]  __kasan_kmalloc+0xb7/0xc0
[   28.563232]  __kmalloc_cache_noprof+0x189/0x420
[   28.563661]  kasan_atomics+0x95/0x310
[   28.564043]  kunit_try_run_case+0x1a5/0x480
[   28.564462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.565006]  kthread+0x337/0x6f0
[   28.565340]  ret_from_fork+0x116/0x1d0
[   28.565723]  ret_from_fork_asm+0x1a/0x30
[   28.566133] 
[   28.566336] The buggy address belongs to the object at ffff88810625b900
[   28.566336]  which belongs to the cache kmalloc-64 of size 64
[   28.567082] The buggy address is located 0 bytes to the right of
[   28.567082]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.567474] 
[   28.567551] The buggy address belongs to the physical page:
[   28.567736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.568289] flags: 0x200000000000000(node=0|zone=2)
[   28.568783] page_type: f5(slab)
[   28.569134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.569825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.570528] page dumped because: kasan: bad access detected
[   28.571060] 
[   28.571218] Memory state around the buggy address:
[   28.571669]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.572334]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.573005] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.573513]                                      ^
[   28.573745]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.574270]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.574506] ==================================================================
[   28.924055] ==================================================================
[   28.924786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   28.925252] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.925507] 
[   28.925605] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.925663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.925678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.925744] Call Trace:
[   28.925768]  <TASK>
[   28.925821]  dump_stack_lvl+0x73/0xb0
[   28.925900]  print_report+0xd1/0x650
[   28.925927]  ? __virt_addr_valid+0x1db/0x2d0
[   28.925968]  ? kasan_atomics_helper+0x1b22/0x5450
[   28.925996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.926025]  ? kasan_atomics_helper+0x1b22/0x5450
[   28.926056]  kasan_report+0x141/0x180
[   28.926081]  ? kasan_atomics_helper+0x1b22/0x5450
[   28.926115]  kasan_check_range+0x10c/0x1c0
[   28.926141]  __kasan_check_write+0x18/0x20
[   28.926198]  kasan_atomics_helper+0x1b22/0x5450
[   28.926228]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.926268]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.926298]  ? kasan_atomics+0x152/0x310
[   28.926329]  kasan_atomics+0x1dc/0x310
[   28.926354]  ? __pfx_kasan_atomics+0x10/0x10
[   28.926420]  ? __pfx_read_tsc+0x10/0x10
[   28.926447]  ? ktime_get_ts64+0x86/0x230
[   28.926477]  kunit_try_run_case+0x1a5/0x480
[   28.926517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.926545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.926602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.926630]  ? __kthread_parkme+0x82/0x180
[   28.926666]  ? preempt_count_sub+0x50/0x80
[   28.926694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.926750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.926779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.926819]  kthread+0x337/0x6f0
[   28.926842]  ? trace_preempt_on+0x20/0xc0
[   28.926890]  ? __pfx_kthread+0x10/0x10
[   28.926924]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.926950]  ? calculate_sigpending+0x7b/0xa0
[   28.926990]  ? __pfx_kthread+0x10/0x10
[   28.927015]  ret_from_fork+0x116/0x1d0
[   28.927039]  ? __pfx_kthread+0x10/0x10
[   28.927091]  ret_from_fork_asm+0x1a/0x30
[   28.927127]  </TASK>
[   28.927142] 
[   28.936253] Allocated by task 314:
[   28.936467]  kasan_save_stack+0x45/0x70
[   28.936704]  kasan_save_track+0x18/0x40
[   28.936938]  kasan_save_alloc_info+0x3b/0x50
[   28.937144]  __kasan_kmalloc+0xb7/0xc0
[   28.937340]  __kmalloc_cache_noprof+0x189/0x420
[   28.937593]  kasan_atomics+0x95/0x310
[   28.937820]  kunit_try_run_case+0x1a5/0x480
[   28.937978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.938164]  kthread+0x337/0x6f0
[   28.938330]  ret_from_fork+0x116/0x1d0
[   28.938541]  ret_from_fork_asm+0x1a/0x30
[   28.938748] 
[   28.938846] The buggy address belongs to the object at ffff88810625b900
[   28.938846]  which belongs to the cache kmalloc-64 of size 64
[   28.939433] The buggy address is located 0 bytes to the right of
[   28.939433]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.940052] 
[   28.940156] The buggy address belongs to the physical page:
[   28.940469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.940931] flags: 0x200000000000000(node=0|zone=2)
[   28.941172] page_type: f5(slab)
[   28.941302] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.941563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.941937] page dumped because: kasan: bad access detected
[   28.942254] 
[   28.942351] Memory state around the buggy address:
[   28.942604]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.943005]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.943350] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.943712]                                      ^
[   28.943982]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.944332]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.944733] ==================================================================
[   29.121387] ==================================================================
[   29.121899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   29.122316] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.122564] 
[   29.122670] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.122726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.122741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.122780] Call Trace:
[   29.122803]  <TASK>
[   29.122827]  dump_stack_lvl+0x73/0xb0
[   29.122871]  print_report+0xd1/0x650
[   29.122907]  ? __virt_addr_valid+0x1db/0x2d0
[   29.122935]  ? kasan_atomics_helper+0x2006/0x5450
[   29.122963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.123004]  ? kasan_atomics_helper+0x2006/0x5450
[   29.123033]  kasan_report+0x141/0x180
[   29.123070]  ? kasan_atomics_helper+0x2006/0x5450
[   29.123103]  kasan_check_range+0x10c/0x1c0
[   29.123130]  __kasan_check_write+0x18/0x20
[   29.123167]  kasan_atomics_helper+0x2006/0x5450
[   29.123198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.123227]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.123267]  ? kasan_atomics+0x152/0x310
[   29.123296]  kasan_atomics+0x1dc/0x310
[   29.123322]  ? __pfx_kasan_atomics+0x10/0x10
[   29.123358]  ? __pfx_read_tsc+0x10/0x10
[   29.123384]  ? ktime_get_ts64+0x86/0x230
[   29.123429]  kunit_try_run_case+0x1a5/0x480
[   29.123459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.123486]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.123516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.123554]  ? __kthread_parkme+0x82/0x180
[   29.123577]  ? preempt_count_sub+0x50/0x80
[   29.123615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.123643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.123671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.123709]  kthread+0x337/0x6f0
[   29.123731]  ? trace_preempt_on+0x20/0xc0
[   29.123773]  ? __pfx_kthread+0x10/0x10
[   29.123797]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.123824]  ? calculate_sigpending+0x7b/0xa0
[   29.123861]  ? __pfx_kthread+0x10/0x10
[   29.123886]  ret_from_fork+0x116/0x1d0
[   29.123908]  ? __pfx_kthread+0x10/0x10
[   29.123944]  ret_from_fork_asm+0x1a/0x30
[   29.123979]  </TASK>
[   29.123994] 
[   29.132310] Allocated by task 314:
[   29.132563]  kasan_save_stack+0x45/0x70
[   29.132784]  kasan_save_track+0x18/0x40
[   29.133061]  kasan_save_alloc_info+0x3b/0x50
[   29.133432]  __kasan_kmalloc+0xb7/0xc0
[   29.133646]  __kmalloc_cache_noprof+0x189/0x420
[   29.133826]  kasan_atomics+0x95/0x310
[   29.134087]  kunit_try_run_case+0x1a5/0x480
[   29.134315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.134642]  kthread+0x337/0x6f0
[   29.134804]  ret_from_fork+0x116/0x1d0
[   29.134990]  ret_from_fork_asm+0x1a/0x30
[   29.135264] 
[   29.135341] The buggy address belongs to the object at ffff88810625b900
[   29.135341]  which belongs to the cache kmalloc-64 of size 64
[   29.135728] The buggy address is located 0 bytes to the right of
[   29.135728]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.136249] 
[   29.136350] The buggy address belongs to the physical page:
[   29.136623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.137263] flags: 0x200000000000000(node=0|zone=2)
[   29.137546] page_type: f5(slab)
[   29.137760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.138112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.138351] page dumped because: kasan: bad access detected
[   29.140002] 
[   29.140217] Memory state around the buggy address:
[   29.140488]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.140830]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.141560] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.142216]                                      ^
[   29.142693]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.143309]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.144033] ==================================================================
[   29.207366] ==================================================================
[   29.207718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   29.208135] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.208487] 
[   29.208644] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.208747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.208763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.208814] Call Trace:
[   29.208836]  <TASK>
[   29.208859]  dump_stack_lvl+0x73/0xb0
[   29.208918]  print_report+0xd1/0x650
[   29.208944]  ? __virt_addr_valid+0x1db/0x2d0
[   29.208972]  ? kasan_atomics_helper+0x218a/0x5450
[   29.209001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.209032]  ? kasan_atomics_helper+0x218a/0x5450
[   29.209061]  kasan_report+0x141/0x180
[   29.209086]  ? kasan_atomics_helper+0x218a/0x5450
[   29.209120]  kasan_check_range+0x10c/0x1c0
[   29.209147]  __kasan_check_write+0x18/0x20
[   29.209204]  kasan_atomics_helper+0x218a/0x5450
[   29.209235]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.209275]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.209304]  ? kasan_atomics+0x152/0x310
[   29.209358]  kasan_atomics+0x1dc/0x310
[   29.209385]  ? __pfx_kasan_atomics+0x10/0x10
[   29.209445]  ? __pfx_read_tsc+0x10/0x10
[   29.209485]  ? ktime_get_ts64+0x86/0x230
[   29.209515]  kunit_try_run_case+0x1a5/0x480
[   29.209544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.209586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.209614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.209643]  ? __kthread_parkme+0x82/0x180
[   29.209668]  ? preempt_count_sub+0x50/0x80
[   29.209696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.209725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.209775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.209816]  kthread+0x337/0x6f0
[   29.209839]  ? trace_preempt_on+0x20/0xc0
[   29.209888]  ? __pfx_kthread+0x10/0x10
[   29.209913]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.209939]  ? calculate_sigpending+0x7b/0xa0
[   29.209968]  ? __pfx_kthread+0x10/0x10
[   29.209994]  ret_from_fork+0x116/0x1d0
[   29.210017]  ? __pfx_kthread+0x10/0x10
[   29.210041]  ret_from_fork_asm+0x1a/0x30
[   29.210077]  </TASK>
[   29.210091] 
[   29.218435] Allocated by task 314:
[   29.218647]  kasan_save_stack+0x45/0x70
[   29.218880]  kasan_save_track+0x18/0x40
[   29.219127]  kasan_save_alloc_info+0x3b/0x50
[   29.219349]  __kasan_kmalloc+0xb7/0xc0
[   29.219593]  __kmalloc_cache_noprof+0x189/0x420
[   29.219845]  kasan_atomics+0x95/0x310
[   29.220105]  kunit_try_run_case+0x1a5/0x480
[   29.220330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.220590]  kthread+0x337/0x6f0
[   29.220791]  ret_from_fork+0x116/0x1d0
[   29.221041]  ret_from_fork_asm+0x1a/0x30
[   29.221292] 
[   29.221419] The buggy address belongs to the object at ffff88810625b900
[   29.221419]  which belongs to the cache kmalloc-64 of size 64
[   29.221813] The buggy address is located 0 bytes to the right of
[   29.221813]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.225041] 
[   29.226288] The buggy address belongs to the physical page:
[   29.226805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.228067] flags: 0x200000000000000(node=0|zone=2)
[   29.228288] page_type: f5(slab)
[   29.228455] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.228710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.228967] page dumped because: kasan: bad access detected
[   29.229153] 
[   29.229228] Memory state around the buggy address:
[   29.230310]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.230776]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.231510] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.231870]                                      ^
[   29.232091]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.232489]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.232850] ==================================================================
[   29.234088] ==================================================================
[   29.234815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   29.235218] Read of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.235894] 
[   29.236054] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.236267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.236287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.236315] Call Trace:
[   29.236339]  <TASK>
[   29.236364]  dump_stack_lvl+0x73/0xb0
[   29.236415]  print_report+0xd1/0x650
[   29.236444]  ? __virt_addr_valid+0x1db/0x2d0
[   29.236474]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.236506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.236538]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.236570]  kasan_report+0x141/0x180
[   29.236596]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.236632]  __asan_report_load8_noabort+0x18/0x20
[   29.236662]  kasan_atomics_helper+0x4fa5/0x5450
[   29.236693]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.236724]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.236755]  ? kasan_atomics+0x152/0x310
[   29.236785]  kasan_atomics+0x1dc/0x310
[   29.236812]  ? __pfx_kasan_atomics+0x10/0x10
[   29.236841]  ? __pfx_read_tsc+0x10/0x10
[   29.236869]  ? ktime_get_ts64+0x86/0x230
[   29.236914]  kunit_try_run_case+0x1a5/0x480
[   29.236945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.236974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.237004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.237034]  ? __kthread_parkme+0x82/0x180
[   29.237060]  ? preempt_count_sub+0x50/0x80
[   29.237090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.237121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.237150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.237181]  kthread+0x337/0x6f0
[   29.237205]  ? trace_preempt_on+0x20/0xc0
[   29.237236]  ? __pfx_kthread+0x10/0x10
[   29.237261]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.237289]  ? calculate_sigpending+0x7b/0xa0
[   29.237320]  ? __pfx_kthread+0x10/0x10
[   29.237346]  ret_from_fork+0x116/0x1d0
[   29.237370]  ? __pfx_kthread+0x10/0x10
[   29.237408]  ret_from_fork_asm+0x1a/0x30
[   29.237445]  </TASK>
[   29.237460] 
[   29.249185] Allocated by task 314:
[   29.249387]  kasan_save_stack+0x45/0x70
[   29.249615]  kasan_save_track+0x18/0x40
[   29.249810]  kasan_save_alloc_info+0x3b/0x50
[   29.250570]  __kasan_kmalloc+0xb7/0xc0
[   29.250765]  __kmalloc_cache_noprof+0x189/0x420
[   29.251316]  kasan_atomics+0x95/0x310
[   29.251702]  kunit_try_run_case+0x1a5/0x480
[   29.252005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.252440]  kthread+0x337/0x6f0
[   29.252732]  ret_from_fork+0x116/0x1d0
[   29.253100]  ret_from_fork_asm+0x1a/0x30
[   29.253349] 
[   29.253479] The buggy address belongs to the object at ffff88810625b900
[   29.253479]  which belongs to the cache kmalloc-64 of size 64
[   29.254378] The buggy address is located 0 bytes to the right of
[   29.254378]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.255283] 
[   29.255384] The buggy address belongs to the physical page:
[   29.255791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.256500] flags: 0x200000000000000(node=0|zone=2)
[   29.256890] page_type: f5(slab)
[   29.257200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.257655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.258182] page dumped because: kasan: bad access detected
[   29.258574] 
[   29.258775] Memory state around the buggy address:
[   29.259104]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.259618]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.260046] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.260586]                                      ^
[   29.260944]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.261384]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.261864] ==================================================================
[   28.013215] ==================================================================
[   28.014239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   28.014739] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.015441] 
[   28.015753] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.015819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.015836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.015864] Call Trace:
[   28.015899]  <TASK>
[   28.015922]  dump_stack_lvl+0x73/0xb0
[   28.015959]  print_report+0xd1/0x650
[   28.016010]  ? __virt_addr_valid+0x1db/0x2d0
[   28.016041]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.016071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.016102]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.016134]  kasan_report+0x141/0x180
[   28.016160]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.016207]  kasan_check_range+0x10c/0x1c0
[   28.016241]  __kasan_check_write+0x18/0x20
[   28.016269]  kasan_atomics_helper+0x8f9/0x5450
[   28.016300]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.016331]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.016362]  ? kasan_atomics+0x152/0x310
[   28.016405]  kasan_atomics+0x1dc/0x310
[   28.016433]  ? __pfx_kasan_atomics+0x10/0x10
[   28.016462]  ? __pfx_read_tsc+0x10/0x10
[   28.016489]  ? ktime_get_ts64+0x86/0x230
[   28.016518]  kunit_try_run_case+0x1a5/0x480
[   28.016550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.016579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.016608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.016638]  ? __kthread_parkme+0x82/0x180
[   28.016664]  ? preempt_count_sub+0x50/0x80
[   28.016693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.016723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.016754]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.016784]  kthread+0x337/0x6f0
[   28.016808]  ? trace_preempt_on+0x20/0xc0
[   28.016837]  ? __pfx_kthread+0x10/0x10
[   28.016863]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.016890]  ? calculate_sigpending+0x7b/0xa0
[   28.016919]  ? __pfx_kthread+0x10/0x10
[   28.016945]  ret_from_fork+0x116/0x1d0
[   28.016969]  ? __pfx_kthread+0x10/0x10
[   28.016994]  ret_from_fork_asm+0x1a/0x30
[   28.017031]  </TASK>
[   28.017046] 
[   28.030959] Allocated by task 314:
[   28.031735]  kasan_save_stack+0x45/0x70
[   28.032410]  kasan_save_track+0x18/0x40
[   28.032636]  kasan_save_alloc_info+0x3b/0x50
[   28.032812]  __kasan_kmalloc+0xb7/0xc0
[   28.033014]  __kmalloc_cache_noprof+0x189/0x420
[   28.033402]  kasan_atomics+0x95/0x310
[   28.033633]  kunit_try_run_case+0x1a5/0x480
[   28.033848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.034118]  kthread+0x337/0x6f0
[   28.034277]  ret_from_fork+0x116/0x1d0
[   28.034515]  ret_from_fork_asm+0x1a/0x30
[   28.034800] 
[   28.034951] The buggy address belongs to the object at ffff88810625b900
[   28.034951]  which belongs to the cache kmalloc-64 of size 64
[   28.035562] The buggy address is located 0 bytes to the right of
[   28.035562]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.036474] 
[   28.036598] The buggy address belongs to the physical page:
[   28.037056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.037634] flags: 0x200000000000000(node=0|zone=2)
[   28.037939] page_type: f5(slab)
[   28.038137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.038532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.038930] page dumped because: kasan: bad access detected
[   28.039215] 
[   28.039430] Memory state around the buggy address:
[   28.039629]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.040012]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.040577] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.041069]                                      ^
[   28.041410]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.041794]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.042145] ==================================================================
[   28.860488] ==================================================================
[   28.860989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   28.861862] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.862232] 
[   28.862374] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.862446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.862463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.862493] Call Trace:
[   28.862542]  <TASK>
[   28.862578]  dump_stack_lvl+0x73/0xb0
[   28.862646]  print_report+0xd1/0x650
[   28.862703]  ? __virt_addr_valid+0x1db/0x2d0
[   28.862753]  ? kasan_atomics_helper+0x194a/0x5450
[   28.862828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.862891]  ? kasan_atomics_helper+0x194a/0x5450
[   28.862923]  kasan_report+0x141/0x180
[   28.862950]  ? kasan_atomics_helper+0x194a/0x5450
[   28.862986]  kasan_check_range+0x10c/0x1c0
[   28.863014]  __kasan_check_write+0x18/0x20
[   28.863042]  kasan_atomics_helper+0x194a/0x5450
[   28.863072]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.863103]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.863133]  ? kasan_atomics+0x152/0x310
[   28.863164]  kasan_atomics+0x1dc/0x310
[   28.863191]  ? __pfx_kasan_atomics+0x10/0x10
[   28.863219]  ? __pfx_read_tsc+0x10/0x10
[   28.863246]  ? ktime_get_ts64+0x86/0x230
[   28.863276]  kunit_try_run_case+0x1a5/0x480
[   28.863308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.863336]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.863366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.863410]  ? __kthread_parkme+0x82/0x180
[   28.863435]  ? preempt_count_sub+0x50/0x80
[   28.863465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.863494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.863524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.863585]  kthread+0x337/0x6f0
[   28.863609]  ? trace_preempt_on+0x20/0xc0
[   28.863745]  ? __pfx_kthread+0x10/0x10
[   28.863772]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.863814]  ? calculate_sigpending+0x7b/0xa0
[   28.863845]  ? __pfx_kthread+0x10/0x10
[   28.863873]  ret_from_fork+0x116/0x1d0
[   28.863909]  ? __pfx_kthread+0x10/0x10
[   28.863935]  ret_from_fork_asm+0x1a/0x30
[   28.863973]  </TASK>
[   28.863988] 
[   28.872975] Allocated by task 314:
[   28.873205]  kasan_save_stack+0x45/0x70
[   28.873429]  kasan_save_track+0x18/0x40
[   28.873698]  kasan_save_alloc_info+0x3b/0x50
[   28.873911]  __kasan_kmalloc+0xb7/0xc0
[   28.874177]  __kmalloc_cache_noprof+0x189/0x420
[   28.874380]  kasan_atomics+0x95/0x310
[   28.874629]  kunit_try_run_case+0x1a5/0x480
[   28.874848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.875255]  kthread+0x337/0x6f0
[   28.875464]  ret_from_fork+0x116/0x1d0
[   28.875640]  ret_from_fork_asm+0x1a/0x30
[   28.875939] 
[   28.876056] The buggy address belongs to the object at ffff88810625b900
[   28.876056]  which belongs to the cache kmalloc-64 of size 64
[   28.876606] The buggy address is located 0 bytes to the right of
[   28.876606]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.877248] 
[   28.877416] The buggy address belongs to the physical page:
[   28.877740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.878139] flags: 0x200000000000000(node=0|zone=2)
[   28.878441] page_type: f5(slab)
[   28.878660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.879051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.879292] page dumped because: kasan: bad access detected
[   28.879505] 
[   28.879599] Memory state around the buggy address:
[   28.879853]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.880202]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.880545] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.880863]                                      ^
[   28.881032]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.881253]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.881481] ==================================================================
[   29.283914] ==================================================================
[   29.284432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   29.284815] Read of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.285062] 
[   29.285158] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.285215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.285232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.285260] Call Trace:
[   29.285280]  <TASK>
[   29.285302]  dump_stack_lvl+0x73/0xb0
[   29.285332]  print_report+0xd1/0x650
[   29.285360]  ? __virt_addr_valid+0x1db/0x2d0
[   29.285405]  ? kasan_atomics_helper+0x5115/0x5450
[   29.285434]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.285465]  ? kasan_atomics_helper+0x5115/0x5450
[   29.285496]  kasan_report+0x141/0x180
[   29.285522]  ? kasan_atomics_helper+0x5115/0x5450
[   29.285573]  __asan_report_load8_noabort+0x18/0x20
[   29.285603]  kasan_atomics_helper+0x5115/0x5450
[   29.285634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.285664]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.285693]  ? kasan_atomics+0x152/0x310
[   29.285724]  kasan_atomics+0x1dc/0x310
[   29.285751]  ? __pfx_kasan_atomics+0x10/0x10
[   29.285804]  ? __pfx_read_tsc+0x10/0x10
[   29.285831]  ? ktime_get_ts64+0x86/0x230
[   29.285877]  kunit_try_run_case+0x1a5/0x480
[   29.285908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.285936]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.285980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.286025]  ? __kthread_parkme+0x82/0x180
[   29.286065]  ? preempt_count_sub+0x50/0x80
[   29.286108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.286139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.286168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.286198]  kthread+0x337/0x6f0
[   29.286221]  ? trace_preempt_on+0x20/0xc0
[   29.286250]  ? __pfx_kthread+0x10/0x10
[   29.286276]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.286302]  ? calculate_sigpending+0x7b/0xa0
[   29.286332]  ? __pfx_kthread+0x10/0x10
[   29.286358]  ret_from_fork+0x116/0x1d0
[   29.286381]  ? __pfx_kthread+0x10/0x10
[   29.286417]  ret_from_fork_asm+0x1a/0x30
[   29.286453]  </TASK>
[   29.286468] 
[   29.295582] Allocated by task 314:
[   29.295748]  kasan_save_stack+0x45/0x70
[   29.295988]  kasan_save_track+0x18/0x40
[   29.296189]  kasan_save_alloc_info+0x3b/0x50
[   29.296442]  __kasan_kmalloc+0xb7/0xc0
[   29.296642]  __kmalloc_cache_noprof+0x189/0x420
[   29.296864]  kasan_atomics+0x95/0x310
[   29.297078]  kunit_try_run_case+0x1a5/0x480
[   29.297353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.297659]  kthread+0x337/0x6f0
[   29.297835]  ret_from_fork+0x116/0x1d0
[   29.298028]  ret_from_fork_asm+0x1a/0x30
[   29.298243] 
[   29.298347] The buggy address belongs to the object at ffff88810625b900
[   29.298347]  which belongs to the cache kmalloc-64 of size 64
[   29.299048] The buggy address is located 0 bytes to the right of
[   29.299048]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.299453] 
[   29.299556] The buggy address belongs to the physical page:
[   29.299829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.300613] flags: 0x200000000000000(node=0|zone=2)
[   29.300860] page_type: f5(slab)
[   29.301049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.301453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.301891] page dumped because: kasan: bad access detected
[   29.302206] 
[   29.302304] Memory state around the buggy address:
[   29.302555]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.302912]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.303254] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.303597]                                      ^
[   29.303763]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.303994]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.304227] ==================================================================
[   28.607545] ==================================================================
[   28.608888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   28.609831] Read of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.610096] 
[   28.610200] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.610260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.610277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.610306] Call Trace:
[   28.610332]  <TASK>
[   28.610357]  dump_stack_lvl+0x73/0xb0
[   28.610406]  print_report+0xd1/0x650
[   28.610434]  ? __virt_addr_valid+0x1db/0x2d0
[   28.610464]  ? kasan_atomics_helper+0x4eae/0x5450
[   28.610495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.610526]  ? kasan_atomics_helper+0x4eae/0x5450
[   28.610557]  kasan_report+0x141/0x180
[   28.610585]  ? kasan_atomics_helper+0x4eae/0x5450
[   28.610835]  __asan_report_load8_noabort+0x18/0x20
[   28.610866]  kasan_atomics_helper+0x4eae/0x5450
[   28.610898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.610929]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.610958]  ? kasan_atomics+0x152/0x310
[   28.610990]  kasan_atomics+0x1dc/0x310
[   28.611237]  ? __pfx_kasan_atomics+0x10/0x10
[   28.611266]  ? __pfx_read_tsc+0x10/0x10
[   28.611293]  ? ktime_get_ts64+0x86/0x230
[   28.611325]  kunit_try_run_case+0x1a5/0x480
[   28.611357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.611386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.611430]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.611460]  ? __kthread_parkme+0x82/0x180
[   28.611486]  ? preempt_count_sub+0x50/0x80
[   28.611515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.611545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.611575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.611605]  kthread+0x337/0x6f0
[   28.611632]  ? trace_preempt_on+0x20/0xc0
[   28.611661]  ? __pfx_kthread+0x10/0x10
[   28.611687]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.611715]  ? calculate_sigpending+0x7b/0xa0
[   28.611744]  ? __pfx_kthread+0x10/0x10
[   28.611771]  ret_from_fork+0x116/0x1d0
[   28.611795]  ? __pfx_kthread+0x10/0x10
[   28.611821]  ret_from_fork_asm+0x1a/0x30
[   28.611858]  </TASK>
[   28.611876] 
[   28.624871] Allocated by task 314:
[   28.625100]  kasan_save_stack+0x45/0x70
[   28.625581]  kasan_save_track+0x18/0x40
[   28.625852]  kasan_save_alloc_info+0x3b/0x50
[   28.626755]  __kasan_kmalloc+0xb7/0xc0
[   28.626945]  __kmalloc_cache_noprof+0x189/0x420
[   28.627473]  kasan_atomics+0x95/0x310
[   28.627707]  kunit_try_run_case+0x1a5/0x480
[   28.628106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.628509]  kthread+0x337/0x6f0
[   28.628825]  ret_from_fork+0x116/0x1d0
[   28.629181]  ret_from_fork_asm+0x1a/0x30
[   28.629405] 
[   28.629610] The buggy address belongs to the object at ffff88810625b900
[   28.629610]  which belongs to the cache kmalloc-64 of size 64
[   28.630321] The buggy address is located 0 bytes to the right of
[   28.630321]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.630976] 
[   28.631242] The buggy address belongs to the physical page:
[   28.631527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.632147] flags: 0x200000000000000(node=0|zone=2)
[   28.632528] page_type: f5(slab)
[   28.632827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.633441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.633907] page dumped because: kasan: bad access detected
[   28.634291] 
[   28.634420] Memory state around the buggy address:
[   28.634694]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.635621]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.636210] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.636462]                                      ^
[   28.636630]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.636862]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.637193] ==================================================================
[   28.638491] ==================================================================
[   28.638918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   28.639410] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.639719] 
[   28.639871] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.639929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.639946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.639973] Call Trace:
[   28.639996]  <TASK>
[   28.640017]  dump_stack_lvl+0x73/0xb0
[   28.640049]  print_report+0xd1/0x650
[   28.640076]  ? __virt_addr_valid+0x1db/0x2d0
[   28.640105]  ? kasan_atomics_helper+0x1467/0x5450
[   28.640135]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.640165]  ? kasan_atomics_helper+0x1467/0x5450
[   28.640195]  kasan_report+0x141/0x180
[   28.640221]  ? kasan_atomics_helper+0x1467/0x5450
[   28.640261]  kasan_check_range+0x10c/0x1c0
[   28.640289]  __kasan_check_write+0x18/0x20
[   28.640317]  kasan_atomics_helper+0x1467/0x5450
[   28.640348]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.640378]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.640419]  ? kasan_atomics+0x152/0x310
[   28.640449]  kasan_atomics+0x1dc/0x310
[   28.640476]  ? __pfx_kasan_atomics+0x10/0x10
[   28.640504]  ? __pfx_read_tsc+0x10/0x10
[   28.640530]  ? ktime_get_ts64+0x86/0x230
[   28.640561]  kunit_try_run_case+0x1a5/0x480
[   28.640591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.640619]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.640649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.640678]  ? __kthread_parkme+0x82/0x180
[   28.640703]  ? preempt_count_sub+0x50/0x80
[   28.640731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.640761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.640790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.640820]  kthread+0x337/0x6f0
[   28.640844]  ? trace_preempt_on+0x20/0xc0
[   28.640872]  ? __pfx_kthread+0x10/0x10
[   28.640915]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.640942]  ? calculate_sigpending+0x7b/0xa0
[   28.640971]  ? __pfx_kthread+0x10/0x10
[   28.640996]  ret_from_fork+0x116/0x1d0
[   28.641019]  ? __pfx_kthread+0x10/0x10
[   28.641045]  ret_from_fork_asm+0x1a/0x30
[   28.641081]  </TASK>
[   28.641096] 
[   28.648637] Allocated by task 314:
[   28.648776]  kasan_save_stack+0x45/0x70
[   28.648997]  kasan_save_track+0x18/0x40
[   28.649203]  kasan_save_alloc_info+0x3b/0x50
[   28.649453]  __kasan_kmalloc+0xb7/0xc0
[   28.649658]  __kmalloc_cache_noprof+0x189/0x420
[   28.649896]  kasan_atomics+0x95/0x310
[   28.650091]  kunit_try_run_case+0x1a5/0x480
[   28.650294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.650543]  kthread+0x337/0x6f0
[   28.650729]  ret_from_fork+0x116/0x1d0
[   28.650924]  ret_from_fork_asm+0x1a/0x30
[   28.651092] 
[   28.651195] The buggy address belongs to the object at ffff88810625b900
[   28.651195]  which belongs to the cache kmalloc-64 of size 64
[   28.651600] The buggy address is located 0 bytes to the right of
[   28.651600]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.652153] 
[   28.652268] The buggy address belongs to the physical page:
[   28.652557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.652962] flags: 0x200000000000000(node=0|zone=2)
[   28.653226] page_type: f5(slab)
[   28.653426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.653759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.654125] page dumped because: kasan: bad access detected
[   28.654363] 
[   28.654459] Memory state around the buggy address:
[   28.654624]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.654854]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.655215] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.655568]                                      ^
[   28.655805]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.656171]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.656415] ==================================================================
[   28.042863] ==================================================================
[   28.043250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   28.043758] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.044255] 
[   28.044378] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.044693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.044715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.044743] Call Trace:
[   28.044784]  <TASK>
[   28.044810]  dump_stack_lvl+0x73/0xb0
[   28.044845]  print_report+0xd1/0x650
[   28.044872]  ? __virt_addr_valid+0x1db/0x2d0
[   28.044902]  ? kasan_atomics_helper+0x992/0x5450
[   28.044930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.044960]  ? kasan_atomics_helper+0x992/0x5450
[   28.044989]  kasan_report+0x141/0x180
[   28.045026]  ? kasan_atomics_helper+0x992/0x5450
[   28.045059]  kasan_check_range+0x10c/0x1c0
[   28.045099]  __kasan_check_write+0x18/0x20
[   28.045125]  kasan_atomics_helper+0x992/0x5450
[   28.045155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.045185]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.045213]  ? kasan_atomics+0x152/0x310
[   28.045243]  kasan_atomics+0x1dc/0x310
[   28.045269]  ? __pfx_kasan_atomics+0x10/0x10
[   28.045297]  ? __pfx_read_tsc+0x10/0x10
[   28.045323]  ? ktime_get_ts64+0x86/0x230
[   28.045353]  kunit_try_run_case+0x1a5/0x480
[   28.045384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.045421]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.045450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.045479]  ? __kthread_parkme+0x82/0x180
[   28.045514]  ? preempt_count_sub+0x50/0x80
[   28.045542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.045578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.045608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.045637]  kthread+0x337/0x6f0
[   28.045661]  ? trace_preempt_on+0x20/0xc0
[   28.045688]  ? __pfx_kthread+0x10/0x10
[   28.045714]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.045740]  ? calculate_sigpending+0x7b/0xa0
[   28.045768]  ? __pfx_kthread+0x10/0x10
[   28.045803]  ret_from_fork+0x116/0x1d0
[   28.045826]  ? __pfx_kthread+0x10/0x10
[   28.045850]  ret_from_fork_asm+0x1a/0x30
[   28.045887]  </TASK>
[   28.045902] 
[   28.055544] Allocated by task 314:
[   28.055713]  kasan_save_stack+0x45/0x70
[   28.056007]  kasan_save_track+0x18/0x40
[   28.056214]  kasan_save_alloc_info+0x3b/0x50
[   28.056669]  __kasan_kmalloc+0xb7/0xc0
[   28.056825]  __kmalloc_cache_noprof+0x189/0x420
[   28.057025]  kasan_atomics+0x95/0x310
[   28.057358]  kunit_try_run_case+0x1a5/0x480
[   28.057994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.058210]  kthread+0x337/0x6f0
[   28.058452]  ret_from_fork+0x116/0x1d0
[   28.058657]  ret_from_fork_asm+0x1a/0x30
[   28.058869] 
[   28.059029] The buggy address belongs to the object at ffff88810625b900
[   28.059029]  which belongs to the cache kmalloc-64 of size 64
[   28.059568] The buggy address is located 0 bytes to the right of
[   28.059568]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.060020] 
[   28.060127] The buggy address belongs to the physical page:
[   28.060548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.061116] flags: 0x200000000000000(node=0|zone=2)
[   28.061671] page_type: f5(slab)
[   28.061826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.062451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.062708] page dumped because: kasan: bad access detected
[   28.063116] 
[   28.063343] Memory state around the buggy address:
[   28.063645]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.064008]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.064535] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.064881]                                      ^
[   28.065304]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.065799]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.066161] ==================================================================
[   27.963101] ==================================================================
[   27.963581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   27.964246] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.964526] 
[   27.964630] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.964691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.964708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.964737] Call Trace:
[   27.964760]  <TASK>
[   27.964783]  dump_stack_lvl+0x73/0xb0
[   27.964816]  print_report+0xd1/0x650
[   27.964843]  ? __virt_addr_valid+0x1db/0x2d0
[   27.964873]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.964919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.964952]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.964983]  kasan_report+0x141/0x180
[   27.965010]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.965046]  kasan_check_range+0x10c/0x1c0
[   27.965074]  __kasan_check_write+0x18/0x20
[   27.965103]  kasan_atomics_helper+0x7c7/0x5450
[   27.965135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.965166]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.965196]  ? kasan_atomics+0x152/0x310
[   27.965228]  kasan_atomics+0x1dc/0x310
[   27.965255]  ? __pfx_kasan_atomics+0x10/0x10
[   27.965285]  ? __pfx_read_tsc+0x10/0x10
[   27.965312]  ? ktime_get_ts64+0x86/0x230
[   27.965342]  kunit_try_run_case+0x1a5/0x480
[   27.965373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.965414]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.965443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.965473]  ? __kthread_parkme+0x82/0x180
[   27.965500]  ? preempt_count_sub+0x50/0x80
[   27.965528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.965559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.965590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.965619]  kthread+0x337/0x6f0
[   27.965644]  ? trace_preempt_on+0x20/0xc0
[   27.965672]  ? __pfx_kthread+0x10/0x10
[   27.965699]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.965726]  ? calculate_sigpending+0x7b/0xa0
[   27.965756]  ? __pfx_kthread+0x10/0x10
[   27.965783]  ret_from_fork+0x116/0x1d0
[   27.965807]  ? __pfx_kthread+0x10/0x10
[   27.965833]  ret_from_fork_asm+0x1a/0x30
[   27.965870]  </TASK>
[   27.965886] 
[   27.976168] Allocated by task 314:
[   27.976376]  kasan_save_stack+0x45/0x70
[   27.976668]  kasan_save_track+0x18/0x40
[   27.976870]  kasan_save_alloc_info+0x3b/0x50
[   27.977138]  __kasan_kmalloc+0xb7/0xc0
[   27.977411]  __kmalloc_cache_noprof+0x189/0x420
[   27.977650]  kasan_atomics+0x95/0x310
[   27.977905]  kunit_try_run_case+0x1a5/0x480
[   27.978139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.978412]  kthread+0x337/0x6f0
[   27.978546]  ret_from_fork+0x116/0x1d0
[   27.979041]  ret_from_fork_asm+0x1a/0x30
[   27.979477] 
[   27.979585] The buggy address belongs to the object at ffff88810625b900
[   27.979585]  which belongs to the cache kmalloc-64 of size 64
[   27.980245] The buggy address is located 0 bytes to the right of
[   27.980245]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.980867] 
[   27.980984] The buggy address belongs to the physical page:
[   27.981537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.981815] flags: 0x200000000000000(node=0|zone=2)
[   27.982547] page_type: f5(slab)
[   27.982757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.983318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.983614] page dumped because: kasan: bad access detected
[   27.983873] 
[   27.983981] Memory state around the buggy address:
[   27.984429]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.984845]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.985287] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.985551]                                      ^
[   27.985833]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.986497]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.987173] ==================================================================
[   27.896590] ==================================================================
[   27.896954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   27.897345] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.897695] 
[   27.897826] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.897895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.897910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.897937] Call Trace:
[   27.897960]  <TASK>
[   27.897983]  dump_stack_lvl+0x73/0xb0
[   27.898014]  print_report+0xd1/0x650
[   27.898040]  ? __virt_addr_valid+0x1db/0x2d0
[   27.898068]  ? kasan_atomics_helper+0x697/0x5450
[   27.898096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.898125]  ? kasan_atomics_helper+0x697/0x5450
[   27.898153]  kasan_report+0x141/0x180
[   27.898178]  ? kasan_atomics_helper+0x697/0x5450
[   27.898210]  kasan_check_range+0x10c/0x1c0
[   27.898237]  __kasan_check_write+0x18/0x20
[   27.898263]  kasan_atomics_helper+0x697/0x5450
[   27.898303]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.898331]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.898371]  ? kasan_atomics+0x152/0x310
[   27.898408]  kasan_atomics+0x1dc/0x310
[   27.898432]  ? __pfx_kasan_atomics+0x10/0x10
[   27.898459]  ? __pfx_read_tsc+0x10/0x10
[   27.898484]  ? ktime_get_ts64+0x86/0x230
[   27.898512]  kunit_try_run_case+0x1a5/0x480
[   27.898540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.898566]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.898595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.898622]  ? __kthread_parkme+0x82/0x180
[   27.898646]  ? preempt_count_sub+0x50/0x80
[   27.898673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.898756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.898786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.898814]  kthread+0x337/0x6f0
[   27.898836]  ? trace_preempt_on+0x20/0xc0
[   27.898864]  ? __pfx_kthread+0x10/0x10
[   27.898904]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.898930]  ? calculate_sigpending+0x7b/0xa0
[   27.898969]  ? __pfx_kthread+0x10/0x10
[   27.898994]  ret_from_fork+0x116/0x1d0
[   27.899016]  ? __pfx_kthread+0x10/0x10
[   27.899040]  ret_from_fork_asm+0x1a/0x30
[   27.899075]  </TASK>
[   27.899090] 
[   27.919806] Allocated by task 314:
[   27.920635]  kasan_save_stack+0x45/0x70
[   27.921381]  kasan_save_track+0x18/0x40
[   27.921940]  kasan_save_alloc_info+0x3b/0x50
[   27.922669]  __kasan_kmalloc+0xb7/0xc0
[   27.923373]  __kmalloc_cache_noprof+0x189/0x420
[   27.923969]  kasan_atomics+0x95/0x310
[   27.924356]  kunit_try_run_case+0x1a5/0x480
[   27.924820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.925595]  kthread+0x337/0x6f0
[   27.925737]  ret_from_fork+0x116/0x1d0
[   27.925877]  ret_from_fork_asm+0x1a/0x30
[   27.926021] 
[   27.926097] The buggy address belongs to the object at ffff88810625b900
[   27.926097]  which belongs to the cache kmalloc-64 of size 64
[   27.927346] The buggy address is located 0 bytes to the right of
[   27.927346]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.928854] 
[   27.929107] The buggy address belongs to the physical page:
[   27.929719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.930448] flags: 0x200000000000000(node=0|zone=2)
[   27.930634] page_type: f5(slab)
[   27.930764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.931278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.932135] page dumped because: kasan: bad access detected
[   27.932869] 
[   27.933059] Memory state around the buggy address:
[   27.933665]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.934465]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.934734] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.934997]                                      ^
[   27.935521]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.936182]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.937036] ==================================================================
[   29.102604] ==================================================================
[   29.102941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   29.103291] Read of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.103691] 
[   29.103812] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.103870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.103884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.103910] Call Trace:
[   29.103934]  <TASK>
[   29.103958]  dump_stack_lvl+0x73/0xb0
[   29.103990]  print_report+0xd1/0x650
[   29.104029]  ? __virt_addr_valid+0x1db/0x2d0
[   29.104058]  ? kasan_atomics_helper+0x4f71/0x5450
[   29.104098]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.104128]  ? kasan_atomics_helper+0x4f71/0x5450
[   29.104157]  kasan_report+0x141/0x180
[   29.104183]  ? kasan_atomics_helper+0x4f71/0x5450
[   29.104217]  __asan_report_load8_noabort+0x18/0x20
[   29.104252]  kasan_atomics_helper+0x4f71/0x5450
[   29.104282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.104321]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.104349]  ? kasan_atomics+0x152/0x310
[   29.104407]  kasan_atomics+0x1dc/0x310
[   29.104434]  ? __pfx_kasan_atomics+0x10/0x10
[   29.104471]  ? __pfx_read_tsc+0x10/0x10
[   29.104497]  ? ktime_get_ts64+0x86/0x230
[   29.104526]  kunit_try_run_case+0x1a5/0x480
[   29.104555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.104582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.104609]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.104638]  ? __kthread_parkme+0x82/0x180
[   29.104661]  ? preempt_count_sub+0x50/0x80
[   29.104689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.104717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.104744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.104782]  kthread+0x337/0x6f0
[   29.104805]  ? trace_preempt_on+0x20/0xc0
[   29.104845]  ? __pfx_kthread+0x10/0x10
[   29.104868]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.104905]  ? calculate_sigpending+0x7b/0xa0
[   29.104932]  ? __pfx_kthread+0x10/0x10
[   29.104957]  ret_from_fork+0x116/0x1d0
[   29.104989]  ? __pfx_kthread+0x10/0x10
[   29.105013]  ret_from_fork_asm+0x1a/0x30
[   29.105059]  </TASK>
[   29.105074] 
[   29.112469] Allocated by task 314:
[   29.112840]  kasan_save_stack+0x45/0x70
[   29.113060]  kasan_save_track+0x18/0x40
[   29.113288]  kasan_save_alloc_info+0x3b/0x50
[   29.113537]  __kasan_kmalloc+0xb7/0xc0
[   29.113761]  __kmalloc_cache_noprof+0x189/0x420
[   29.114175]  kasan_atomics+0x95/0x310
[   29.114404]  kunit_try_run_case+0x1a5/0x480
[   29.114614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.114888]  kthread+0x337/0x6f0
[   29.115039]  ret_from_fork+0x116/0x1d0
[   29.115172]  ret_from_fork_asm+0x1a/0x30
[   29.115326] 
[   29.115434] The buggy address belongs to the object at ffff88810625b900
[   29.115434]  which belongs to the cache kmalloc-64 of size 64
[   29.116017] The buggy address is located 0 bytes to the right of
[   29.116017]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.116574] 
[   29.116676] The buggy address belongs to the physical page:
[   29.116970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.117288] flags: 0x200000000000000(node=0|zone=2)
[   29.117526] page_type: f5(slab)
[   29.117649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.117876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.118097] page dumped because: kasan: bad access detected
[   29.118339] 
[   29.118439] Memory state around the buggy address:
[   29.118666]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.118989]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.119307] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.119788]                                      ^
[   29.119946]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.120166]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.120510] ==================================================================
[   29.185991] ==================================================================
[   29.186695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   29.187201] Read of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.187551] 
[   29.187648] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.187705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.187721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.187747] Call Trace:
[   29.187770]  <TASK>
[   29.187794]  dump_stack_lvl+0x73/0xb0
[   29.187825]  print_report+0xd1/0x650
[   29.187852]  ? __virt_addr_valid+0x1db/0x2d0
[   29.187880]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.187908]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.187973]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.188021]  kasan_report+0x141/0x180
[   29.188060]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.188131]  __asan_report_load8_noabort+0x18/0x20
[   29.188188]  kasan_atomics_helper+0x4fb2/0x5450
[   29.188253]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.188282]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.188348]  ? kasan_atomics+0x152/0x310
[   29.188414]  kasan_atomics+0x1dc/0x310
[   29.188468]  ? __pfx_kasan_atomics+0x10/0x10
[   29.188513]  ? __pfx_read_tsc+0x10/0x10
[   29.188577]  ? ktime_get_ts64+0x86/0x230
[   29.188606]  kunit_try_run_case+0x1a5/0x480
[   29.188649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.188676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.188706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.188735]  ? __kthread_parkme+0x82/0x180
[   29.188759]  ? preempt_count_sub+0x50/0x80
[   29.188787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.188816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.188845]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.188874]  kthread+0x337/0x6f0
[   29.188897]  ? trace_preempt_on+0x20/0xc0
[   29.188926]  ? __pfx_kthread+0x10/0x10
[   29.188951]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.188977]  ? calculate_sigpending+0x7b/0xa0
[   29.189006]  ? __pfx_kthread+0x10/0x10
[   29.189031]  ret_from_fork+0x116/0x1d0
[   29.189053]  ? __pfx_kthread+0x10/0x10
[   29.189078]  ret_from_fork_asm+0x1a/0x30
[   29.189114]  </TASK>
[   29.189128] 
[   29.198000] Allocated by task 314:
[   29.198183]  kasan_save_stack+0x45/0x70
[   29.198338]  kasan_save_track+0x18/0x40
[   29.198494]  kasan_save_alloc_info+0x3b/0x50
[   29.198645]  __kasan_kmalloc+0xb7/0xc0
[   29.198785]  __kmalloc_cache_noprof+0x189/0x420
[   29.199120]  kasan_atomics+0x95/0x310
[   29.199323]  kunit_try_run_case+0x1a5/0x480
[   29.199549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.199886]  kthread+0x337/0x6f0
[   29.200044]  ret_from_fork+0x116/0x1d0
[   29.200213]  ret_from_fork_asm+0x1a/0x30
[   29.200486] 
[   29.200629] The buggy address belongs to the object at ffff88810625b900
[   29.200629]  which belongs to the cache kmalloc-64 of size 64
[   29.201165] The buggy address is located 0 bytes to the right of
[   29.201165]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.201763] 
[   29.201914] The buggy address belongs to the physical page:
[   29.202177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.202575] flags: 0x200000000000000(node=0|zone=2)
[   29.202910] page_type: f5(slab)
[   29.203092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.203464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.203802] page dumped because: kasan: bad access detected
[   29.204142] 
[   29.204215] Memory state around the buggy address:
[   29.204522]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.204892]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.205216] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.205600]                                      ^
[   29.205847]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.206212]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.206542] ==================================================================
[   27.631752] ==================================================================
[   27.632318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   27.632792] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.633191] 
[   27.633441] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.633500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.633516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.633542] Call Trace:
[   27.633558]  <TASK>
[   27.633581]  dump_stack_lvl+0x73/0xb0
[   27.633614]  print_report+0xd1/0x650
[   27.633639]  ? __virt_addr_valid+0x1db/0x2d0
[   27.633667]  ? kasan_atomics_helper+0x4ba2/0x5450
[   27.633695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.633724]  ? kasan_atomics_helper+0x4ba2/0x5450
[   27.633753]  kasan_report+0x141/0x180
[   27.633778]  ? kasan_atomics_helper+0x4ba2/0x5450
[   27.633810]  __asan_report_store4_noabort+0x1b/0x30
[   27.633837]  kasan_atomics_helper+0x4ba2/0x5450
[   27.633867]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.633894]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.633923]  ? kasan_atomics+0x152/0x310
[   27.633953]  kasan_atomics+0x1dc/0x310
[   27.633978]  ? __pfx_kasan_atomics+0x10/0x10
[   27.634004]  ? __pfx_read_tsc+0x10/0x10
[   27.634029]  ? ktime_get_ts64+0x86/0x230
[   27.634058]  kunit_try_run_case+0x1a5/0x480
[   27.634087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.634113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.634142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.634193]  ? __kthread_parkme+0x82/0x180
[   27.634218]  ? preempt_count_sub+0x50/0x80
[   27.634245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.634273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.634301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.634329]  kthread+0x337/0x6f0
[   27.634351]  ? trace_preempt_on+0x20/0xc0
[   27.634378]  ? __pfx_kthread+0x10/0x10
[   27.634413]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.634438]  ? calculate_sigpending+0x7b/0xa0
[   27.634467]  ? __pfx_kthread+0x10/0x10
[   27.634492]  ret_from_fork+0x116/0x1d0
[   27.634513]  ? __pfx_kthread+0x10/0x10
[   27.634537]  ret_from_fork_asm+0x1a/0x30
[   27.634572]  </TASK>
[   27.634585] 
[   27.652865] Allocated by task 314:
[   27.653082]  kasan_save_stack+0x45/0x70
[   27.653710]  kasan_save_track+0x18/0x40
[   27.654313]  kasan_save_alloc_info+0x3b/0x50
[   27.654565]  __kasan_kmalloc+0xb7/0xc0
[   27.654766]  __kmalloc_cache_noprof+0x189/0x420
[   27.655610]  kasan_atomics+0x95/0x310
[   27.655889]  kunit_try_run_case+0x1a5/0x480
[   27.656553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.656988]  kthread+0x337/0x6f0
[   27.657308]  ret_from_fork+0x116/0x1d0
[   27.657758]  ret_from_fork_asm+0x1a/0x30
[   27.658245] 
[   27.658352] The buggy address belongs to the object at ffff88810625b900
[   27.658352]  which belongs to the cache kmalloc-64 of size 64
[   27.659367] The buggy address is located 0 bytes to the right of
[   27.659367]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.660560] 
[   27.660681] The buggy address belongs to the physical page:
[   27.661140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.661755] flags: 0x200000000000000(node=0|zone=2)
[   27.662363] page_type: f5(slab)
[   27.662631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.663511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.663856] page dumped because: kasan: bad access detected
[   27.664102] 
[   27.664592] Memory state around the buggy address:
[   27.664915]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.665646]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.666220] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.666552]                                      ^
[   27.666773]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.667426]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.668503] ==================================================================
[   28.439501] ==================================================================
[   28.439882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   28.440320] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.440714] 
[   28.440933] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.440993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.441011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.441038] Call Trace:
[   28.441063]  <TASK>
[   28.441088]  dump_stack_lvl+0x73/0xb0
[   28.441123]  print_report+0xd1/0x650
[   28.441151]  ? __virt_addr_valid+0x1db/0x2d0
[   28.441180]  ? kasan_atomics_helper+0x1148/0x5450
[   28.441210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.441240]  ? kasan_atomics_helper+0x1148/0x5450
[   28.441271]  kasan_report+0x141/0x180
[   28.441297]  ? kasan_atomics_helper+0x1148/0x5450
[   28.441333]  kasan_check_range+0x10c/0x1c0
[   28.441361]  __kasan_check_write+0x18/0x20
[   28.441388]  kasan_atomics_helper+0x1148/0x5450
[   28.441448]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.441478]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.441508]  ? kasan_atomics+0x152/0x310
[   28.441539]  kasan_atomics+0x1dc/0x310
[   28.441565]  ? __pfx_kasan_atomics+0x10/0x10
[   28.441593]  ? __pfx_read_tsc+0x10/0x10
[   28.441620]  ? ktime_get_ts64+0x86/0x230
[   28.441650]  kunit_try_run_case+0x1a5/0x480
[   28.441681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.441709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.441738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.441767]  ? __kthread_parkme+0x82/0x180
[   28.441793]  ? preempt_count_sub+0x50/0x80
[   28.441823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.441854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.441893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.441923]  kthread+0x337/0x6f0
[   28.441948]  ? trace_preempt_on+0x20/0xc0
[   28.441976]  ? __pfx_kthread+0x10/0x10
[   28.442003]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.442031]  ? calculate_sigpending+0x7b/0xa0
[   28.442061]  ? __pfx_kthread+0x10/0x10
[   28.442088]  ret_from_fork+0x116/0x1d0
[   28.442112]  ? __pfx_kthread+0x10/0x10
[   28.442136]  ret_from_fork_asm+0x1a/0x30
[   28.442175]  </TASK>
[   28.442190] 
[   28.453792] Allocated by task 314:
[   28.454120]  kasan_save_stack+0x45/0x70
[   28.454337]  kasan_save_track+0x18/0x40
[   28.454537]  kasan_save_alloc_info+0x3b/0x50
[   28.454701]  __kasan_kmalloc+0xb7/0xc0
[   28.454849]  __kmalloc_cache_noprof+0x189/0x420
[   28.455018]  kasan_atomics+0x95/0x310
[   28.455206]  kunit_try_run_case+0x1a5/0x480
[   28.455469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.455748]  kthread+0x337/0x6f0
[   28.455941]  ret_from_fork+0x116/0x1d0
[   28.456115]  ret_from_fork_asm+0x1a/0x30
[   28.456312] 
[   28.456431] The buggy address belongs to the object at ffff88810625b900
[   28.456431]  which belongs to the cache kmalloc-64 of size 64
[   28.456835] The buggy address is located 0 bytes to the right of
[   28.456835]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.457478] 
[   28.457589] The buggy address belongs to the physical page:
[   28.457822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.458234] flags: 0x200000000000000(node=0|zone=2)
[   28.458490] page_type: f5(slab)
[   28.458669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.459060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.459400] page dumped because: kasan: bad access detected
[   28.459646] 
[   28.459724] Memory state around the buggy address:
[   28.459925]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.460282]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.460580] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.460843]                                      ^
[   28.461290]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.461623]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.461924] ==================================================================
[   28.236631] ==================================================================
[   28.237387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   28.238425] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.239310] 
[   28.239876] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.239942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.239958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.239985] Call Trace:
[   28.240004]  <TASK>
[   28.240028]  dump_stack_lvl+0x73/0xb0
[   28.240062]  print_report+0xd1/0x650
[   28.240090]  ? __virt_addr_valid+0x1db/0x2d0
[   28.240136]  ? kasan_atomics_helper+0xde0/0x5450
[   28.240165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.240234]  ? kasan_atomics_helper+0xde0/0x5450
[   28.240264]  kasan_report+0x141/0x180
[   28.240290]  ? kasan_atomics_helper+0xde0/0x5450
[   28.240324]  kasan_check_range+0x10c/0x1c0
[   28.240351]  __kasan_check_write+0x18/0x20
[   28.240378]  kasan_atomics_helper+0xde0/0x5450
[   28.240419]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.240449]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.240478]  ? kasan_atomics+0x152/0x310
[   28.240508]  kasan_atomics+0x1dc/0x310
[   28.240534]  ? __pfx_kasan_atomics+0x10/0x10
[   28.240561]  ? __pfx_read_tsc+0x10/0x10
[   28.240588]  ? ktime_get_ts64+0x86/0x230
[   28.240617]  kunit_try_run_case+0x1a5/0x480
[   28.240648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.240675]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.240705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.240733]  ? __kthread_parkme+0x82/0x180
[   28.240758]  ? preempt_count_sub+0x50/0x80
[   28.240786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.240818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.240847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.240876]  kthread+0x337/0x6f0
[   28.240962]  ? trace_preempt_on+0x20/0xc0
[   28.240993]  ? __pfx_kthread+0x10/0x10
[   28.241018]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.241045]  ? calculate_sigpending+0x7b/0xa0
[   28.241074]  ? __pfx_kthread+0x10/0x10
[   28.241101]  ret_from_fork+0x116/0x1d0
[   28.241125]  ? __pfx_kthread+0x10/0x10
[   28.241213]  ret_from_fork_asm+0x1a/0x30
[   28.241255]  </TASK>
[   28.241270] 
[   28.253610] Allocated by task 314:
[   28.253826]  kasan_save_stack+0x45/0x70
[   28.254259]  kasan_save_track+0x18/0x40
[   28.254652]  kasan_save_alloc_info+0x3b/0x50
[   28.255146]  __kasan_kmalloc+0xb7/0xc0
[   28.255541]  __kmalloc_cache_noprof+0x189/0x420
[   28.256014]  kasan_atomics+0x95/0x310
[   28.256405]  kunit_try_run_case+0x1a5/0x480
[   28.256904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.257168]  kthread+0x337/0x6f0
[   28.257299]  ret_from_fork+0x116/0x1d0
[   28.257471]  ret_from_fork_asm+0x1a/0x30
[   28.257810] 
[   28.258023] The buggy address belongs to the object at ffff88810625b900
[   28.258023]  which belongs to the cache kmalloc-64 of size 64
[   28.259311] The buggy address is located 0 bytes to the right of
[   28.259311]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.260596] 
[   28.260794] The buggy address belongs to the physical page:
[   28.261172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.261462] flags: 0x200000000000000(node=0|zone=2)
[   28.261718] page_type: f5(slab)
[   28.261985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.262725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.263037] page dumped because: kasan: bad access detected
[   28.263622] 
[   28.263789] Memory state around the buggy address:
[   28.264339]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.264952]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.265198] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.265808]                                      ^
[   28.266289]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.266681]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.267304] ==================================================================
[   28.089729] ==================================================================
[   28.090470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   28.090904] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.091371] 
[   28.091525] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.091595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.091612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.091638] Call Trace:
[   28.091661]  <TASK>
[   28.091685]  dump_stack_lvl+0x73/0xb0
[   28.091720]  print_report+0xd1/0x650
[   28.091746]  ? __virt_addr_valid+0x1db/0x2d0
[   28.091775]  ? kasan_atomics_helper+0xac7/0x5450
[   28.091804]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.091834]  ? kasan_atomics_helper+0xac7/0x5450
[   28.091863]  kasan_report+0x141/0x180
[   28.091888]  ? kasan_atomics_helper+0xac7/0x5450
[   28.091921]  kasan_check_range+0x10c/0x1c0
[   28.091959]  __kasan_check_write+0x18/0x20
[   28.091986]  kasan_atomics_helper+0xac7/0x5450
[   28.092028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.092057]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.092086]  ? kasan_atomics+0x152/0x310
[   28.092126]  kasan_atomics+0x1dc/0x310
[   28.092152]  ? __pfx_kasan_atomics+0x10/0x10
[   28.092180]  ? __pfx_read_tsc+0x10/0x10
[   28.092440]  ? ktime_get_ts64+0x86/0x230
[   28.092485]  kunit_try_run_case+0x1a5/0x480
[   28.092517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.092545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.092574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.092604]  ? __kthread_parkme+0x82/0x180
[   28.092629]  ? preempt_count_sub+0x50/0x80
[   28.092657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.092687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.092717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.092745]  kthread+0x337/0x6f0
[   28.092770]  ? trace_preempt_on+0x20/0xc0
[   28.092800]  ? __pfx_kthread+0x10/0x10
[   28.092825]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.092851]  ? calculate_sigpending+0x7b/0xa0
[   28.092880]  ? __pfx_kthread+0x10/0x10
[   28.092905]  ret_from_fork+0x116/0x1d0
[   28.092943]  ? __pfx_kthread+0x10/0x10
[   28.092968]  ret_from_fork_asm+0x1a/0x30
[   28.093019]  </TASK>
[   28.093034] 
[   28.102606] Allocated by task 314:
[   28.102758]  kasan_save_stack+0x45/0x70
[   28.102918]  kasan_save_track+0x18/0x40
[   28.103126]  kasan_save_alloc_info+0x3b/0x50
[   28.103476]  __kasan_kmalloc+0xb7/0xc0
[   28.103735]  __kmalloc_cache_noprof+0x189/0x420
[   28.104242]  kasan_atomics+0x95/0x310
[   28.104606]  kunit_try_run_case+0x1a5/0x480
[   28.104818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.105225]  kthread+0x337/0x6f0
[   28.105464]  ret_from_fork+0x116/0x1d0
[   28.105705]  ret_from_fork_asm+0x1a/0x30
[   28.105855] 
[   28.105930] The buggy address belongs to the object at ffff88810625b900
[   28.105930]  which belongs to the cache kmalloc-64 of size 64
[   28.106988] The buggy address is located 0 bytes to the right of
[   28.106988]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.107998] 
[   28.108126] The buggy address belongs to the physical page:
[   28.108998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.109468] flags: 0x200000000000000(node=0|zone=2)
[   28.109723] page_type: f5(slab)
[   28.110355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.110735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.111568] page dumped because: kasan: bad access detected
[   28.112009] 
[   28.112112] Memory state around the buggy address:
[   28.112630]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.112903]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.113239] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.113686]                                      ^
[   28.114025]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.114609]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.114957] ==================================================================
[   28.395103] ==================================================================
[   28.395511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   28.395946] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.396375] 
[   28.396512] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.396572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.396588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.396619] Call Trace:
[   28.396643]  <TASK>
[   28.396664]  dump_stack_lvl+0x73/0xb0
[   28.396698]  print_report+0xd1/0x650
[   28.396728]  ? __virt_addr_valid+0x1db/0x2d0
[   28.396760]  ? kasan_atomics_helper+0x1079/0x5450
[   28.396792]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.396824]  ? kasan_atomics_helper+0x1079/0x5450
[   28.396858]  kasan_report+0x141/0x180
[   28.396897]  ? kasan_atomics_helper+0x1079/0x5450
[   28.396934]  kasan_check_range+0x10c/0x1c0
[   28.396964]  __kasan_check_write+0x18/0x20
[   28.396993]  kasan_atomics_helper+0x1079/0x5450
[   28.397024]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.397056]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.397086]  ? kasan_atomics+0x152/0x310
[   28.397118]  kasan_atomics+0x1dc/0x310
[   28.397146]  ? __pfx_kasan_atomics+0x10/0x10
[   28.397175]  ? __pfx_read_tsc+0x10/0x10
[   28.397202]  ? ktime_get_ts64+0x86/0x230
[   28.397232]  kunit_try_run_case+0x1a5/0x480
[   28.397264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.397293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.397323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.397355]  ? __kthread_parkme+0x82/0x180
[   28.397381]  ? preempt_count_sub+0x50/0x80
[   28.397424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.397455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.397485]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.397517]  kthread+0x337/0x6f0
[   28.397543]  ? trace_preempt_on+0x20/0xc0
[   28.397575]  ? __pfx_kthread+0x10/0x10
[   28.397602]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.397630]  ? calculate_sigpending+0x7b/0xa0
[   28.397661]  ? __pfx_kthread+0x10/0x10
[   28.397688]  ret_from_fork+0x116/0x1d0
[   28.397713]  ? __pfx_kthread+0x10/0x10
[   28.397739]  ret_from_fork_asm+0x1a/0x30
[   28.397778]  </TASK>
[   28.397794] 
[   28.406162] Allocated by task 314:
[   28.406360]  kasan_save_stack+0x45/0x70
[   28.406590]  kasan_save_track+0x18/0x40
[   28.406811]  kasan_save_alloc_info+0x3b/0x50
[   28.407039]  __kasan_kmalloc+0xb7/0xc0
[   28.407247]  __kmalloc_cache_noprof+0x189/0x420
[   28.407430]  kasan_atomics+0x95/0x310
[   28.407578]  kunit_try_run_case+0x1a5/0x480
[   28.407740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.408133]  kthread+0x337/0x6f0
[   28.408322]  ret_from_fork+0x116/0x1d0
[   28.408545]  ret_from_fork_asm+0x1a/0x30
[   28.408765] 
[   28.408873] The buggy address belongs to the object at ffff88810625b900
[   28.408873]  which belongs to the cache kmalloc-64 of size 64
[   28.409564] The buggy address is located 0 bytes to the right of
[   28.409564]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.410105] 
[   28.410187] The buggy address belongs to the physical page:
[   28.410469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.410843] flags: 0x200000000000000(node=0|zone=2)
[   28.411049] page_type: f5(slab)
[   28.411186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.411459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.411760] page dumped because: kasan: bad access detected
[   28.412040] 
[   28.412152] Memory state around the buggy address:
[   28.412416]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.412771]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.413104] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.413341]                                      ^
[   28.413521]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.413762]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.414511] ==================================================================
[   28.140905] ==================================================================
[   28.141423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   28.141818] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.142147] 
[   28.142422] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.142487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.142504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.142533] Call Trace:
[   28.142558]  <TASK>
[   28.142585]  dump_stack_lvl+0x73/0xb0
[   28.142620]  print_report+0xd1/0x650
[   28.142647]  ? __virt_addr_valid+0x1db/0x2d0
[   28.142677]  ? kasan_atomics_helper+0xc70/0x5450
[   28.142706]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.142737]  ? kasan_atomics_helper+0xc70/0x5450
[   28.142768]  kasan_report+0x141/0x180
[   28.142795]  ? kasan_atomics_helper+0xc70/0x5450
[   28.142843]  kasan_check_range+0x10c/0x1c0
[   28.142872]  __kasan_check_write+0x18/0x20
[   28.142913]  kasan_atomics_helper+0xc70/0x5450
[   28.142945]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.142975]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.143005]  ? kasan_atomics+0x152/0x310
[   28.143037]  kasan_atomics+0x1dc/0x310
[   28.143064]  ? __pfx_kasan_atomics+0x10/0x10
[   28.143093]  ? __pfx_read_tsc+0x10/0x10
[   28.143120]  ? ktime_get_ts64+0x86/0x230
[   28.143150]  kunit_try_run_case+0x1a5/0x480
[   28.143182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.143223]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.143253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.143283]  ? __kthread_parkme+0x82/0x180
[   28.143309]  ? preempt_count_sub+0x50/0x80
[   28.143412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.143447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.143489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.143519]  kthread+0x337/0x6f0
[   28.143557]  ? trace_preempt_on+0x20/0xc0
[   28.143586]  ? __pfx_kthread+0x10/0x10
[   28.143613]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.143640]  ? calculate_sigpending+0x7b/0xa0
[   28.143670]  ? __pfx_kthread+0x10/0x10
[   28.143697]  ret_from_fork+0x116/0x1d0
[   28.143722]  ? __pfx_kthread+0x10/0x10
[   28.143748]  ret_from_fork_asm+0x1a/0x30
[   28.143785]  </TASK>
[   28.143800] 
[   28.153447] Allocated by task 314:
[   28.153701]  kasan_save_stack+0x45/0x70
[   28.153884]  kasan_save_track+0x18/0x40
[   28.154297]  kasan_save_alloc_info+0x3b/0x50
[   28.154788]  __kasan_kmalloc+0xb7/0xc0
[   28.155217]  __kmalloc_cache_noprof+0x189/0x420
[   28.155456]  kasan_atomics+0x95/0x310
[   28.155674]  kunit_try_run_case+0x1a5/0x480
[   28.156036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.156465]  kthread+0x337/0x6f0
[   28.156692]  ret_from_fork+0x116/0x1d0
[   28.156879]  ret_from_fork_asm+0x1a/0x30
[   28.157111] 
[   28.157298] The buggy address belongs to the object at ffff88810625b900
[   28.157298]  which belongs to the cache kmalloc-64 of size 64
[   28.158460] The buggy address is located 0 bytes to the right of
[   28.158460]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.159020] 
[   28.159132] The buggy address belongs to the physical page:
[   28.159370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.159656] flags: 0x200000000000000(node=0|zone=2)
[   28.160036] page_type: f5(slab)
[   28.160418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.160826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.161672] page dumped because: kasan: bad access detected
[   28.161880] 
[   28.161993] Memory state around the buggy address:
[   28.162735]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.163114]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.163998] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.165135]                                      ^
[   28.165341]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.165610]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.165855] ==================================================================
[   27.938039] ==================================================================
[   27.938516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   27.938781] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.939276] 
[   27.939383] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.939456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.939472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.939500] Call Trace:
[   27.939523]  <TASK>
[   27.939548]  dump_stack_lvl+0x73/0xb0
[   27.939580]  print_report+0xd1/0x650
[   27.939608]  ? __virt_addr_valid+0x1db/0x2d0
[   27.939636]  ? kasan_atomics_helper+0x72f/0x5450
[   27.939664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.939694]  ? kasan_atomics_helper+0x72f/0x5450
[   27.939723]  kasan_report+0x141/0x180
[   27.939749]  ? kasan_atomics_helper+0x72f/0x5450
[   27.939783]  kasan_check_range+0x10c/0x1c0
[   27.939812]  __kasan_check_write+0x18/0x20
[   27.939838]  kasan_atomics_helper+0x72f/0x5450
[   27.939868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.939908]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.939937]  ? kasan_atomics+0x152/0x310
[   27.939968]  kasan_atomics+0x1dc/0x310
[   27.939994]  ? __pfx_kasan_atomics+0x10/0x10
[   27.940022]  ? __pfx_read_tsc+0x10/0x10
[   27.940048]  ? ktime_get_ts64+0x86/0x230
[   27.940078]  kunit_try_run_case+0x1a5/0x480
[   27.940108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.940135]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.940378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.940424]  ? __kthread_parkme+0x82/0x180
[   27.940451]  ? preempt_count_sub+0x50/0x80
[   27.940479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.940509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.940539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.940567]  kthread+0x337/0x6f0
[   27.940591]  ? trace_preempt_on+0x20/0xc0
[   27.940620]  ? __pfx_kthread+0x10/0x10
[   27.940645]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.940670]  ? calculate_sigpending+0x7b/0xa0
[   27.940699]  ? __pfx_kthread+0x10/0x10
[   27.940725]  ret_from_fork+0x116/0x1d0
[   27.940747]  ? __pfx_kthread+0x10/0x10
[   27.940772]  ret_from_fork_asm+0x1a/0x30
[   27.940809]  </TASK>
[   27.940823] 
[   27.952899] Allocated by task 314:
[   27.953216]  kasan_save_stack+0x45/0x70
[   27.953411]  kasan_save_track+0x18/0x40
[   27.953562]  kasan_save_alloc_info+0x3b/0x50
[   27.953726]  __kasan_kmalloc+0xb7/0xc0
[   27.953931]  __kmalloc_cache_noprof+0x189/0x420
[   27.954175]  kasan_atomics+0x95/0x310
[   27.954412]  kunit_try_run_case+0x1a5/0x480
[   27.954762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.955047]  kthread+0x337/0x6f0
[   27.955304]  ret_from_fork+0x116/0x1d0
[   27.955533]  ret_from_fork_asm+0x1a/0x30
[   27.955745] 
[   27.955843] The buggy address belongs to the object at ffff88810625b900
[   27.955843]  which belongs to the cache kmalloc-64 of size 64
[   27.956340] The buggy address is located 0 bytes to the right of
[   27.956340]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.957491] 
[   27.957612] The buggy address belongs to the physical page:
[   27.957808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.958205] flags: 0x200000000000000(node=0|zone=2)
[   27.958553] page_type: f5(slab)
[   27.958749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.959122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.959535] page dumped because: kasan: bad access detected
[   27.959817] 
[   27.959925] Memory state around the buggy address:
[   27.960303]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.960657]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.960912] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.961611]                                      ^
[   27.961886]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.962278]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.962633] ==================================================================
[   27.732809] ==================================================================
[   27.733337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   27.733858] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.734640] 
[   27.735001] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.735167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.735185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.735213] Call Trace:
[   27.735354]  <TASK>
[   27.735380]  dump_stack_lvl+0x73/0xb0
[   27.735456]  print_report+0xd1/0x650
[   27.735567]  ? __virt_addr_valid+0x1db/0x2d0
[   27.735602]  ? kasan_atomics_helper+0x3df/0x5450
[   27.735630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.735660]  ? kasan_atomics_helper+0x3df/0x5450
[   27.735689]  kasan_report+0x141/0x180
[   27.735715]  ? kasan_atomics_helper+0x3df/0x5450
[   27.735748]  kasan_check_range+0x10c/0x1c0
[   27.735774]  __kasan_check_read+0x15/0x20
[   27.735801]  kasan_atomics_helper+0x3df/0x5450
[   27.735830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.735860]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.735889]  ? kasan_atomics+0x152/0x310
[   27.735917]  kasan_atomics+0x1dc/0x310
[   27.735943]  ? __pfx_kasan_atomics+0x10/0x10
[   27.735971]  ? __pfx_read_tsc+0x10/0x10
[   27.735996]  ? ktime_get_ts64+0x86/0x230
[   27.736025]  kunit_try_run_case+0x1a5/0x480
[   27.736055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.736083]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.736111]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.736139]  ? __kthread_parkme+0x82/0x180
[   27.736165]  ? preempt_count_sub+0x50/0x80
[   27.736193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.736229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.736259]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.736288]  kthread+0x337/0x6f0
[   27.736311]  ? trace_preempt_on+0x20/0xc0
[   27.736340]  ? __pfx_kthread+0x10/0x10
[   27.736364]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.736402]  ? calculate_sigpending+0x7b/0xa0
[   27.736430]  ? __pfx_kthread+0x10/0x10
[   27.736456]  ret_from_fork+0x116/0x1d0
[   27.736480]  ? __pfx_kthread+0x10/0x10
[   27.736504]  ret_from_fork_asm+0x1a/0x30
[   27.736543]  </TASK>
[   27.736559] 
[   27.753029] Allocated by task 314:
[   27.753208]  kasan_save_stack+0x45/0x70
[   27.753420]  kasan_save_track+0x18/0x40
[   27.753566]  kasan_save_alloc_info+0x3b/0x50
[   27.754308]  __kasan_kmalloc+0xb7/0xc0
[   27.754495]  __kmalloc_cache_noprof+0x189/0x420
[   27.754735]  kasan_atomics+0x95/0x310
[   27.755223]  kunit_try_run_case+0x1a5/0x480
[   27.755543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.755828]  kthread+0x337/0x6f0
[   27.756131]  ret_from_fork+0x116/0x1d0
[   27.756446]  ret_from_fork_asm+0x1a/0x30
[   27.756656] 
[   27.756752] The buggy address belongs to the object at ffff88810625b900
[   27.756752]  which belongs to the cache kmalloc-64 of size 64
[   27.757691] The buggy address is located 0 bytes to the right of
[   27.757691]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.758651] 
[   27.758745] The buggy address belongs to the physical page:
[   27.759085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.759538] flags: 0x200000000000000(node=0|zone=2)
[   27.760088] page_type: f5(slab)
[   27.760290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.760882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.761369] page dumped because: kasan: bad access detected
[   27.761738] 
[   27.761872] Memory state around the buggy address:
[   27.762087]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.762448]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.763278] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.763747]                                      ^
[   27.764049]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.764661]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.765137] ==================================================================
[   28.481681] ==================================================================
[   28.482482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   28.482908] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.483144] 
[   28.483302] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.483358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.483373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.483412] Call Trace:
[   28.483436]  <TASK>
[   28.483458]  dump_stack_lvl+0x73/0xb0
[   28.483488]  print_report+0xd1/0x650
[   28.483514]  ? __virt_addr_valid+0x1db/0x2d0
[   28.483542]  ? kasan_atomics_helper+0x1217/0x5450
[   28.483570]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.483599]  ? kasan_atomics_helper+0x1217/0x5450
[   28.483628]  kasan_report+0x141/0x180
[   28.483653]  ? kasan_atomics_helper+0x1217/0x5450
[   28.483689]  kasan_check_range+0x10c/0x1c0
[   28.483717]  __kasan_check_write+0x18/0x20
[   28.483744]  kasan_atomics_helper+0x1217/0x5450
[   28.483773]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.483801]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.483829]  ? kasan_atomics+0x152/0x310
[   28.483859]  kasan_atomics+0x1dc/0x310
[   28.483886]  ? __pfx_kasan_atomics+0x10/0x10
[   28.483914]  ? __pfx_read_tsc+0x10/0x10
[   28.483938]  ? ktime_get_ts64+0x86/0x230
[   28.483969]  kunit_try_run_case+0x1a5/0x480
[   28.483997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.484024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.484052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.484080]  ? __kthread_parkme+0x82/0x180
[   28.484104]  ? preempt_count_sub+0x50/0x80
[   28.484132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.484160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.484188]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.484216]  kthread+0x337/0x6f0
[   28.484244]  ? trace_preempt_on+0x20/0xc0
[   28.484272]  ? __pfx_kthread+0x10/0x10
[   28.484295]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.484320]  ? calculate_sigpending+0x7b/0xa0
[   28.484348]  ? __pfx_kthread+0x10/0x10
[   28.484373]  ret_from_fork+0x116/0x1d0
[   28.484417]  ? __pfx_kthread+0x10/0x10
[   28.484441]  ret_from_fork_asm+0x1a/0x30
[   28.484476]  </TASK>
[   28.484490] 
[   28.496008] Allocated by task 314:
[   28.496449]  kasan_save_stack+0x45/0x70
[   28.496727]  kasan_save_track+0x18/0x40
[   28.496895]  kasan_save_alloc_info+0x3b/0x50
[   28.497186]  __kasan_kmalloc+0xb7/0xc0
[   28.497379]  __kmalloc_cache_noprof+0x189/0x420
[   28.497629]  kasan_atomics+0x95/0x310
[   28.497784]  kunit_try_run_case+0x1a5/0x480
[   28.498354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.498613]  kthread+0x337/0x6f0
[   28.498751]  ret_from_fork+0x116/0x1d0
[   28.499113]  ret_from_fork_asm+0x1a/0x30
[   28.499312] 
[   28.499562] The buggy address belongs to the object at ffff88810625b900
[   28.499562]  which belongs to the cache kmalloc-64 of size 64
[   28.500189] The buggy address is located 0 bytes to the right of
[   28.500189]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.500789] 
[   28.500892] The buggy address belongs to the physical page:
[   28.501212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.501569] flags: 0x200000000000000(node=0|zone=2)
[   28.501790] page_type: f5(slab)
[   28.502230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.502557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.502949] page dumped because: kasan: bad access detected
[   28.503211] 
[   28.503439] Memory state around the buggy address:
[   28.503629]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.504172]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.504560] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.504991]                                      ^
[   28.505179]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.505621]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.506028] ==================================================================
[   28.115650] ==================================================================
[   28.116029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   28.116562] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.116885] 
[   28.117319] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.117382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.117412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.117439] Call Trace:
[   28.117463]  <TASK>
[   28.117569]  dump_stack_lvl+0x73/0xb0
[   28.117609]  print_report+0xd1/0x650
[   28.117639]  ? __virt_addr_valid+0x1db/0x2d0
[   28.117669]  ? kasan_atomics_helper+0xb6a/0x5450
[   28.117699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.117730]  ? kasan_atomics_helper+0xb6a/0x5450
[   28.117759]  kasan_report+0x141/0x180
[   28.117786]  ? kasan_atomics_helper+0xb6a/0x5450
[   28.117820]  kasan_check_range+0x10c/0x1c0
[   28.117860]  __kasan_check_write+0x18/0x20
[   28.117889]  kasan_atomics_helper+0xb6a/0x5450
[   28.117931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.117962]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.117992]  ? kasan_atomics+0x152/0x310
[   28.118023]  kasan_atomics+0x1dc/0x310
[   28.118050]  ? __pfx_kasan_atomics+0x10/0x10
[   28.118079]  ? __pfx_read_tsc+0x10/0x10
[   28.118105]  ? ktime_get_ts64+0x86/0x230
[   28.118136]  kunit_try_run_case+0x1a5/0x480
[   28.118167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.118195]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.118226]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.118255]  ? __kthread_parkme+0x82/0x180
[   28.118279]  ? preempt_count_sub+0x50/0x80
[   28.118308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.118412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.118448]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.118480]  kthread+0x337/0x6f0
[   28.118505]  ? trace_preempt_on+0x20/0xc0
[   28.118534]  ? __pfx_kthread+0x10/0x10
[   28.118560]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.118587]  ? calculate_sigpending+0x7b/0xa0
[   28.118616]  ? __pfx_kthread+0x10/0x10
[   28.118643]  ret_from_fork+0x116/0x1d0
[   28.118667]  ? __pfx_kthread+0x10/0x10
[   28.118692]  ret_from_fork_asm+0x1a/0x30
[   28.118729]  </TASK>
[   28.118745] 
[   28.128881] Allocated by task 314:
[   28.129144]  kasan_save_stack+0x45/0x70
[   28.129486]  kasan_save_track+0x18/0x40
[   28.129655]  kasan_save_alloc_info+0x3b/0x50
[   28.129822]  __kasan_kmalloc+0xb7/0xc0
[   28.130087]  __kmalloc_cache_noprof+0x189/0x420
[   28.130537]  kasan_atomics+0x95/0x310
[   28.130737]  kunit_try_run_case+0x1a5/0x480
[   28.130899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.131089]  kthread+0x337/0x6f0
[   28.131220]  ret_from_fork+0x116/0x1d0
[   28.131643]  ret_from_fork_asm+0x1a/0x30
[   28.132043] 
[   28.132161] The buggy address belongs to the object at ffff88810625b900
[   28.132161]  which belongs to the cache kmalloc-64 of size 64
[   28.133153] The buggy address is located 0 bytes to the right of
[   28.133153]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.133874] 
[   28.133963] The buggy address belongs to the physical page:
[   28.134238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.134871] flags: 0x200000000000000(node=0|zone=2)
[   28.135067] page_type: f5(slab)
[   28.135201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.135955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.136218] page dumped because: kasan: bad access detected
[   28.136417] 
[   28.136694] Memory state around the buggy address:
[   28.137434]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.137818]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.138410] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.138702]                                      ^
[   28.138932]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.139504]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.139751] ==================================================================
[   28.945786] ==================================================================
[   28.946068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   28.946673] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.947215] 
[   28.947346] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.947477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.947495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.947535] Call Trace:
[   28.947559]  <TASK>
[   28.947583]  dump_stack_lvl+0x73/0xb0
[   28.947617]  print_report+0xd1/0x650
[   28.947643]  ? __virt_addr_valid+0x1db/0x2d0
[   28.947672]  ? kasan_atomics_helper+0x1c18/0x5450
[   28.947702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.947735]  ? kasan_atomics_helper+0x1c18/0x5450
[   28.947766]  kasan_report+0x141/0x180
[   28.947791]  ? kasan_atomics_helper+0x1c18/0x5450
[   28.947826]  kasan_check_range+0x10c/0x1c0
[   28.947852]  __kasan_check_write+0x18/0x20
[   28.947879]  kasan_atomics_helper+0x1c18/0x5450
[   28.948470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.948507]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.948539]  ? kasan_atomics+0x152/0x310
[   28.948570]  kasan_atomics+0x1dc/0x310
[   28.948597]  ? __pfx_kasan_atomics+0x10/0x10
[   28.948624]  ? __pfx_read_tsc+0x10/0x10
[   28.948651]  ? ktime_get_ts64+0x86/0x230
[   28.948680]  kunit_try_run_case+0x1a5/0x480
[   28.948709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.948736]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.948766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.948794]  ? __kthread_parkme+0x82/0x180
[   28.948818]  ? preempt_count_sub+0x50/0x80
[   28.948845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.949434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.949481]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.949513]  kthread+0x337/0x6f0
[   28.949539]  ? trace_preempt_on+0x20/0xc0
[   28.949570]  ? __pfx_kthread+0x10/0x10
[   28.949595]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.949623]  ? calculate_sigpending+0x7b/0xa0
[   28.949651]  ? __pfx_kthread+0x10/0x10
[   28.949676]  ret_from_fork+0x116/0x1d0
[   28.949699]  ? __pfx_kthread+0x10/0x10
[   28.949724]  ret_from_fork_asm+0x1a/0x30
[   28.949762]  </TASK>
[   28.949778] 
[   28.960952] Allocated by task 314:
[   28.961105]  kasan_save_stack+0x45/0x70
[   28.961264]  kasan_save_track+0x18/0x40
[   28.961468]  kasan_save_alloc_info+0x3b/0x50
[   28.962002]  __kasan_kmalloc+0xb7/0xc0
[   28.962231]  __kmalloc_cache_noprof+0x189/0x420
[   28.962440]  kasan_atomics+0x95/0x310
[   28.962575]  kunit_try_run_case+0x1a5/0x480
[   28.962723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.962903]  kthread+0x337/0x6f0
[   28.963027]  ret_from_fork+0x116/0x1d0
[   28.963161]  ret_from_fork_asm+0x1a/0x30
[   28.963303] 
[   28.963373] The buggy address belongs to the object at ffff88810625b900
[   28.963373]  which belongs to the cache kmalloc-64 of size 64
[   28.963752] The buggy address is located 0 bytes to the right of
[   28.963752]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.964115] 
[   28.964191] The buggy address belongs to the physical page:
[   28.964370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.965043] flags: 0x200000000000000(node=0|zone=2)
[   28.965294] page_type: f5(slab)
[   28.965498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.965949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.966327] page dumped because: kasan: bad access detected
[   28.966585] 
[   28.966678] Memory state around the buggy address:
[   28.966900]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.968164]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.968972] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.969191]                                      ^
[   28.969443]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.969713]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.970598] ==================================================================
[   29.016699] ==================================================================
[   29.017082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   29.017598] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.017858] 
[   29.018155] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.018253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.018282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.018309] Call Trace:
[   29.018332]  <TASK>
[   29.018358]  dump_stack_lvl+0x73/0xb0
[   29.018402]  print_report+0xd1/0x650
[   29.018427]  ? __virt_addr_valid+0x1db/0x2d0
[   29.018456]  ? kasan_atomics_helper+0x1d7a/0x5450
[   29.018485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.018515]  ? kasan_atomics_helper+0x1d7a/0x5450
[   29.018544]  kasan_report+0x141/0x180
[   29.018569]  ? kasan_atomics_helper+0x1d7a/0x5450
[   29.018602]  kasan_check_range+0x10c/0x1c0
[   29.018628]  __kasan_check_write+0x18/0x20
[   29.018653]  kasan_atomics_helper+0x1d7a/0x5450
[   29.018757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.018799]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.018827]  ? kasan_atomics+0x152/0x310
[   29.018857]  kasan_atomics+0x1dc/0x310
[   29.018894]  ? __pfx_kasan_atomics+0x10/0x10
[   29.018922]  ? __pfx_read_tsc+0x10/0x10
[   29.018948]  ? ktime_get_ts64+0x86/0x230
[   29.018976]  kunit_try_run_case+0x1a5/0x480
[   29.019005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.019032]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.019060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.019088]  ? __kthread_parkme+0x82/0x180
[   29.019112]  ? preempt_count_sub+0x50/0x80
[   29.019139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.019167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.019195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.019222]  kthread+0x337/0x6f0
[   29.019245]  ? trace_preempt_on+0x20/0xc0
[   29.019274]  ? __pfx_kthread+0x10/0x10
[   29.019298]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.019323]  ? calculate_sigpending+0x7b/0xa0
[   29.019351]  ? __pfx_kthread+0x10/0x10
[   29.019375]  ret_from_fork+0x116/0x1d0
[   29.019410]  ? __pfx_kthread+0x10/0x10
[   29.019433]  ret_from_fork_asm+0x1a/0x30
[   29.019469]  </TASK>
[   29.019483] 
[   29.028487] Allocated by task 314:
[   29.028800]  kasan_save_stack+0x45/0x70
[   29.029376]  kasan_save_track+0x18/0x40
[   29.029645]  kasan_save_alloc_info+0x3b/0x50
[   29.029863]  __kasan_kmalloc+0xb7/0xc0
[   29.030067]  __kmalloc_cache_noprof+0x189/0x420
[   29.030318]  kasan_atomics+0x95/0x310
[   29.030469]  kunit_try_run_case+0x1a5/0x480
[   29.030621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.031099]  kthread+0x337/0x6f0
[   29.031313]  ret_from_fork+0x116/0x1d0
[   29.031517]  ret_from_fork_asm+0x1a/0x30
[   29.031719] 
[   29.031821] The buggy address belongs to the object at ffff88810625b900
[   29.031821]  which belongs to the cache kmalloc-64 of size 64
[   29.032615] The buggy address is located 0 bytes to the right of
[   29.032615]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.033290] 
[   29.033403] The buggy address belongs to the physical page:
[   29.033661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.034091] flags: 0x200000000000000(node=0|zone=2)
[   29.034487] page_type: f5(slab)
[   29.034640] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.035066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.035438] page dumped because: kasan: bad access detected
[   29.035775] 
[   29.035848] Memory state around the buggy address:
[   29.036150]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.036429]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.036928] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.037275]                                      ^
[   29.037539]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.037837]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.038122] ==================================================================
[   28.506823] ==================================================================
[   28.507482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   28.507831] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.508249] 
[   28.508364] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.508430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.508444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.508471] Call Trace:
[   28.508492]  <TASK>
[   28.508515]  dump_stack_lvl+0x73/0xb0
[   28.508548]  print_report+0xd1/0x650
[   28.508576]  ? __virt_addr_valid+0x1db/0x2d0
[   28.508603]  ? kasan_atomics_helper+0x49e8/0x5450
[   28.508631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.508661]  ? kasan_atomics_helper+0x49e8/0x5450
[   28.508689]  kasan_report+0x141/0x180
[   28.508714]  ? kasan_atomics_helper+0x49e8/0x5450
[   28.508746]  __asan_report_load4_noabort+0x18/0x20
[   28.508773]  kasan_atomics_helper+0x49e8/0x5450
[   28.508802]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.508831]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.508861]  ? kasan_atomics+0x152/0x310
[   28.508890]  kasan_atomics+0x1dc/0x310
[   28.508916]  ? __pfx_kasan_atomics+0x10/0x10
[   28.508943]  ? __pfx_read_tsc+0x10/0x10
[   28.508967]  ? ktime_get_ts64+0x86/0x230
[   28.508996]  kunit_try_run_case+0x1a5/0x480
[   28.509024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.509064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.509091]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.509118]  ? __kthread_parkme+0x82/0x180
[   28.509142]  ? preempt_count_sub+0x50/0x80
[   28.509168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.509196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.509223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.509251]  kthread+0x337/0x6f0
[   28.509274]  ? trace_preempt_on+0x20/0xc0
[   28.509301]  ? __pfx_kthread+0x10/0x10
[   28.509324]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.509350]  ? calculate_sigpending+0x7b/0xa0
[   28.509377]  ? __pfx_kthread+0x10/0x10
[   28.509413]  ret_from_fork+0x116/0x1d0
[   28.509436]  ? __pfx_kthread+0x10/0x10
[   28.509460]  ret_from_fork_asm+0x1a/0x30
[   28.509494]  </TASK>
[   28.509508] 
[   28.516873] Allocated by task 314:
[   28.517040]  kasan_save_stack+0x45/0x70
[   28.517188]  kasan_save_track+0x18/0x40
[   28.517400]  kasan_save_alloc_info+0x3b/0x50
[   28.517623]  __kasan_kmalloc+0xb7/0xc0
[   28.517783]  __kmalloc_cache_noprof+0x189/0x420
[   28.518013]  kasan_atomics+0x95/0x310
[   28.518165]  kunit_try_run_case+0x1a5/0x480
[   28.518383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.518611]  kthread+0x337/0x6f0
[   28.518767]  ret_from_fork+0x116/0x1d0
[   28.518955]  ret_from_fork_asm+0x1a/0x30
[   28.519141] 
[   28.519212] The buggy address belongs to the object at ffff88810625b900
[   28.519212]  which belongs to the cache kmalloc-64 of size 64
[   28.519809] The buggy address is located 0 bytes to the right of
[   28.519809]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.520225] 
[   28.520297] The buggy address belongs to the physical page:
[   28.520484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.520942] flags: 0x200000000000000(node=0|zone=2)
[   28.521242] page_type: f5(slab)
[   28.521424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.521674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.521976] page dumped because: kasan: bad access detected
[   28.522231] 
[   28.522324] Memory state around the buggy address:
[   28.522567]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.522899]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.523194] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.523420]                                      ^
[   28.523591]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.523959]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.524286] ==================================================================
[   28.205279] ==================================================================
[   28.206086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   28.206961] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.207230] 
[   28.207329] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.207386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.207414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.207441] Call Trace:
[   28.207459]  <TASK>
[   28.207481]  dump_stack_lvl+0x73/0xb0
[   28.207513]  print_report+0xd1/0x650
[   28.207540]  ? __virt_addr_valid+0x1db/0x2d0
[   28.207569]  ? kasan_atomics_helper+0xd47/0x5450
[   28.207597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.207626]  ? kasan_atomics_helper+0xd47/0x5450
[   28.207655]  kasan_report+0x141/0x180
[   28.207681]  ? kasan_atomics_helper+0xd47/0x5450
[   28.207716]  kasan_check_range+0x10c/0x1c0
[   28.207745]  __kasan_check_write+0x18/0x20
[   28.207771]  kasan_atomics_helper+0xd47/0x5450
[   28.207801]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.207830]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.207859]  ? kasan_atomics+0x152/0x310
[   28.207889]  kasan_atomics+0x1dc/0x310
[   28.207915]  ? __pfx_kasan_atomics+0x10/0x10
[   28.207943]  ? __pfx_read_tsc+0x10/0x10
[   28.207971]  ? ktime_get_ts64+0x86/0x230
[   28.207999]  kunit_try_run_case+0x1a5/0x480
[   28.208029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.208056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.208085]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.208113]  ? __kthread_parkme+0x82/0x180
[   28.208137]  ? preempt_count_sub+0x50/0x80
[   28.208164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.208192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.208220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.208270]  kthread+0x337/0x6f0
[   28.208293]  ? trace_preempt_on+0x20/0xc0
[   28.208321]  ? __pfx_kthread+0x10/0x10
[   28.208345]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.208371]  ? calculate_sigpending+0x7b/0xa0
[   28.208410]  ? __pfx_kthread+0x10/0x10
[   28.208435]  ret_from_fork+0x116/0x1d0
[   28.208456]  ? __pfx_kthread+0x10/0x10
[   28.208481]  ret_from_fork_asm+0x1a/0x30
[   28.208516]  </TASK>
[   28.208531] 
[   28.218920] Allocated by task 314:
[   28.219419]  kasan_save_stack+0x45/0x70
[   28.220045]  kasan_save_track+0x18/0x40
[   28.220629]  kasan_save_alloc_info+0x3b/0x50
[   28.221419]  __kasan_kmalloc+0xb7/0xc0
[   28.221866]  __kmalloc_cache_noprof+0x189/0x420
[   28.222385]  kasan_atomics+0x95/0x310
[   28.222766]  kunit_try_run_case+0x1a5/0x480
[   28.223309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.223923]  kthread+0x337/0x6f0
[   28.224293]  ret_from_fork+0x116/0x1d0
[   28.224769]  ret_from_fork_asm+0x1a/0x30
[   28.225252] 
[   28.225491] The buggy address belongs to the object at ffff88810625b900
[   28.225491]  which belongs to the cache kmalloc-64 of size 64
[   28.226655] The buggy address is located 0 bytes to the right of
[   28.226655]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.227537] 
[   28.227773] The buggy address belongs to the physical page:
[   28.228414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.229365] flags: 0x200000000000000(node=0|zone=2)
[   28.229853] page_type: f5(slab)
[   28.229999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.230847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.231404] page dumped because: kasan: bad access detected
[   28.231600] 
[   28.231691] Memory state around the buggy address:
[   28.232189]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.233030]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.233760] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.234575]                                      ^
[   28.234746]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.234984]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.235490] ==================================================================
[   28.301124] ==================================================================
[   28.301850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   28.302702] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.303282] 
[   28.303380] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.303451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.303468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.303494] Call Trace:
[   28.303518]  <TASK>
[   28.303543]  dump_stack_lvl+0x73/0xb0
[   28.303577]  print_report+0xd1/0x650
[   28.303606]  ? __virt_addr_valid+0x1db/0x2d0
[   28.303634]  ? kasan_atomics_helper+0xf10/0x5450
[   28.303664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.303856]  ? kasan_atomics_helper+0xf10/0x5450
[   28.303937]  kasan_report+0x141/0x180
[   28.303963]  ? kasan_atomics_helper+0xf10/0x5450
[   28.303997]  kasan_check_range+0x10c/0x1c0
[   28.304025]  __kasan_check_write+0x18/0x20
[   28.304051]  kasan_atomics_helper+0xf10/0x5450
[   28.304081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.304110]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.304140]  ? kasan_atomics+0x152/0x310
[   28.304171]  kasan_atomics+0x1dc/0x310
[   28.304197]  ? __pfx_kasan_atomics+0x10/0x10
[   28.304230]  ? __pfx_read_tsc+0x10/0x10
[   28.304256]  ? ktime_get_ts64+0x86/0x230
[   28.304285]  kunit_try_run_case+0x1a5/0x480
[   28.304314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.304342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.304370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.304409]  ? __kthread_parkme+0x82/0x180
[   28.304434]  ? preempt_count_sub+0x50/0x80
[   28.304462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.304491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.304520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.304548]  kthread+0x337/0x6f0
[   28.304572]  ? trace_preempt_on+0x20/0xc0
[   28.304600]  ? __pfx_kthread+0x10/0x10
[   28.304624]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.304650]  ? calculate_sigpending+0x7b/0xa0
[   28.304679]  ? __pfx_kthread+0x10/0x10
[   28.304704]  ret_from_fork+0x116/0x1d0
[   28.304727]  ? __pfx_kthread+0x10/0x10
[   28.304752]  ret_from_fork_asm+0x1a/0x30
[   28.304789]  </TASK>
[   28.304804] 
[   28.316716] Allocated by task 314:
[   28.316904]  kasan_save_stack+0x45/0x70
[   28.317940]  kasan_save_track+0x18/0x40
[   28.318106]  kasan_save_alloc_info+0x3b/0x50
[   28.318626]  __kasan_kmalloc+0xb7/0xc0
[   28.318952]  __kmalloc_cache_noprof+0x189/0x420
[   28.319149]  kasan_atomics+0x95/0x310
[   28.319555]  kunit_try_run_case+0x1a5/0x480
[   28.319777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.320468]  kthread+0x337/0x6f0
[   28.320655]  ret_from_fork+0x116/0x1d0
[   28.320856]  ret_from_fork_asm+0x1a/0x30
[   28.321086] 
[   28.321432] The buggy address belongs to the object at ffff88810625b900
[   28.321432]  which belongs to the cache kmalloc-64 of size 64
[   28.321980] The buggy address is located 0 bytes to the right of
[   28.321980]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.322893] 
[   28.323231] The buggy address belongs to the physical page:
[   28.323624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.324016] flags: 0x200000000000000(node=0|zone=2)
[   28.324677] page_type: f5(slab)
[   28.324874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.325206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.325893] page dumped because: kasan: bad access detected
[   28.326333] 
[   28.326435] Memory state around the buggy address:
[   28.326675]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.326991]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.327327] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.327658]                                      ^
[   28.328447]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.328744]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.328999] ==================================================================
[   29.145309] ==================================================================
[   29.146003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   29.146794] Read of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   29.147184] 
[   29.147307] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   29.147366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.147384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.147422] Call Trace:
[   29.147447]  <TASK>
[   29.147472]  dump_stack_lvl+0x73/0xb0
[   29.147507]  print_report+0xd1/0x650
[   29.147535]  ? __virt_addr_valid+0x1db/0x2d0
[   29.147563]  ? kasan_atomics_helper+0x4f98/0x5450
[   29.147592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.147621]  ? kasan_atomics_helper+0x4f98/0x5450
[   29.147651]  kasan_report+0x141/0x180
[   29.147676]  ? kasan_atomics_helper+0x4f98/0x5450
[   29.147710]  __asan_report_load8_noabort+0x18/0x20
[   29.147737]  kasan_atomics_helper+0x4f98/0x5450
[   29.147767]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.147796]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.147825]  ? kasan_atomics+0x152/0x310
[   29.147855]  kasan_atomics+0x1dc/0x310
[   29.147882]  ? __pfx_kasan_atomics+0x10/0x10
[   29.147910]  ? __pfx_read_tsc+0x10/0x10
[   29.147936]  ? ktime_get_ts64+0x86/0x230
[   29.147965]  kunit_try_run_case+0x1a5/0x480
[   29.147995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.148022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.148064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.148092]  ? __kthread_parkme+0x82/0x180
[   29.148129]  ? preempt_count_sub+0x50/0x80
[   29.148158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.148187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.148216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.148249]  kthread+0x337/0x6f0
[   29.148273]  ? trace_preempt_on+0x20/0xc0
[   29.148311]  ? __pfx_kthread+0x10/0x10
[   29.148334]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.148373]  ? calculate_sigpending+0x7b/0xa0
[   29.148408]  ? __pfx_kthread+0x10/0x10
[   29.148434]  ret_from_fork+0x116/0x1d0
[   29.148456]  ? __pfx_kthread+0x10/0x10
[   29.148480]  ret_from_fork_asm+0x1a/0x30
[   29.148517]  </TASK>
[   29.148531] 
[   29.155963] Allocated by task 314:
[   29.156167]  kasan_save_stack+0x45/0x70
[   29.156376]  kasan_save_track+0x18/0x40
[   29.156571]  kasan_save_alloc_info+0x3b/0x50
[   29.156780]  __kasan_kmalloc+0xb7/0xc0
[   29.156937]  __kmalloc_cache_noprof+0x189/0x420
[   29.157090]  kasan_atomics+0x95/0x310
[   29.157218]  kunit_try_run_case+0x1a5/0x480
[   29.157509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.157767]  kthread+0x337/0x6f0
[   29.157998]  ret_from_fork+0x116/0x1d0
[   29.158216]  ret_from_fork_asm+0x1a/0x30
[   29.158419] 
[   29.158490] The buggy address belongs to the object at ffff88810625b900
[   29.158490]  which belongs to the cache kmalloc-64 of size 64
[   29.158837] The buggy address is located 0 bytes to the right of
[   29.158837]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   29.159959] 
[   29.160058] The buggy address belongs to the physical page:
[   29.160240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   29.160547] flags: 0x200000000000000(node=0|zone=2)
[   29.160789] page_type: f5(slab)
[   29.161047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.161376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.161677] page dumped because: kasan: bad access detected
[   29.161889] 
[   29.161985] Memory state around the buggy address:
[   29.162250]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.162612]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.162971] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.163255]                                      ^
[   29.163460]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.163807]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.164159] ==================================================================
[   27.819897] ==================================================================
[   27.820596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   27.820967] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.821317] 
[   27.821443] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.821503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.821519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.821547] Call Trace:
[   27.821572]  <TASK>
[   27.821596]  dump_stack_lvl+0x73/0xb0
[   27.821630]  print_report+0xd1/0x650
[   27.821657]  ? __virt_addr_valid+0x1db/0x2d0
[   27.821687]  ? kasan_atomics_helper+0x4b3a/0x5450
[   27.821715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.821745]  ? kasan_atomics_helper+0x4b3a/0x5450
[   27.821776]  kasan_report+0x141/0x180
[   27.821803]  ? kasan_atomics_helper+0x4b3a/0x5450
[   27.821837]  __asan_report_store4_noabort+0x1b/0x30
[   27.821864]  kasan_atomics_helper+0x4b3a/0x5450
[   27.821894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.821925]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.821954]  ? kasan_atomics+0x152/0x310
[   27.822008]  kasan_atomics+0x1dc/0x310
[   27.822034]  ? __pfx_kasan_atomics+0x10/0x10
[   27.822061]  ? __pfx_read_tsc+0x10/0x10
[   27.822087]  ? ktime_get_ts64+0x86/0x230
[   27.822116]  kunit_try_run_case+0x1a5/0x480
[   27.822146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.822173]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.822201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.822230]  ? __kthread_parkme+0x82/0x180
[   27.822255]  ? preempt_count_sub+0x50/0x80
[   27.822282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.822312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.822359]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.822388]  kthread+0x337/0x6f0
[   27.822423]  ? trace_preempt_on+0x20/0xc0
[   27.822453]  ? __pfx_kthread+0x10/0x10
[   27.822476]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.822503]  ? calculate_sigpending+0x7b/0xa0
[   27.822531]  ? __pfx_kthread+0x10/0x10
[   27.822555]  ret_from_fork+0x116/0x1d0
[   27.822578]  ? __pfx_kthread+0x10/0x10
[   27.822602]  ret_from_fork_asm+0x1a/0x30
[   27.822638]  </TASK>
[   27.822652] 
[   27.834775] Allocated by task 314:
[   27.835002]  kasan_save_stack+0x45/0x70
[   27.835312]  kasan_save_track+0x18/0x40
[   27.835641]  kasan_save_alloc_info+0x3b/0x50
[   27.835918]  __kasan_kmalloc+0xb7/0xc0
[   27.836327]  __kmalloc_cache_noprof+0x189/0x420
[   27.836574]  kasan_atomics+0x95/0x310
[   27.836820]  kunit_try_run_case+0x1a5/0x480
[   27.837080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.837515]  kthread+0x337/0x6f0
[   27.837731]  ret_from_fork+0x116/0x1d0
[   27.838448]  ret_from_fork_asm+0x1a/0x30
[   27.838665] 
[   27.838773] The buggy address belongs to the object at ffff88810625b900
[   27.838773]  which belongs to the cache kmalloc-64 of size 64
[   27.839623] The buggy address is located 0 bytes to the right of
[   27.839623]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.840424] 
[   27.840557] The buggy address belongs to the physical page:
[   27.840827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.841444] flags: 0x200000000000000(node=0|zone=2)
[   27.841677] page_type: f5(slab)
[   27.841855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.842354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.842829] page dumped because: kasan: bad access detected
[   27.843115] 
[   27.843366] Memory state around the buggy address:
[   27.843865]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.844377]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.844766] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.845322]                                      ^
[   27.845767]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.846154]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.846631] ==================================================================
[   28.575491] ==================================================================
[   28.576275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   28.577007] Read of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.577697] 
[   28.577924] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.577992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.578007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.578034] Call Trace:
[   28.578067]  <TASK>
[   28.578091]  dump_stack_lvl+0x73/0xb0
[   28.578124]  print_report+0xd1/0x650
[   28.578162]  ? __virt_addr_valid+0x1db/0x2d0
[   28.578190]  ? kasan_atomics_helper+0x13b5/0x5450
[   28.578218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.578247]  ? kasan_atomics_helper+0x13b5/0x5450
[   28.578278]  kasan_report+0x141/0x180
[   28.578303]  ? kasan_atomics_helper+0x13b5/0x5450
[   28.578336]  kasan_check_range+0x10c/0x1c0
[   28.578362]  __kasan_check_read+0x15/0x20
[   28.578400]  kasan_atomics_helper+0x13b5/0x5450
[   28.578431]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.578460]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.578488]  ? kasan_atomics+0x152/0x310
[   28.578517]  kasan_atomics+0x1dc/0x310
[   28.578542]  ? __pfx_kasan_atomics+0x10/0x10
[   28.578569]  ? __pfx_read_tsc+0x10/0x10
[   28.578594]  ? ktime_get_ts64+0x86/0x230
[   28.578624]  kunit_try_run_case+0x1a5/0x480
[   28.578652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.578679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.578707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.578735]  ? __kthread_parkme+0x82/0x180
[   28.578760]  ? preempt_count_sub+0x50/0x80
[   28.578787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.578815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.578843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.578893]  kthread+0x337/0x6f0
[   28.578916]  ? trace_preempt_on+0x20/0xc0
[   28.578945]  ? __pfx_kthread+0x10/0x10
[   28.578969]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.578994]  ? calculate_sigpending+0x7b/0xa0
[   28.579022]  ? __pfx_kthread+0x10/0x10
[   28.579047]  ret_from_fork+0x116/0x1d0
[   28.579069]  ? __pfx_kthread+0x10/0x10
[   28.579092]  ret_from_fork_asm+0x1a/0x30
[   28.579128]  </TASK>
[   28.579143] 
[   28.591913] Allocated by task 314:
[   28.592309]  kasan_save_stack+0x45/0x70
[   28.592739]  kasan_save_track+0x18/0x40
[   28.593176]  kasan_save_alloc_info+0x3b/0x50
[   28.593682]  __kasan_kmalloc+0xb7/0xc0
[   28.594062]  __kmalloc_cache_noprof+0x189/0x420
[   28.594456]  kasan_atomics+0x95/0x310
[   28.594599]  kunit_try_run_case+0x1a5/0x480
[   28.594757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.595119]  kthread+0x337/0x6f0
[   28.595458]  ret_from_fork+0x116/0x1d0
[   28.595862]  ret_from_fork_asm+0x1a/0x30
[   28.596282] 
[   28.596463] The buggy address belongs to the object at ffff88810625b900
[   28.596463]  which belongs to the cache kmalloc-64 of size 64
[   28.597619] The buggy address is located 0 bytes to the right of
[   28.597619]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.598371] 
[   28.598565] The buggy address belongs to the physical page:
[   28.599250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.599838] flags: 0x200000000000000(node=0|zone=2)
[   28.600348] page_type: f5(slab)
[   28.600696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.600985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.601595] page dumped because: kasan: bad access detected
[   28.601787] 
[   28.601860] Memory state around the buggy address:
[   28.602361]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.603078]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.603873] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.604369]                                      ^
[   28.604570]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.604813]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.605680] ==================================================================
[   28.524873] ==================================================================
[   28.525300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   28.525670] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.526026] 
[   28.526135] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.526187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.526202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.526228] Call Trace:
[   28.526248]  <TASK>
[   28.526267]  dump_stack_lvl+0x73/0xb0
[   28.526297]  print_report+0xd1/0x650
[   28.526322]  ? __virt_addr_valid+0x1db/0x2d0
[   28.526349]  ? kasan_atomics_helper+0x12e6/0x5450
[   28.526376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.526416]  ? kasan_atomics_helper+0x12e6/0x5450
[   28.526444]  kasan_report+0x141/0x180
[   28.526468]  ? kasan_atomics_helper+0x12e6/0x5450
[   28.526501]  kasan_check_range+0x10c/0x1c0
[   28.526527]  __kasan_check_write+0x18/0x20
[   28.526552]  kasan_atomics_helper+0x12e6/0x5450
[   28.526580]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.526610]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.526638]  ? kasan_atomics+0x152/0x310
[   28.526667]  kasan_atomics+0x1dc/0x310
[   28.526691]  ? __pfx_kasan_atomics+0x10/0x10
[   28.526717]  ? __pfx_read_tsc+0x10/0x10
[   28.526742]  ? ktime_get_ts64+0x86/0x230
[   28.526770]  kunit_try_run_case+0x1a5/0x480
[   28.526798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.526824]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.526851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.526891]  ? __kthread_parkme+0x82/0x180
[   28.526915]  ? preempt_count_sub+0x50/0x80
[   28.526943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.526971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.527000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.527028]  kthread+0x337/0x6f0
[   28.527051]  ? trace_preempt_on+0x20/0xc0
[   28.527078]  ? __pfx_kthread+0x10/0x10
[   28.527102]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.527128]  ? calculate_sigpending+0x7b/0xa0
[   28.527156]  ? __pfx_kthread+0x10/0x10
[   28.527180]  ret_from_fork+0x116/0x1d0
[   28.527203]  ? __pfx_kthread+0x10/0x10
[   28.527229]  ret_from_fork_asm+0x1a/0x30
[   28.527265]  </TASK>
[   28.527280] 
[   28.535252] Allocated by task 314:
[   28.535469]  kasan_save_stack+0x45/0x70
[   28.535674]  kasan_save_track+0x18/0x40
[   28.535817]  kasan_save_alloc_info+0x3b/0x50
[   28.536066]  __kasan_kmalloc+0xb7/0xc0
[   28.536282]  __kmalloc_cache_noprof+0x189/0x420
[   28.536479]  kasan_atomics+0x95/0x310
[   28.536619]  kunit_try_run_case+0x1a5/0x480
[   28.536774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.537245]  kthread+0x337/0x6f0
[   28.537439]  ret_from_fork+0x116/0x1d0
[   28.537641]  ret_from_fork_asm+0x1a/0x30
[   28.537850] 
[   28.537985] The buggy address belongs to the object at ffff88810625b900
[   28.537985]  which belongs to the cache kmalloc-64 of size 64
[   28.538364] The buggy address is located 0 bytes to the right of
[   28.538364]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.538765] 
[   28.538840] The buggy address belongs to the physical page:
[   28.539108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.539491] flags: 0x200000000000000(node=0|zone=2)
[   28.539737] page_type: f5(slab)
[   28.539914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.540233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.540687] page dumped because: kasan: bad access detected
[   28.540942] 
[   28.541013] Memory state around the buggy address:
[   28.541178]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.541423]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.541657] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.542159]                                      ^
[   28.542421]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.542767]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.543371] ==================================================================
[   28.744861] ==================================================================
[   28.745309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   28.745652] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.746080] 
[   28.746189] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.746245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.746272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.746299] Call Trace:
[   28.746322]  <TASK>
[   28.746356]  dump_stack_lvl+0x73/0xb0
[   28.746387]  print_report+0xd1/0x650
[   28.746422]  ? __virt_addr_valid+0x1db/0x2d0
[   28.746452]  ? kasan_atomics_helper+0x164f/0x5450
[   28.746481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.746512]  ? kasan_atomics_helper+0x164f/0x5450
[   28.746542]  kasan_report+0x141/0x180
[   28.746567]  ? kasan_atomics_helper+0x164f/0x5450
[   28.746601]  kasan_check_range+0x10c/0x1c0
[   28.746629]  __kasan_check_write+0x18/0x20
[   28.746656]  kasan_atomics_helper+0x164f/0x5450
[   28.746687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.746717]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.746746]  ? kasan_atomics+0x152/0x310
[   28.746776]  kasan_atomics+0x1dc/0x310
[   28.746803]  ? __pfx_kasan_atomics+0x10/0x10
[   28.746831]  ? __pfx_read_tsc+0x10/0x10
[   28.746857]  ? ktime_get_ts64+0x86/0x230
[   28.746899]  kunit_try_run_case+0x1a5/0x480
[   28.746941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.746968]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.747010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.747039]  ? __kthread_parkme+0x82/0x180
[   28.747065]  ? preempt_count_sub+0x50/0x80
[   28.747093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.747123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.747152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.747182]  kthread+0x337/0x6f0
[   28.747207]  ? trace_preempt_on+0x20/0xc0
[   28.747237]  ? __pfx_kthread+0x10/0x10
[   28.747262]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.747289]  ? calculate_sigpending+0x7b/0xa0
[   28.747318]  ? __pfx_kthread+0x10/0x10
[   28.747344]  ret_from_fork+0x116/0x1d0
[   28.747367]  ? __pfx_kthread+0x10/0x10
[   28.747415]  ret_from_fork_asm+0x1a/0x30
[   28.747452]  </TASK>
[   28.747466] 
[   28.755699] Allocated by task 314:
[   28.755912]  kasan_save_stack+0x45/0x70
[   28.756128]  kasan_save_track+0x18/0x40
[   28.756280]  kasan_save_alloc_info+0x3b/0x50
[   28.756501]  __kasan_kmalloc+0xb7/0xc0
[   28.756723]  __kmalloc_cache_noprof+0x189/0x420
[   28.756927]  kasan_atomics+0x95/0x310
[   28.757069]  kunit_try_run_case+0x1a5/0x480
[   28.757347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.757638]  kthread+0x337/0x6f0
[   28.757838]  ret_from_fork+0x116/0x1d0
[   28.758057]  ret_from_fork_asm+0x1a/0x30
[   28.758277] 
[   28.758409] The buggy address belongs to the object at ffff88810625b900
[   28.758409]  which belongs to the cache kmalloc-64 of size 64
[   28.758898] The buggy address is located 0 bytes to the right of
[   28.758898]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.759456] 
[   28.759533] The buggy address belongs to the physical page:
[   28.759720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.760039] flags: 0x200000000000000(node=0|zone=2)
[   28.760338] page_type: f5(slab)
[   28.760545] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.760910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.761256] page dumped because: kasan: bad access detected
[   28.762221] 
[   28.762349] Memory state around the buggy address:
[   28.762604]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.763180]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.763528] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.763833]                                      ^
[   28.764455]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.764791]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.765518] ==================================================================
[   27.669880] ==================================================================
[   27.670338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   27.670693] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.671192] 
[   27.671579] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.671748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.671765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.671792] Call Trace:
[   27.671815]  <TASK>
[   27.671875]  dump_stack_lvl+0x73/0xb0
[   27.671912]  print_report+0xd1/0x650
[   27.671939]  ? __virt_addr_valid+0x1db/0x2d0
[   27.671967]  ? kasan_atomics_helper+0x4b88/0x5450
[   27.671996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.672026]  ? kasan_atomics_helper+0x4b88/0x5450
[   27.672055]  kasan_report+0x141/0x180
[   27.672080]  ? kasan_atomics_helper+0x4b88/0x5450
[   27.672114]  __asan_report_load4_noabort+0x18/0x20
[   27.672142]  kasan_atomics_helper+0x4b88/0x5450
[   27.672173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.672203]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.672237]  ? kasan_atomics+0x152/0x310
[   27.672267]  kasan_atomics+0x1dc/0x310
[   27.672294]  ? __pfx_kasan_atomics+0x10/0x10
[   27.672322]  ? __pfx_read_tsc+0x10/0x10
[   27.672348]  ? ktime_get_ts64+0x86/0x230
[   27.672377]  kunit_try_run_case+0x1a5/0x480
[   27.672419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.672447]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.672476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.672505]  ? __kthread_parkme+0x82/0x180
[   27.672530]  ? preempt_count_sub+0x50/0x80
[   27.672557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.672585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.672614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.672644]  kthread+0x337/0x6f0
[   27.672667]  ? trace_preempt_on+0x20/0xc0
[   27.672696]  ? __pfx_kthread+0x10/0x10
[   27.672721]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.672747]  ? calculate_sigpending+0x7b/0xa0
[   27.672775]  ? __pfx_kthread+0x10/0x10
[   27.672801]  ret_from_fork+0x116/0x1d0
[   27.672823]  ? __pfx_kthread+0x10/0x10
[   27.672847]  ret_from_fork_asm+0x1a/0x30
[   27.672883]  </TASK>
[   27.672897] 
[   27.686707] Allocated by task 314:
[   27.687127]  kasan_save_stack+0x45/0x70
[   27.687756]  kasan_save_track+0x18/0x40
[   27.688287]  kasan_save_alloc_info+0x3b/0x50
[   27.688597]  __kasan_kmalloc+0xb7/0xc0
[   27.689105]  __kmalloc_cache_noprof+0x189/0x420
[   27.689444]  kasan_atomics+0x95/0x310
[   27.689647]  kunit_try_run_case+0x1a5/0x480
[   27.689853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.690101]  kthread+0x337/0x6f0
[   27.690666]  ret_from_fork+0x116/0x1d0
[   27.691038]  ret_from_fork_asm+0x1a/0x30
[   27.691546] 
[   27.691659] The buggy address belongs to the object at ffff88810625b900
[   27.691659]  which belongs to the cache kmalloc-64 of size 64
[   27.692512] The buggy address is located 0 bytes to the right of
[   27.692512]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.692973] 
[   27.693083] The buggy address belongs to the physical page:
[   27.693339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.693710] flags: 0x200000000000000(node=0|zone=2)
[   27.694033] page_type: f5(slab)
[   27.694164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.694538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.694852] page dumped because: kasan: bad access detected
[   27.695781] 
[   27.695872] Memory state around the buggy address:
[   27.696465]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.696913]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.697466] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.697895]                                      ^
[   27.698257]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.698775]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.699488] ==================================================================
[   28.656843] ==================================================================
[   28.657209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   28.657587] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.658066] 
[   28.658158] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.658211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.658227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.658254] Call Trace:
[   28.658273]  <TASK>
[   28.658292]  dump_stack_lvl+0x73/0xb0
[   28.658321]  print_report+0xd1/0x650
[   28.658348]  ? __virt_addr_valid+0x1db/0x2d0
[   28.658375]  ? kasan_atomics_helper+0x50d4/0x5450
[   28.658417]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.658447]  ? kasan_atomics_helper+0x50d4/0x5450
[   28.658477]  kasan_report+0x141/0x180
[   28.658503]  ? kasan_atomics_helper+0x50d4/0x5450
[   28.658538]  __asan_report_store8_noabort+0x1b/0x30
[   28.658567]  kasan_atomics_helper+0x50d4/0x5450
[   28.658597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.658628]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.658656]  ? kasan_atomics+0x152/0x310
[   28.658686]  kasan_atomics+0x1dc/0x310
[   28.658713]  ? __pfx_kasan_atomics+0x10/0x10
[   28.658741]  ? __pfx_read_tsc+0x10/0x10
[   28.658767]  ? ktime_get_ts64+0x86/0x230
[   28.658796]  kunit_try_run_case+0x1a5/0x480
[   28.658825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.658853]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.658882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.658911]  ? __kthread_parkme+0x82/0x180
[   28.658935]  ? preempt_count_sub+0x50/0x80
[   28.658963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.658994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.659023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.659053]  kthread+0x337/0x6f0
[   28.659076]  ? trace_preempt_on+0x20/0xc0
[   28.659105]  ? __pfx_kthread+0x10/0x10
[   28.659130]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.659157]  ? calculate_sigpending+0x7b/0xa0
[   28.659186]  ? __pfx_kthread+0x10/0x10
[   28.659212]  ret_from_fork+0x116/0x1d0
[   28.659236]  ? __pfx_kthread+0x10/0x10
[   28.659261]  ret_from_fork_asm+0x1a/0x30
[   28.659322]  </TASK>
[   28.659336] 
[   28.667498] Allocated by task 314:
[   28.667699]  kasan_save_stack+0x45/0x70
[   28.667943]  kasan_save_track+0x18/0x40
[   28.668153]  kasan_save_alloc_info+0x3b/0x50
[   28.668377]  __kasan_kmalloc+0xb7/0xc0
[   28.668568]  __kmalloc_cache_noprof+0x189/0x420
[   28.668739]  kasan_atomics+0x95/0x310
[   28.668882]  kunit_try_run_case+0x1a5/0x480
[   28.669359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.669635]  kthread+0x337/0x6f0
[   28.669777]  ret_from_fork+0x116/0x1d0
[   28.669923]  ret_from_fork_asm+0x1a/0x30
[   28.670076] 
[   28.670152] The buggy address belongs to the object at ffff88810625b900
[   28.670152]  which belongs to the cache kmalloc-64 of size 64
[   28.670726] The buggy address is located 0 bytes to the right of
[   28.670726]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.671638] 
[   28.671749] The buggy address belongs to the physical page:
[   28.672053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.672327] flags: 0x200000000000000(node=0|zone=2)
[   28.672522] page_type: f5(slab)
[   28.672709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.673234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.673667] page dumped because: kasan: bad access detected
[   28.674244] 
[   28.674352] Memory state around the buggy address:
[   28.674625]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.674871]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.675230] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.676655]                                      ^
[   28.677135]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.678127]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.678680] ==================================================================
[   28.367323] ==================================================================
[   28.368024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   28.368575] Read of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.368934] 
[   28.369040] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.369099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.369117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.369142] Call Trace:
[   28.369161]  <TASK>
[   28.369185]  dump_stack_lvl+0x73/0xb0
[   28.369219]  print_report+0xd1/0x650
[   28.369246]  ? __virt_addr_valid+0x1db/0x2d0
[   28.369275]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.369306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.369354]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.369385]  kasan_report+0x141/0x180
[   28.369491]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.369526]  __asan_report_load4_noabort+0x18/0x20
[   28.369556]  kasan_atomics_helper+0x4a36/0x5450
[   28.369587]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.369628]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.369658]  ? kasan_atomics+0x152/0x310
[   28.369700]  kasan_atomics+0x1dc/0x310
[   28.369726]  ? __pfx_kasan_atomics+0x10/0x10
[   28.369755]  ? __pfx_read_tsc+0x10/0x10
[   28.369782]  ? ktime_get_ts64+0x86/0x230
[   28.369813]  kunit_try_run_case+0x1a5/0x480
[   28.369844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.369872]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.369910]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.369939]  ? __kthread_parkme+0x82/0x180
[   28.369965]  ? preempt_count_sub+0x50/0x80
[   28.369994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.370024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.370054]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.370084]  kthread+0x337/0x6f0
[   28.370108]  ? trace_preempt_on+0x20/0xc0
[   28.370137]  ? __pfx_kthread+0x10/0x10
[   28.370162]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.370189]  ? calculate_sigpending+0x7b/0xa0
[   28.370220]  ? __pfx_kthread+0x10/0x10
[   28.370246]  ret_from_fork+0x116/0x1d0
[   28.370269]  ? __pfx_kthread+0x10/0x10
[   28.370295]  ret_from_fork_asm+0x1a/0x30
[   28.370332]  </TASK>
[   28.370348] 
[   28.385324] Allocated by task 314:
[   28.385696]  kasan_save_stack+0x45/0x70
[   28.386148]  kasan_save_track+0x18/0x40
[   28.386582]  kasan_save_alloc_info+0x3b/0x50
[   28.387026]  __kasan_kmalloc+0xb7/0xc0
[   28.387217]  __kmalloc_cache_noprof+0x189/0x420
[   28.387404]  kasan_atomics+0x95/0x310
[   28.387553]  kunit_try_run_case+0x1a5/0x480
[   28.387719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.387925]  kthread+0x337/0x6f0
[   28.388061]  ret_from_fork+0x116/0x1d0
[   28.388323]  ret_from_fork_asm+0x1a/0x30
[   28.388560] 
[   28.388665] The buggy address belongs to the object at ffff88810625b900
[   28.388665]  which belongs to the cache kmalloc-64 of size 64
[   28.389314] The buggy address is located 0 bytes to the right of
[   28.389314]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.389878] 
[   28.389961] The buggy address belongs to the physical page:
[   28.390206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.390677] flags: 0x200000000000000(node=0|zone=2)
[   28.390919] page_type: f5(slab)
[   28.391095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.391387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.391782] page dumped because: kasan: bad access detected
[   28.392071] 
[   28.392177] Memory state around the buggy address:
[   28.392408]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.392711]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.392962] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.393499]                                      ^
[   28.393750]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.394042]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.394337] ==================================================================
[   28.837936] ==================================================================
[   28.838349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   28.838787] Write of size 8 at addr ffff88810625b930 by task kunit_try_catch/314
[   28.839287] 
[   28.839411] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   28.839472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.839489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.839518] Call Trace:
[   28.839542]  <TASK>
[   28.839567]  dump_stack_lvl+0x73/0xb0
[   28.839628]  print_report+0xd1/0x650
[   28.839669]  ? __virt_addr_valid+0x1db/0x2d0
[   28.839701]  ? kasan_atomics_helper+0x18b1/0x5450
[   28.839785]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.839817]  ? kasan_atomics_helper+0x18b1/0x5450
[   28.839849]  kasan_report+0x141/0x180
[   28.839877]  ? kasan_atomics_helper+0x18b1/0x5450
[   28.839913]  kasan_check_range+0x10c/0x1c0
[   28.839941]  __kasan_check_write+0x18/0x20
[   28.839969]  kasan_atomics_helper+0x18b1/0x5450
[   28.840001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.840032]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.840062]  ? kasan_atomics+0x152/0x310
[   28.840094]  kasan_atomics+0x1dc/0x310
[   28.840120]  ? __pfx_kasan_atomics+0x10/0x10
[   28.840150]  ? __pfx_read_tsc+0x10/0x10
[   28.840177]  ? ktime_get_ts64+0x86/0x230
[   28.840208]  kunit_try_run_case+0x1a5/0x480
[   28.840246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.840275]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.840305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.840335]  ? __kthread_parkme+0x82/0x180
[   28.840360]  ? preempt_count_sub+0x50/0x80
[   28.840398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.840429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.840460]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.840491]  kthread+0x337/0x6f0
[   28.840516]  ? trace_preempt_on+0x20/0xc0
[   28.840546]  ? __pfx_kthread+0x10/0x10
[   28.840573]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.840602]  ? calculate_sigpending+0x7b/0xa0
[   28.840632]  ? __pfx_kthread+0x10/0x10
[   28.840658]  ret_from_fork+0x116/0x1d0
[   28.840682]  ? __pfx_kthread+0x10/0x10
[   28.840707]  ret_from_fork_asm+0x1a/0x30
[   28.840790]  </TASK>
[   28.840807] 
[   28.850654] Allocated by task 314:
[   28.850895]  kasan_save_stack+0x45/0x70
[   28.851115]  kasan_save_track+0x18/0x40
[   28.851365]  kasan_save_alloc_info+0x3b/0x50
[   28.851542]  __kasan_kmalloc+0xb7/0xc0
[   28.851790]  __kmalloc_cache_noprof+0x189/0x420
[   28.852187]  kasan_atomics+0x95/0x310
[   28.852421]  kunit_try_run_case+0x1a5/0x480
[   28.852677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.852917]  kthread+0x337/0x6f0
[   28.853102]  ret_from_fork+0x116/0x1d0
[   28.853440]  ret_from_fork_asm+0x1a/0x30
[   28.853701] 
[   28.853793] The buggy address belongs to the object at ffff88810625b900
[   28.853793]  which belongs to the cache kmalloc-64 of size 64
[   28.854498] The buggy address is located 0 bytes to the right of
[   28.854498]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   28.855155] 
[   28.855268] The buggy address belongs to the physical page:
[   28.855572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   28.855985] flags: 0x200000000000000(node=0|zone=2)
[   28.856321] page_type: f5(slab)
[   28.856469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.856728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.856978] page dumped because: kasan: bad access detected
[   28.857522] 
[   28.857628] Memory state around the buggy address:
[   28.857875]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.858201]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.858479] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.858829]                                      ^
[   28.859180]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.859624]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.859859] ==================================================================
[   27.873631] ==================================================================
[   27.873949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   27.874487] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.874800] 
[   27.874978] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.875038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.875054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.875081] Call Trace:
[   27.875105]  <TASK>
[   27.875129]  dump_stack_lvl+0x73/0xb0
[   27.875366]  print_report+0xd1/0x650
[   27.875423]  ? __virt_addr_valid+0x1db/0x2d0
[   27.875465]  ? kasan_atomics_helper+0x5fe/0x5450
[   27.875495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.875538]  ? kasan_atomics_helper+0x5fe/0x5450
[   27.875567]  kasan_report+0x141/0x180
[   27.875593]  ? kasan_atomics_helper+0x5fe/0x5450
[   27.875627]  kasan_check_range+0x10c/0x1c0
[   27.875654]  __kasan_check_write+0x18/0x20
[   27.875681]  kasan_atomics_helper+0x5fe/0x5450
[   27.875711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.875741]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.875771]  ? kasan_atomics+0x152/0x310
[   27.875800]  kasan_atomics+0x1dc/0x310
[   27.875825]  ? __pfx_kasan_atomics+0x10/0x10
[   27.875864]  ? __pfx_read_tsc+0x10/0x10
[   27.875902]  ? ktime_get_ts64+0x86/0x230
[   27.875937]  kunit_try_run_case+0x1a5/0x480
[   27.875968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.875996]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.876025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.876053]  ? __kthread_parkme+0x82/0x180
[   27.876078]  ? preempt_count_sub+0x50/0x80
[   27.876107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.876136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.876234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.876266]  kthread+0x337/0x6f0
[   27.876290]  ? trace_preempt_on+0x20/0xc0
[   27.876319]  ? __pfx_kthread+0x10/0x10
[   27.876344]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.876371]  ? calculate_sigpending+0x7b/0xa0
[   27.876412]  ? __pfx_kthread+0x10/0x10
[   27.876438]  ret_from_fork+0x116/0x1d0
[   27.876462]  ? __pfx_kthread+0x10/0x10
[   27.876486]  ret_from_fork_asm+0x1a/0x30
[   27.876523]  </TASK>
[   27.876538] 
[   27.886072] Allocated by task 314:
[   27.886228]  kasan_save_stack+0x45/0x70
[   27.886534]  kasan_save_track+0x18/0x40
[   27.886814]  kasan_save_alloc_info+0x3b/0x50
[   27.887223]  __kasan_kmalloc+0xb7/0xc0
[   27.887614]  __kmalloc_cache_noprof+0x189/0x420
[   27.887905]  kasan_atomics+0x95/0x310
[   27.888100]  kunit_try_run_case+0x1a5/0x480
[   27.888409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.888648]  kthread+0x337/0x6f0
[   27.888851]  ret_from_fork+0x116/0x1d0
[   27.889023]  ret_from_fork_asm+0x1a/0x30
[   27.889171] 
[   27.889245] The buggy address belongs to the object at ffff88810625b900
[   27.889245]  which belongs to the cache kmalloc-64 of size 64
[   27.889698] The buggy address is located 0 bytes to the right of
[   27.889698]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.890470] 
[   27.890621] The buggy address belongs to the physical page:
[   27.890807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.891646] flags: 0x200000000000000(node=0|zone=2)
[   27.892019] page_type: f5(slab)
[   27.892156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.892648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.892998] page dumped because: kasan: bad access detected
[   27.893180] 
[   27.893252] Memory state around the buggy address:
[   27.893642]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.894016]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.894475] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.894727]                                      ^
[   27.895044]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.895612]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.895923] ==================================================================
[   27.793903] ==================================================================
[   27.794523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   27.794896] Write of size 4 at addr ffff88810625b930 by task kunit_try_catch/314
[   27.795531] 
[   27.795696] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) 
[   27.795930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.795951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.795978] Call Trace:
[   27.796057]  <TASK>
[   27.796081]  dump_stack_lvl+0x73/0xb0
[   27.796114]  print_report+0xd1/0x650
[   27.796140]  ? __virt_addr_valid+0x1db/0x2d0
[   27.796167]  ? kasan_atomics_helper+0x4a0/0x5450
[   27.796197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.796232]  ? kasan_atomics_helper+0x4a0/0x5450
[   27.796261]  kasan_report+0x141/0x180
[   27.796286]  ? kasan_atomics_helper+0x4a0/0x5450
[   27.796319]  kasan_check_range+0x10c/0x1c0
[   27.796346]  __kasan_check_write+0x18/0x20
[   27.796373]  kasan_atomics_helper+0x4a0/0x5450
[   27.796415]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.796443]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.796471]  ? kasan_atomics+0x152/0x310
[   27.796500]  kasan_atomics+0x1dc/0x310
[   27.796525]  ? __pfx_kasan_atomics+0x10/0x10
[   27.796552]  ? __pfx_read_tsc+0x10/0x10
[   27.796577]  ? ktime_get_ts64+0x86/0x230
[   27.796606]  kunit_try_run_case+0x1a5/0x480
[   27.796636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.796662]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.796690]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.796718]  ? __kthread_parkme+0x82/0x180
[   27.796742]  ? preempt_count_sub+0x50/0x80
[   27.796768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.796796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.796824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.796852]  kthread+0x337/0x6f0
[   27.796874]  ? trace_preempt_on+0x20/0xc0
[   27.796902]  ? __pfx_kthread+0x10/0x10
[   27.796925]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.796951]  ? calculate_sigpending+0x7b/0xa0
[   27.796981]  ? __pfx_kthread+0x10/0x10
[   27.797005]  ret_from_fork+0x116/0x1d0
[   27.797027]  ? __pfx_kthread+0x10/0x10
[   27.797063]  ret_from_fork_asm+0x1a/0x30
[   27.797100]  </TASK>
[   27.797114] 
[   27.807686] Allocated by task 314:
[   27.807889]  kasan_save_stack+0x45/0x70
[   27.808088]  kasan_save_track+0x18/0x40
[   27.808764]  kasan_save_alloc_info+0x3b/0x50
[   27.809043]  __kasan_kmalloc+0xb7/0xc0
[   27.809231]  __kmalloc_cache_noprof+0x189/0x420
[   27.809576]  kasan_atomics+0x95/0x310
[   27.809851]  kunit_try_run_case+0x1a5/0x480
[   27.810301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.810564]  kthread+0x337/0x6f0
[   27.810890]  ret_from_fork+0x116/0x1d0
[   27.811112]  ret_from_fork_asm+0x1a/0x30
[   27.811477] 
[   27.811585] The buggy address belongs to the object at ffff88810625b900
[   27.811585]  which belongs to the cache kmalloc-64 of size 64
[   27.812301] The buggy address is located 0 bytes to the right of
[   27.812301]  allocated 48-byte region [ffff88810625b900, ffff88810625b930)
[   27.812795] 
[   27.812899] The buggy address belongs to the physical page:
[   27.813148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10625b
[   27.813820] flags: 0x200000000000000(node=0|zone=2)
[   27.814154] page_type: f5(slab)
[   27.814345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.814862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.815277] page dumped because: kasan: bad access detected
[   27.815675] 
[   27.815762] Memory state around the buggy address:
[   27.816075]  ffff88810625b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.816532]  ffff88810625b880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.816962] >ffff88810625b900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.817273]                                      ^
[   27.817717]  ffff88810625b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.818289]  ffff88810625ba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.818615] ==================================================================