Hay
Date
July 25, 2025, 3:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   35.161971] ==================================================================
[   35.162024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.162489] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.162786] 
[   35.162823] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.162994] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.163085] Hardware name: linux,dummy-virt (DT)
[   35.163435] Call trace:
[   35.163497]  show_stack+0x20/0x38 (C)
[   35.163625]  dump_stack_lvl+0x8c/0xd0
[   35.163743]  print_report+0x118/0x5e8
[   35.163849]  kasan_report+0xdc/0x128
[   35.164231]  __asan_report_load4_noabort+0x20/0x30
[   35.164318]  kasan_atomics_helper+0x3dd8/0x4858
[   35.164631]  kasan_atomics+0x198/0x2e0
[   35.164756]  kunit_try_run_case+0x170/0x3f0
[   35.164871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.165032]  kthread+0x328/0x630
[   35.165268]  ret_from_fork+0x10/0x20
[   35.165502] 
[   35.165555] Allocated by task 297:
[   35.165605]  kasan_save_stack+0x3c/0x68
[   35.166010]  kasan_save_track+0x20/0x40
[   35.166250]  kasan_save_alloc_info+0x40/0x58
[   35.166406]  __kasan_kmalloc+0xd4/0xd8
[   35.166714]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.166842]  kasan_atomics+0xb8/0x2e0
[   35.167020]  kunit_try_run_case+0x170/0x3f0
[   35.167159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.167274]  kthread+0x328/0x630
[   35.167531]  ret_from_fork+0x10/0x20
[   35.167775] 
[   35.167820] The buggy address belongs to the object at fff00000c9a5e780
[   35.167820]  which belongs to the cache kmalloc-64 of size 64
[   35.167910] The buggy address is located 0 bytes to the right of
[   35.167910]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.167979] 
[   35.168016] The buggy address belongs to the physical page:
[   35.168193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.168261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.168313] page_type: f5(slab)
[   35.168652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.168784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.169286] page dumped because: kasan: bad access detected
[   35.169403] 
[   35.169424] Memory state around the buggy address:
[   35.169461]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.169515]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.169989] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.170282]                                      ^
[   35.170378]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.170540]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.170589] ==================================================================
[   35.052836] ==================================================================
[   35.052902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.052959] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.053137] 
[   35.053298] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.053694] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.053893] Hardware name: linux,dummy-virt (DT)
[   35.054061] Call trace:
[   35.054091]  show_stack+0x20/0x38 (C)
[   35.054147]  dump_stack_lvl+0x8c/0xd0
[   35.054477]  print_report+0x118/0x5e8
[   35.054551]  kasan_report+0xdc/0x128
[   35.055004]  __asan_report_load4_noabort+0x20/0x30
[   35.055241]  kasan_atomics_helper+0x42d8/0x4858
[   35.055442]  kasan_atomics+0x198/0x2e0
[   35.055565]  kunit_try_run_case+0x170/0x3f0
[   35.055658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.055726]  kthread+0x328/0x630
[   35.055769]  ret_from_fork+0x10/0x20
[   35.055820] 
[   35.055845] Allocated by task 297:
[   35.055888]  kasan_save_stack+0x3c/0x68
[   35.055931]  kasan_save_track+0x20/0x40
[   35.055967]  kasan_save_alloc_info+0x40/0x58
[   35.056008]  __kasan_kmalloc+0xd4/0xd8
[   35.056045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.056089]  kasan_atomics+0xb8/0x2e0
[   35.056126]  kunit_try_run_case+0x170/0x3f0
[   35.056177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.056222]  kthread+0x328/0x630
[   35.056255]  ret_from_fork+0x10/0x20
[   35.056300] 
[   35.056324] The buggy address belongs to the object at fff00000c9a5e780
[   35.056324]  which belongs to the cache kmalloc-64 of size 64
[   35.056383] The buggy address is located 0 bytes to the right of
[   35.056383]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.057505] page dumped because: kasan: bad access detected
[   35.057671] 
[   35.057870] Memory state around the buggy address:
[   35.058090]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.059104]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.061600] 
[   35.062438] Hardware name: linux,dummy-virt (DT)
[   35.063850]  kasan_atomics+0x198/0x2e0
[   35.066600] 
[   35.066658] The buggy address belongs to the object at fff00000c9a5e780
[   35.066658]  which belongs to the cache kmalloc-64 of size 64
[   35.067036] The buggy address is located 0 bytes to the right of
[   35.067036]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.067314] 
[   35.067532] The buggy address belongs to the physical page:
[   35.067727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.067870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.068008] page_type: f5(slab)
[   35.068083] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.068170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.068259] page dumped because: kasan: bad access detected
[   35.068406] 
[   35.068442] Memory state around the buggy address:
[   35.068670]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.068735]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.068805] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.068846]                                      ^
[   35.068895]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.068942]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.068982] ==================================================================
[   35.381588] ==================================================================
[   35.381769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   35.381855] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.381908] 
[   35.382227] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.382344] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.382379] Hardware name: linux,dummy-virt (DT)
[   35.382872] Call trace:
[   35.383219]  show_stack+0x20/0x38 (C)
[   35.383288]  dump_stack_lvl+0x8c/0xd0
[   35.383374]  print_report+0x118/0x5e8
[   35.383458]  kasan_report+0xdc/0x128
[   35.383540]  kasan_check_range+0x100/0x1a8
[   35.383628]  __kasan_check_write+0x20/0x30
[   35.384013]  kasan_atomics_helper+0x147c/0x4858
[   35.384538]  kasan_atomics+0x198/0x2e0
[   35.384649]  kunit_try_run_case+0x170/0x3f0
[   35.384734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.384909]  kthread+0x328/0x630
[   35.384984]  ret_from_fork+0x10/0x20
[   35.385063] 
[   35.385107] Allocated by task 297:
[   35.385164]  kasan_save_stack+0x3c/0x68
[   35.385208]  kasan_save_track+0x20/0x40
[   35.385254]  kasan_save_alloc_info+0x40/0x58
[   35.385295]  __kasan_kmalloc+0xd4/0xd8
[   35.385332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.385376]  kasan_atomics+0xb8/0x2e0
[   35.385437]  kunit_try_run_case+0x170/0x3f0
[   35.385478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.385523]  kthread+0x328/0x630
[   35.385559]  ret_from_fork+0x10/0x20
[   35.385597] 
[   35.385628] The buggy address belongs to the object at fff00000c9a5e780
[   35.385628]  which belongs to the cache kmalloc-64 of size 64
[   35.385702] The buggy address is located 0 bytes to the right of
[   35.385702]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.385777] 
[   35.385800] The buggy address belongs to the physical page:
[   35.385845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.385903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.385952] page_type: f5(slab)
[   35.385993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.386043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.386085] page dumped because: kasan: bad access detected
[   35.386118] 
[   35.386141] Memory state around the buggy address:
[   35.386175]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.386235]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.386281] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.386330]                                      ^
[   35.386387]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.386435]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.386475] ==================================================================
[   35.287024] ==================================================================
[   35.287142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   35.287229] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.287290] 
[   35.287557] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.287997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.288433] Hardware name: linux,dummy-virt (DT)
[   35.288908] Call trace:
[   35.288965]  show_stack+0x20/0x38 (C)
[   35.289144]  dump_stack_lvl+0x8c/0xd0
[   35.289742]  print_report+0x118/0x5e8
[   35.289950]  kasan_report+0xdc/0x128
[   35.290004]  kasan_check_range+0x100/0x1a8
[   35.290052]  __kasan_check_write+0x20/0x30
[   35.290692]  kasan_atomics_helper+0x10c0/0x4858
[   35.290784]  kasan_atomics+0x198/0x2e0
[   35.290925]  kunit_try_run_case+0x170/0x3f0
[   35.291031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.291181]  kthread+0x328/0x630
[   35.291229]  ret_from_fork+0x10/0x20
[   35.291280] 
[   35.291312] Allocated by task 297:
[   35.291668]  kasan_save_stack+0x3c/0x68
[   35.291938]  kasan_save_track+0x20/0x40
[   35.292189]  kasan_save_alloc_info+0x40/0x58
[   35.292281]  __kasan_kmalloc+0xd4/0xd8
[   35.292353]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.292683]  kasan_atomics+0xb8/0x2e0
[   35.292770]  kunit_try_run_case+0x170/0x3f0
[   35.292813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.293175]  kthread+0x328/0x630
[   35.293605]  ret_from_fork+0x10/0x20
[   35.293744] 
[   35.293791] The buggy address belongs to the object at fff00000c9a5e780
[   35.293791]  which belongs to the cache kmalloc-64 of size 64
[   35.294055] The buggy address is located 0 bytes to the right of
[   35.294055]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.294254] 
[   35.294292] The buggy address belongs to the physical page:
[   35.294560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.294801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.294932] page_type: f5(slab)
[   35.295446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.295573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.295704] page dumped because: kasan: bad access detected
[   35.295780] 
[   35.295905] Memory state around the buggy address:
[   35.295942]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.295988]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.296033] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.296502]                                      ^
[   35.296572]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.297073]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.297217] ==================================================================
[   35.239848] ==================================================================
[   35.240290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.241249] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.241322] 
[   35.241396] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.241499] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.241533] Hardware name: linux,dummy-virt (DT)
[   35.241575] Call trace:
[   35.241614]  show_stack+0x20/0x38 (C)
[   35.241789]  dump_stack_lvl+0x8c/0xd0
[   35.242038]  print_report+0x118/0x5e8
[   35.242111]  kasan_report+0xdc/0x128
[   35.242201]  kasan_check_range+0x100/0x1a8
[   35.242278]  __kasan_check_write+0x20/0x30
[   35.242328]  kasan_atomics_helper+0xeb8/0x4858
[   35.242695]  kasan_atomics+0x198/0x2e0
[   35.242926]  kunit_try_run_case+0x170/0x3f0
[   35.243307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.243443]  kthread+0x328/0x630
[   35.243493]  ret_from_fork+0x10/0x20
[   35.243565] 
[   35.243589] Allocated by task 297:
[   35.243623]  kasan_save_stack+0x3c/0x68
[   35.243986]  kasan_save_track+0x20/0x40
[   35.244218]  kasan_save_alloc_info+0x40/0x58
[   35.244352]  __kasan_kmalloc+0xd4/0xd8
[   35.244922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.245129]  kasan_atomics+0xb8/0x2e0
[   35.245354]  kunit_try_run_case+0x170/0x3f0
[   35.245409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.245837]  kthread+0x328/0x630
[   35.246061]  ret_from_fork+0x10/0x20
[   35.246340] 
[   35.246578] The buggy address belongs to the object at fff00000c9a5e780
[   35.246578]  which belongs to the cache kmalloc-64 of size 64
[   35.246903] The buggy address is located 0 bytes to the right of
[   35.246903]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.247074] 
[   35.247294] The buggy address belongs to the physical page:
[   35.247364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.247442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.247504] page_type: f5(slab)
[   35.247552] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.247603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.247658] page dumped because: kasan: bad access detected
[   35.247701] 
[   35.247725] Memory state around the buggy address:
[   35.247768]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.247839]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.247886] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.247927]                                      ^
[   35.247962]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.248016]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.248065] ==================================================================
[   35.229295] ==================================================================
[   35.229378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.229437] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.229707] 
[   35.229994] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.230099] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.230134] Hardware name: linux,dummy-virt (DT)
[   35.230353] Call trace:
[   35.230805]  show_stack+0x20/0x38 (C)
[   35.230988]  dump_stack_lvl+0x8c/0xd0
[   35.231276]  print_report+0x118/0x5e8
[   35.231358]  kasan_report+0xdc/0x128
[   35.231599]  __asan_report_store8_noabort+0x20/0x30
[   35.231913]  kasan_atomics_helper+0x3e5c/0x4858
[   35.232329]  kasan_atomics+0x198/0x2e0
[   35.232605]  kunit_try_run_case+0x170/0x3f0
[   35.232809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.233190]  kthread+0x328/0x630
[   35.233305]  ret_from_fork+0x10/0x20
[   35.233715] 
[   35.233748] Allocated by task 297:
[   35.233798]  kasan_save_stack+0x3c/0x68
[   35.234215]  kasan_save_track+0x20/0x40
[   35.234279]  kasan_save_alloc_info+0x40/0x58
[   35.234322]  __kasan_kmalloc+0xd4/0xd8
[   35.234360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.234407]  kasan_atomics+0xb8/0x2e0
[   35.234999]  kunit_try_run_case+0x170/0x3f0
[   35.235082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.235247]  kthread+0x328/0x630
[   35.235632]  ret_from_fork+0x10/0x20
[   35.235839] 
[   35.235921] The buggy address belongs to the object at fff00000c9a5e780
[   35.235921]  which belongs to the cache kmalloc-64 of size 64
[   35.236048] The buggy address is located 0 bytes to the right of
[   35.236048]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.236505] 
[   35.236560] The buggy address belongs to the physical page:
[   35.236928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.237329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.237764] page_type: f5(slab)
[   35.237903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.237966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.238025] page dumped because: kasan: bad access detected
[   35.238069] 
[   35.238092] Memory state around the buggy address:
[   35.238136]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.238200]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.238265] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.238307]                                      ^
[   35.238343]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.238387]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.238437] ==================================================================
[   35.361401] ==================================================================
[   35.361485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   35.361624] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.361694] 
[   35.361737] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.362164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.362222] Hardware name: linux,dummy-virt (DT)
[   35.362269] Call trace:
[   35.362295]  show_stack+0x20/0x38 (C)
[   35.363232]  dump_stack_lvl+0x8c/0xd0
[   35.363327]  print_report+0x118/0x5e8
[   35.363404]  kasan_report+0xdc/0x128
[   35.363480]  __asan_report_load8_noabort+0x20/0x30
[   35.363797]  kasan_atomics_helper+0x3f04/0x4858
[   35.364234]  kasan_atomics+0x198/0x2e0
[   35.364346]  kunit_try_run_case+0x170/0x3f0
[   35.365039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.365627]  kthread+0x328/0x630
[   35.366276]  ret_from_fork+0x10/0x20
[   35.366976] 
[   35.367049] Allocated by task 297:
[   35.367123]  kasan_save_stack+0x3c/0x68
[   35.367172]  kasan_save_track+0x20/0x40
[   35.367211]  kasan_save_alloc_info+0x40/0x58
[   35.367251]  __kasan_kmalloc+0xd4/0xd8
[   35.367674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.368107]  kasan_atomics+0xb8/0x2e0
[   35.368172]  kunit_try_run_case+0x170/0x3f0
[   35.368215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.368569]  kthread+0x328/0x630
[   35.368799]  ret_from_fork+0x10/0x20
[   35.368946] 
[   35.369066] The buggy address belongs to the object at fff00000c9a5e780
[   35.369066]  which belongs to the cache kmalloc-64 of size 64
[   35.369134] The buggy address is located 0 bytes to the right of
[   35.369134]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.369199] 
[   35.369251] The buggy address belongs to the physical page:
[   35.369290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.369358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.369426] page_type: f5(slab)
[   35.369480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.369539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.369580] page dumped because: kasan: bad access detected
[   35.369614] 
[   35.369667] Memory state around the buggy address:
[   35.369710]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.369777]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.369831] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.369879]                                      ^
[   35.369930]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.369984]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.370033] ==================================================================
[   35.426281] ==================================================================
[   35.426806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   35.426887] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.426940] 
[   35.427059] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.427278] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.427333] Hardware name: linux,dummy-virt (DT)
[   35.427384] Call trace:
[   35.427440]  show_stack+0x20/0x38 (C)
[   35.427753]  dump_stack_lvl+0x8c/0xd0
[   35.428360]  print_report+0x118/0x5e8
[   35.428446]  kasan_report+0xdc/0x128
[   35.428655]  kasan_check_range+0x100/0x1a8
[   35.428987]  __kasan_check_write+0x20/0x30
[   35.429219]  kasan_atomics_helper+0x1644/0x4858
[   35.429282]  kasan_atomics+0x198/0x2e0
[   35.429358]  kunit_try_run_case+0x170/0x3f0
[   35.429409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.429480]  kthread+0x328/0x630
[   35.429534]  ret_from_fork+0x10/0x20
[   35.429584] 
[   35.429609] Allocated by task 297:
[   35.430077]  kasan_save_stack+0x3c/0x68
[   35.430150]  kasan_save_track+0x20/0x40
[   35.430672]  kasan_save_alloc_info+0x40/0x58
[   35.430979]  __kasan_kmalloc+0xd4/0xd8
[   35.431177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.431530]  kasan_atomics+0xb8/0x2e0
[   35.431693]  kunit_try_run_case+0x170/0x3f0
[   35.431822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.431872]  kthread+0x328/0x630
[   35.431909]  ret_from_fork+0x10/0x20
[   35.431955] 
[   35.431979] The buggy address belongs to the object at fff00000c9a5e780
[   35.431979]  which belongs to the cache kmalloc-64 of size 64
[   35.432625] The buggy address is located 0 bytes to the right of
[   35.432625]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.432745] 
[   35.432799] The buggy address belongs to the physical page:
[   35.433097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.433495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.433720] page_type: f5(slab)
[   35.433845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.434078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.434415] page dumped because: kasan: bad access detected
[   35.434494] 
[   35.434564] Memory state around the buggy address:
[   35.434912]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.435102]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.435150] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.435526]                                      ^
[   35.435619]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.435725]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.435785] ==================================================================
[   35.417405] ==================================================================
[   35.417691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   35.417824] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.417913] 
[   35.417950] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.418037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.418071] Hardware name: linux,dummy-virt (DT)
[   35.418104] Call trace:
[   35.418130]  show_stack+0x20/0x38 (C)
[   35.418182]  dump_stack_lvl+0x8c/0xd0
[   35.418231]  print_report+0x118/0x5e8
[   35.418279]  kasan_report+0xdc/0x128
[   35.418324]  __asan_report_load8_noabort+0x20/0x30
[   35.418374]  kasan_atomics_helper+0x3db0/0x4858
[   35.418535]  kasan_atomics+0x198/0x2e0
[   35.418595]  kunit_try_run_case+0x170/0x3f0
[   35.418659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.418714]  kthread+0x328/0x630
[   35.418779]  ret_from_fork+0x10/0x20
[   35.418842] 
[   35.418876] Allocated by task 297:
[   35.418909]  kasan_save_stack+0x3c/0x68
[   35.419886]  kasan_save_track+0x20/0x40
[   35.419974]  kasan_save_alloc_info+0x40/0x58
[   35.420570]  __kasan_kmalloc+0xd4/0xd8
[   35.420792]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.421219]  kasan_atomics+0xb8/0x2e0
[   35.421327]  kunit_try_run_case+0x170/0x3f0
[   35.421431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.421523]  kthread+0x328/0x630
[   35.421869]  ret_from_fork+0x10/0x20
[   35.422200] 
[   35.422400] The buggy address belongs to the object at fff00000c9a5e780
[   35.422400]  which belongs to the cache kmalloc-64 of size 64
[   35.422469] The buggy address is located 0 bytes to the right of
[   35.422469]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.422786] 
[   35.423119] The buggy address belongs to the physical page:
[   35.423204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.423324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.423470] page_type: f5(slab)
[   35.423605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.423735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.424090] page dumped because: kasan: bad access detected
[   35.424160] 
[   35.424208] Memory state around the buggy address:
[   35.424339]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.424426]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.424479] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.424519]                                      ^
[   35.424715]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.424783]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.424942] ==================================================================
[   34.903792] ==================================================================
[   34.903861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   34.903917] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   34.904342] 
[   34.904394] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   34.905922]  kasan_atomics+0x198/0x2e0
[   34.906925]  kasan_save_track+0x20/0x40
[   34.909004] The buggy address is located 0 bytes to the right of
[   34.909004]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   34.909634] 
[   34.909759]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.912867] ==================================================================
[   35.248996] ==================================================================
[   35.249050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   35.249608] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.249705] 
[   35.249888] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.250242] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.250333] Hardware name: linux,dummy-virt (DT)
[   35.250371] Call trace:
[   35.250397]  show_stack+0x20/0x38 (C)
[   35.250470]  dump_stack_lvl+0x8c/0xd0
[   35.250631]  print_report+0x118/0x5e8
[   35.250799]  kasan_report+0xdc/0x128
[   35.250852]  kasan_check_range+0x100/0x1a8
[   35.251024]  __kasan_check_write+0x20/0x30
[   35.251323]  kasan_atomics_helper+0xf20/0x4858
[   35.251452]  kasan_atomics+0x198/0x2e0
[   35.251542]  kunit_try_run_case+0x170/0x3f0
[   35.251917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.252312]  kthread+0x328/0x630
[   35.252525]  ret_from_fork+0x10/0x20
[   35.252776] 
[   35.252827] Allocated by task 297:
[   35.252864]  kasan_save_stack+0x3c/0x68
[   35.253332]  kasan_save_track+0x20/0x40
[   35.253537]  kasan_save_alloc_info+0x40/0x58
[   35.253979]  __kasan_kmalloc+0xd4/0xd8
[   35.254150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.254319]  kasan_atomics+0xb8/0x2e0
[   35.254517]  kunit_try_run_case+0x170/0x3f0
[   35.254665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.254925]  kthread+0x328/0x630
[   35.254991]  ret_from_fork+0x10/0x20
[   35.255170] 
[   35.255487] The buggy address belongs to the object at fff00000c9a5e780
[   35.255487]  which belongs to the cache kmalloc-64 of size 64
[   35.255589] The buggy address is located 0 bytes to the right of
[   35.255589]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.255666] 
[   35.255689] The buggy address belongs to the physical page:
[   35.255887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.256376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.256471] page_type: f5(slab)
[   35.256527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.256622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.256705] page dumped because: kasan: bad access detected
[   35.256741] 
[   35.256787] Memory state around the buggy address:
[   35.256824]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.256870]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.256914] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.256964]                                      ^
[   35.257000]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.257044]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.257085] ==================================================================
[   35.407891] ==================================================================
[   35.407958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   35.408092] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.408317] 
[   35.408493] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.408775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.408986] Hardware name: linux,dummy-virt (DT)
[   35.409062] Call trace:
[   35.409119]  show_stack+0x20/0x38 (C)
[   35.409494]  dump_stack_lvl+0x8c/0xd0
[   35.409570]  print_report+0x118/0x5e8
[   35.409700]  kasan_report+0xdc/0x128
[   35.409754]  kasan_check_range+0x100/0x1a8
[   35.409804]  __kasan_check_write+0x20/0x30
[   35.410377]  kasan_atomics_helper+0x15b4/0x4858
[   35.410466]  kasan_atomics+0x198/0x2e0
[   35.410517]  kunit_try_run_case+0x170/0x3f0
[   35.410603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.410683]  kthread+0x328/0x630
[   35.410741]  ret_from_fork+0x10/0x20
[   35.410793] 
[   35.410822] Allocated by task 297:
[   35.410865]  kasan_save_stack+0x3c/0x68
[   35.410908]  kasan_save_track+0x20/0x40
[   35.411313]  kasan_save_alloc_info+0x40/0x58
[   35.411392]  __kasan_kmalloc+0xd4/0xd8
[   35.411455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.411653]  kasan_atomics+0xb8/0x2e0
[   35.411876]  kunit_try_run_case+0x170/0x3f0
[   35.412112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.412247]  kthread+0x328/0x630
[   35.412470]  ret_from_fork+0x10/0x20
[   35.412519] 
[   35.412727] The buggy address belongs to the object at fff00000c9a5e780
[   35.412727]  which belongs to the cache kmalloc-64 of size 64
[   35.412926] The buggy address is located 0 bytes to the right of
[   35.412926]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.413029] 
[   35.413502] The buggy address belongs to the physical page:
[   35.413705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.414146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.414264] page_type: f5(slab)
[   35.414311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.414717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.414779] page dumped because: kasan: bad access detected
[   35.415155] 
[   35.415265] Memory state around the buggy address:
[   35.415345]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.415490]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.415537] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.415600]                                      ^
[   35.415637]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.416031]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.416118] ==================================================================
[   35.108888] ==================================================================
[   35.109118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.109301] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.109404] 
[   35.109446] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.109546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.109580] Hardware name: linux,dummy-virt (DT)
[   35.110256]  kasan_report+0xdc/0x128
[   35.112931]  kasan_atomics+0xb8/0x2e0
[   35.114541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.115307] 
[   35.115375]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.119564] ==================================================================
[   35.258686] ==================================================================
[   35.258869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   35.258979] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.259414] 
[   35.259623] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.259779] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.260232] Hardware name: linux,dummy-virt (DT)
[   35.260364] Call trace:
[   35.260514]  show_stack+0x20/0x38 (C)
[   35.260572]  dump_stack_lvl+0x8c/0xd0
[   35.260915]  print_report+0x118/0x5e8
[   35.261280]  kasan_report+0xdc/0x128
[   35.261425]  kasan_check_range+0x100/0x1a8
[   35.261499]  __kasan_check_write+0x20/0x30
[   35.262237]  kasan_atomics_helper+0xf88/0x4858
[   35.262351]  kasan_atomics+0x198/0x2e0
[   35.262528]  kunit_try_run_case+0x170/0x3f0
[   35.263043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.263453]  kthread+0x328/0x630
[   35.263549]  ret_from_fork+0x10/0x20
[   35.263605] 
[   35.263631] Allocated by task 297:
[   35.263679]  kasan_save_stack+0x3c/0x68
[   35.263960]  kasan_save_track+0x20/0x40
[   35.264274]  kasan_save_alloc_info+0x40/0x58
[   35.264422]  __kasan_kmalloc+0xd4/0xd8
[   35.264502]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.264551]  kasan_atomics+0xb8/0x2e0
[   35.264938]  kunit_try_run_case+0x170/0x3f0
[   35.265097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.265189]  kthread+0x328/0x630
[   35.265228]  ret_from_fork+0x10/0x20
[   35.265293] 
[   35.265318] The buggy address belongs to the object at fff00000c9a5e780
[   35.265318]  which belongs to the cache kmalloc-64 of size 64
[   35.265378] The buggy address is located 0 bytes to the right of
[   35.265378]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.265451] 
[   35.265483] The buggy address belongs to the physical page:
[   35.265520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.265578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.265658] page_type: f5(slab)
[   35.265700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.265760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.265803] page dumped because: kasan: bad access detected
[   35.265847] 
[   35.265876] Memory state around the buggy address:
[   35.265930]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.265989]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.266044] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.266085]                                      ^
[   35.266120]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.266164]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.266205] ==================================================================
[   35.477980] ==================================================================
[   35.478519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   35.478600] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.478664] 
[   35.478929] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.479270] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.479352] Hardware name: linux,dummy-virt (DT)
[   35.479704] Call trace:
[   35.479912]  show_stack+0x20/0x38 (C)
[   35.480052]  dump_stack_lvl+0x8c/0xd0
[   35.480281]  print_report+0x118/0x5e8
[   35.480557]  kasan_report+0xdc/0x128
[   35.480651]  kasan_check_range+0x100/0x1a8
[   35.481149]  __kasan_check_write+0x20/0x30
[   35.481253]  kasan_atomics_helper+0x17ec/0x4858
[   35.481309]  kasan_atomics+0x198/0x2e0
[   35.481358]  kunit_try_run_case+0x170/0x3f0
[   35.482069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.482159]  kthread+0x328/0x630
[   35.482371]  ret_from_fork+0x10/0x20
[   35.482616] 
[   35.482687] Allocated by task 297:
[   35.482939]  kasan_save_stack+0x3c/0x68
[   35.483045]  kasan_save_track+0x20/0x40
[   35.483319]  kasan_save_alloc_info+0x40/0x58
[   35.483567]  __kasan_kmalloc+0xd4/0xd8
[   35.483749]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.483878]  kasan_atomics+0xb8/0x2e0
[   35.484481]  kunit_try_run_case+0x170/0x3f0
[   35.484736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.484827]  kthread+0x328/0x630
[   35.485168]  ret_from_fork+0x10/0x20
[   35.485352] 
[   35.485492] The buggy address belongs to the object at fff00000c9a5e780
[   35.485492]  which belongs to the cache kmalloc-64 of size 64
[   35.485735] The buggy address is located 0 bytes to the right of
[   35.485735]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.485810] 
[   35.485833] The buggy address belongs to the physical page:
[   35.485869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.485926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.485977] page_type: f5(slab)
[   35.486017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.486068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.486111] page dumped because: kasan: bad access detected
[   35.486229] 
[   35.486253] Memory state around the buggy address:
[   35.486290]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.486345]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.486396] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.486436]                                      ^
[   35.486480]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.486534]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.486583] ==================================================================
[   35.091907] ==================================================================
[   35.092143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.092275] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.092363] 
[   35.092684] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.092795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.092831] Hardware name: linux,dummy-virt (DT)
[   35.092895] Call trace:
[   35.092927]  show_stack+0x20/0x38 (C)
[   35.092985]  dump_stack_lvl+0x8c/0xd0
[   35.093037]  print_report+0x118/0x5e8
[   35.093099]  kasan_report+0xdc/0x128
[   35.093147]  kasan_check_range+0x100/0x1a8
[   35.093195]  __kasan_check_write+0x20/0x30
[   35.093242]  kasan_atomics_helper+0xa6c/0x4858
[   35.093291]  kasan_atomics+0x198/0x2e0
[   35.093340]  kunit_try_run_case+0x170/0x3f0
[   35.093388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.093439]  kthread+0x328/0x630
[   35.093485]  ret_from_fork+0x10/0x20
[   35.093542] 
[   35.093566] Allocated by task 297:
[   35.093599]  kasan_save_stack+0x3c/0x68
[   35.093658]  kasan_save_track+0x20/0x40
[   35.093698]  kasan_save_alloc_info+0x40/0x58
[   35.093748]  __kasan_kmalloc+0xd4/0xd8
[   35.093785]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.093828]  kasan_atomics+0xb8/0x2e0
[   35.093869]  kunit_try_run_case+0x170/0x3f0
[   35.093908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.093953]  kthread+0x328/0x630
[   35.093997]  ret_from_fork+0x10/0x20
[   35.094046] 
[   35.094068] The buggy address belongs to the object at fff00000c9a5e780
[   35.094068]  which belongs to the cache kmalloc-64 of size 64
[   35.094136] The buggy address is located 0 bytes to the right of
[   35.094136]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.094210] 
[   35.094233] The buggy address belongs to the physical page:
[   35.094281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.094348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.094409] page_type: f5(slab)
[   35.094451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.094505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.094556] page dumped because: kasan: bad access detected
[   35.094590] 
[   35.094612] Memory state around the buggy address:
[   35.095164]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.096037]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.096134] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.096280]                                      ^
[   35.096606]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.096910]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.097310] ==================================================================
[   35.454438] ==================================================================
[   35.454491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   35.454545] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.454596] 
[   35.454628] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.454742] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.454774] Hardware name: linux,dummy-virt (DT)
[   35.454807] Call trace:
[   35.454831]  show_stack+0x20/0x38 (C)
[   35.454881]  dump_stack_lvl+0x8c/0xd0
[   35.454931]  print_report+0x118/0x5e8
[   35.454992]  kasan_report+0xdc/0x128
[   35.455039]  __asan_report_load8_noabort+0x20/0x30
[   35.455090]  kasan_atomics_helper+0x3e10/0x4858
[   35.455729]  kasan_atomics+0x198/0x2e0
[   35.455807]  kunit_try_run_case+0x170/0x3f0
[   35.455888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.456398]  kthread+0x328/0x630
[   35.456478]  ret_from_fork+0x10/0x20
[   35.457037] 
[   35.457220] Allocated by task 297:
[   35.457278]  kasan_save_stack+0x3c/0x68
[   35.457357]  kasan_save_track+0x20/0x40
[   35.457689]  kasan_save_alloc_info+0x40/0x58
[   35.457754]  __kasan_kmalloc+0xd4/0xd8
[   35.458085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.458487]  kasan_atomics+0xb8/0x2e0
[   35.458560]  kunit_try_run_case+0x170/0x3f0
[   35.458635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.458692]  kthread+0x328/0x630
[   35.458902]  ret_from_fork+0x10/0x20
[   35.459087] 
[   35.459278] The buggy address belongs to the object at fff00000c9a5e780
[   35.459278]  which belongs to the cache kmalloc-64 of size 64
[   35.459714] The buggy address is located 0 bytes to the right of
[   35.459714]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.459965] 
[   35.460003] The buggy address belongs to the physical page:
[   35.460056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.460413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.460660] page_type: f5(slab)
[   35.460729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.460880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.460970] page dumped because: kasan: bad access detected
[   35.461045] 
[   35.461436] Memory state around the buggy address:
[   35.461614]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.461707]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.461761] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.462053]                                      ^
[   35.462197]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.462267]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.462563] ==================================================================
[   35.388330] ==================================================================
[   35.388700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   35.388770] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.388822] 
[   35.389228] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.389352] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.389450] Hardware name: linux,dummy-virt (DT)
[   35.389517] Call trace:
[   35.389555]  show_stack+0x20/0x38 (C)
[   35.389762]  dump_stack_lvl+0x8c/0xd0
[   35.389851]  print_report+0x118/0x5e8
[   35.389905]  kasan_report+0xdc/0x128
[   35.390299]  kasan_check_range+0x100/0x1a8
[   35.390436]  __kasan_check_write+0x20/0x30
[   35.390774]  kasan_atomics_helper+0x14e4/0x4858
[   35.390861]  kasan_atomics+0x198/0x2e0
[   35.390946]  kunit_try_run_case+0x170/0x3f0
[   35.391038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.391348]  kthread+0x328/0x630
[   35.391513]  ret_from_fork+0x10/0x20
[   35.391568] 
[   35.391606] Allocated by task 297:
[   35.391655]  kasan_save_stack+0x3c/0x68
[   35.391947]  kasan_save_track+0x20/0x40
[   35.392385]  kasan_save_alloc_info+0x40/0x58
[   35.392460]  __kasan_kmalloc+0xd4/0xd8
[   35.392521]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.392586]  kasan_atomics+0xb8/0x2e0
[   35.392939]  kunit_try_run_case+0x170/0x3f0
[   35.393289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.393370]  kthread+0x328/0x630
[   35.393485]  ret_from_fork+0x10/0x20
[   35.393525] 
[   35.394138] The buggy address belongs to the object at fff00000c9a5e780
[   35.394138]  which belongs to the cache kmalloc-64 of size 64
[   35.394512] The buggy address is located 0 bytes to the right of
[   35.394512]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.394685] 
[   35.394732] The buggy address belongs to the physical page:
[   35.394778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.394923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.395021] page_type: f5(slab)
[   35.395314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.395551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.395637] page dumped because: kasan: bad access detected
[   35.395745] 
[   35.395768] Memory state around the buggy address:
[   35.395804]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.395872]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.395918] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.396076]                                      ^
[   35.396277]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.396732]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.396803] ==================================================================
[   35.436976] ==================================================================
[   35.437113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   35.437173] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.437231] 
[   35.437266] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.437355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.437388] Hardware name: linux,dummy-virt (DT)
[   35.437420] Call trace:
[   35.437445]  show_stack+0x20/0x38 (C)
[   35.437495]  dump_stack_lvl+0x8c/0xd0
[   35.437545]  print_report+0x118/0x5e8
[   35.437591]  kasan_report+0xdc/0x128
[   35.437637]  __asan_report_load8_noabort+0x20/0x30
[   35.437766]  kasan_atomics_helper+0x3df4/0x4858
[   35.437829]  kasan_atomics+0x198/0x2e0
[   35.437878]  kunit_try_run_case+0x170/0x3f0
[   35.437927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.437982]  kthread+0x328/0x630
[   35.438027]  ret_from_fork+0x10/0x20
[   35.438074] 
[   35.438095] Allocated by task 297:
[   35.438126]  kasan_save_stack+0x3c/0x68
[   35.438166]  kasan_save_track+0x20/0x40
[   35.438203]  kasan_save_alloc_info+0x40/0x58
[   35.438242]  __kasan_kmalloc+0xd4/0xd8
[   35.438287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.438329]  kasan_atomics+0xb8/0x2e0
[   35.438368]  kunit_try_run_case+0x170/0x3f0
[   35.438416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.438462]  kthread+0x328/0x630
[   35.438495]  ret_from_fork+0x10/0x20
[   35.438533] 
[   35.438553] The buggy address belongs to the object at fff00000c9a5e780
[   35.438553]  which belongs to the cache kmalloc-64 of size 64
[   35.438619] The buggy address is located 0 bytes to the right of
[   35.438619]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.439814] 
[   35.439944] The buggy address belongs to the physical page:
[   35.440050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.440350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.440715] page_type: f5(slab)
[   35.441155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.441292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.441451] page dumped because: kasan: bad access detected
[   35.441526] 
[   35.441571] Memory state around the buggy address:
[   35.442041]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.442185]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.442662] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.443045]                                      ^
[   35.443117]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.443223]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.443305] ==================================================================
[   34.942887] ==================================================================
[   34.942952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   34.943264] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   34.944658]  dump_stack_lvl+0x8c/0xd0
[   34.945588]  kasan_atomics_helper+0x414/0x4858
[   34.947223]  kasan_save_stack+0x3c/0x68
[   34.947946]  kasan_atomics+0xb8/0x2e0
[   34.948486] 
[   34.948765] The buggy address belongs to the object at fff00000c9a5e780
[   34.948765]  which belongs to the cache kmalloc-64 of size 64
[   34.950818] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.954493] ==================================================================
[   35.463423] ==================================================================
[   35.463477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   35.463533] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.463584] 
[   35.463617] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.463721] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.463753] Hardware name: linux,dummy-virt (DT)
[   35.463785] Call trace:
[   35.463809]  show_stack+0x20/0x38 (C)
[   35.463859]  dump_stack_lvl+0x8c/0xd0
[   35.463909]  print_report+0x118/0x5e8
[   35.464137]  kasan_report+0xdc/0x128
[   35.464201]  kasan_check_range+0x100/0x1a8
[   35.464249]  __kasan_check_write+0x20/0x30
[   35.464298]  kasan_atomics_helper+0x175c/0x4858
[   35.464350]  kasan_atomics+0x198/0x2e0
[   35.464398]  kunit_try_run_case+0x170/0x3f0
[   35.464447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.464501]  kthread+0x328/0x630
[   35.464544]  ret_from_fork+0x10/0x20
[   35.464602] 
[   35.464624] Allocated by task 297:
[   35.465412]  kasan_save_stack+0x3c/0x68
[   35.465634]  kasan_save_track+0x20/0x40
[   35.465704]  kasan_save_alloc_info+0x40/0x58
[   35.465943]  __kasan_kmalloc+0xd4/0xd8
[   35.466005]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.466059]  kasan_atomics+0xb8/0x2e0
[   35.466437]  kunit_try_run_case+0x170/0x3f0
[   35.466881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.467157]  kthread+0x328/0x630
[   35.467200]  ret_from_fork+0x10/0x20
[   35.467262] 
[   35.467460] The buggy address belongs to the object at fff00000c9a5e780
[   35.467460]  which belongs to the cache kmalloc-64 of size 64
[   35.467610] The buggy address is located 0 bytes to the right of
[   35.467610]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.468422] 
[   35.468472] The buggy address belongs to the physical page:
[   35.468549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.468934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.469151] page_type: f5(slab)
[   35.469489] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.469606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.469811] page dumped because: kasan: bad access detected
[   35.469913] 
[   35.470010] Memory state around the buggy address:
[   35.470087]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.470146]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.470197] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.470587]                                      ^
[   35.470669]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.470881]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.470928] ==================================================================
[   35.098304] ==================================================================
[   35.098591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.098844] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.098904] 
[   35.098980] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.099467] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.099593] Hardware name: linux,dummy-virt (DT)
[   35.099722] Call trace:
[   35.099770]  show_stack+0x20/0x38 (C)
[   35.099827]  dump_stack_lvl+0x8c/0xd0
[   35.099879]  print_report+0x118/0x5e8
[   35.100281]  kasan_report+0xdc/0x128
[   35.100429]  kasan_check_range+0x100/0x1a8
[   35.100533]  __kasan_check_write+0x20/0x30
[   35.100989]  kasan_atomics_helper+0xad4/0x4858
[   35.102073] 
[   35.102170] Allocated by task 297:
[   35.102707]  __kasan_kmalloc+0xd4/0xd8
[   35.104585] 
[   35.105261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.106050] page dumped because: kasan: bad access detected
[   35.106177] 
[   35.106300] Memory state around the buggy address:
[   35.106485]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.106551]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.106663] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.106739]                                      ^
[   35.106815]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.107217]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.107328] ==================================================================
[   35.353823] ==================================================================
[   35.353886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   35.354253] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.354335] 
[   35.354535] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.354701] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.354758] Hardware name: linux,dummy-virt (DT)
[   35.354793] Call trace:
[   35.354820]  show_stack+0x20/0x38 (C)
[   35.354932]  dump_stack_lvl+0x8c/0xd0
[   35.355172]  print_report+0x118/0x5e8
[   35.355248]  kasan_report+0xdc/0x128
[   35.355362]  kasan_check_range+0x100/0x1a8
[   35.355412]  __kasan_check_write+0x20/0x30
[   35.355460]  kasan_atomics_helper+0x1384/0x4858
[   35.355551]  kasan_atomics+0x198/0x2e0
[   35.355600]  kunit_try_run_case+0x170/0x3f0
[   35.355670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.355725]  kthread+0x328/0x630
[   35.355770]  ret_from_fork+0x10/0x20
[   35.355828] 
[   35.355852] Allocated by task 297:
[   35.355894]  kasan_save_stack+0x3c/0x68
[   35.355938]  kasan_save_track+0x20/0x40
[   35.355976]  kasan_save_alloc_info+0x40/0x58
[   35.356026]  __kasan_kmalloc+0xd4/0xd8
[   35.356063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.356106]  kasan_atomics+0xb8/0x2e0
[   35.356146]  kunit_try_run_case+0x170/0x3f0
[   35.356205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.356250]  kthread+0x328/0x630
[   35.356291]  ret_from_fork+0x10/0x20
[   35.356329] 
[   35.356357] The buggy address belongs to the object at fff00000c9a5e780
[   35.356357]  which belongs to the cache kmalloc-64 of size 64
[   35.356415] The buggy address is located 0 bytes to the right of
[   35.356415]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.356487] 
[   35.356511] The buggy address belongs to the physical page:
[   35.356563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.356627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.357237] page_type: f5(slab)
[   35.358031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.358102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.358218] page dumped because: kasan: bad access detected
[   35.358255] 
[   35.358278] Memory state around the buggy address:
[   35.358861]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.359189]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.359364] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.359442]                                      ^
[   35.359774]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.359866]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.359963] ==================================================================
[   35.204950] ==================================================================
[   35.205098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.205182] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.205519] 
[   35.205713] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.206338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.206449] Hardware name: linux,dummy-virt (DT)
[   35.206495] Call trace:
[   35.206522]  show_stack+0x20/0x38 (C)
[   35.206770]  dump_stack_lvl+0x8c/0xd0
[   35.206827]  print_report+0x118/0x5e8
[   35.206874]  kasan_report+0xdc/0x128
[   35.206921]  __asan_report_load8_noabort+0x20/0x30
[   35.207387]  kasan_atomics_helper+0x3f58/0x4858
[   35.207720]  kasan_atomics+0x198/0x2e0
[   35.208023]  kunit_try_run_case+0x170/0x3f0
[   35.208226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.208506]  kthread+0x328/0x630
[   35.208843]  ret_from_fork+0x10/0x20
[   35.209239] 
[   35.209308] Allocated by task 297:
[   35.209370]  kasan_save_stack+0x3c/0x68
[   35.209950]  kasan_save_track+0x20/0x40
[   35.210004]  kasan_save_alloc_info+0x40/0x58
[   35.210071]  __kasan_kmalloc+0xd4/0xd8
[   35.210192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.210583]  kasan_atomics+0xb8/0x2e0
[   35.210853]  kunit_try_run_case+0x170/0x3f0
[   35.211004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.211056]  kthread+0x328/0x630
[   35.211091]  ret_from_fork+0x10/0x20
[   35.211128] 
[   35.211401] The buggy address belongs to the object at fff00000c9a5e780
[   35.211401]  which belongs to the cache kmalloc-64 of size 64
[   35.211677] The buggy address is located 0 bytes to the right of
[   35.211677]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.211751] 
[   35.211825] The buggy address belongs to the physical page:
[   35.211888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.211979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.212038] page_type: f5(slab)
[   35.212084] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.212136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.212188] page dumped because: kasan: bad access detected
[   35.212219] 
[   35.212251] Memory state around the buggy address:
[   35.212287]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.212333]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.212379] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.212428]                                      ^
[   35.212463]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.212508]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.212557] ==================================================================
[   35.443997] ==================================================================
[   35.444100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   35.444168] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.444540] 
[   35.444608] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.444770] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.444804] Hardware name: linux,dummy-virt (DT)
[   35.444864] Call trace:
[   35.444990]  show_stack+0x20/0x38 (C)
[   35.445048]  dump_stack_lvl+0x8c/0xd0
[   35.445683]  print_report+0x118/0x5e8
[   35.445761]  kasan_report+0xdc/0x128
[   35.445809]  kasan_check_range+0x100/0x1a8
[   35.446028]  __kasan_check_write+0x20/0x30
[   35.446169]  kasan_atomics_helper+0x16d0/0x4858
[   35.446476]  kasan_atomics+0x198/0x2e0
[   35.446653]  kunit_try_run_case+0x170/0x3f0
[   35.446740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.446977]  kthread+0x328/0x630
[   35.447456]  ret_from_fork+0x10/0x20
[   35.447547] 
[   35.447573] Allocated by task 297:
[   35.447607]  kasan_save_stack+0x3c/0x68
[   35.447661]  kasan_save_track+0x20/0x40
[   35.447701]  kasan_save_alloc_info+0x40/0x58
[   35.447742]  __kasan_kmalloc+0xd4/0xd8
[   35.448092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.448434]  kasan_atomics+0xb8/0x2e0
[   35.448620]  kunit_try_run_case+0x170/0x3f0
[   35.448828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.449007]  kthread+0x328/0x630
[   35.449066]  ret_from_fork+0x10/0x20
[   35.449621] 
[   35.449663] The buggy address belongs to the object at fff00000c9a5e780
[   35.449663]  which belongs to the cache kmalloc-64 of size 64
[   35.449993] The buggy address is located 0 bytes to the right of
[   35.449993]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.450382] 
[   35.450491] The buggy address belongs to the physical page:
[   35.450715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.450920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.451243] page_type: f5(slab)
[   35.451532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.451621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.451688] page dumped because: kasan: bad access detected
[   35.451950] 
[   35.452185] Memory state around the buggy address:
[   35.452264]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.452361]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.452816] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.453298]                                      ^
[   35.453462]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.453634]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.453744] ==================================================================
[   35.268448] ==================================================================
[   35.269003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   35.269262] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.269887] 
[   35.269941] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.270035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.270068] Hardware name: linux,dummy-virt (DT)
[   35.270409] Call trace:
[   35.270454]  show_stack+0x20/0x38 (C)
[   35.270714]  dump_stack_lvl+0x8c/0xd0
[   35.270775]  print_report+0x118/0x5e8
[   35.270822]  kasan_report+0xdc/0x128
[   35.271238]  kasan_check_range+0x100/0x1a8
[   35.271449]  __kasan_check_write+0x20/0x30
[   35.271673]  kasan_atomics_helper+0xff0/0x4858
[   35.271734]  kasan_atomics+0x198/0x2e0
[   35.271813]  kunit_try_run_case+0x170/0x3f0
[   35.272129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.272614]  kthread+0x328/0x630
[   35.272756]  ret_from_fork+0x10/0x20
[   35.272809] 
[   35.273476] Allocated by task 297:
[   35.273582]  kasan_save_stack+0x3c/0x68
[   35.273951]  kasan_save_track+0x20/0x40
[   35.274026]  kasan_save_alloc_info+0x40/0x58
[   35.274201]  __kasan_kmalloc+0xd4/0xd8
[   35.274377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.274777]  kasan_atomics+0xb8/0x2e0
[   35.275156]  kunit_try_run_case+0x170/0x3f0
[   35.275264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.275380]  kthread+0x328/0x630
[   35.275758]  ret_from_fork+0x10/0x20
[   35.275853] 
[   35.275877] The buggy address belongs to the object at fff00000c9a5e780
[   35.275877]  which belongs to the cache kmalloc-64 of size 64
[   35.275938] The buggy address is located 0 bytes to the right of
[   35.275938]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.276303] 
[   35.276344] The buggy address belongs to the physical page:
[   35.276657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.277055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.277500] page_type: f5(slab)
[   35.277613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.277771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.277855] page dumped because: kasan: bad access detected
[   35.277928] 
[   35.277996] Memory state around the buggy address:
[   35.278041]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.278418]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.278492] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.278813]                                      ^
[   35.278906]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.279102]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.279172] ==================================================================
[   35.194298] ==================================================================
[   35.194359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.194577] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.194635] 
[   35.195008] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.195193] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.195594] Hardware name: linux,dummy-virt (DT)
[   35.195661] Call trace:
[   35.195688]  show_stack+0x20/0x38 (C)
[   35.195744]  dump_stack_lvl+0x8c/0xd0
[   35.195795]  print_report+0x118/0x5e8
[   35.195989]  kasan_report+0xdc/0x128
[   35.196354]  kasan_check_range+0x100/0x1a8
[   35.196499]  __kasan_check_read+0x20/0x30
[   35.196770]  kasan_atomics_helper+0xdd4/0x4858
[   35.196837]  kasan_atomics+0x198/0x2e0
[   35.196889]  kunit_try_run_case+0x170/0x3f0
[   35.197069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.197138]  kthread+0x328/0x630
[   35.197181]  ret_from_fork+0x10/0x20
[   35.197231] 
[   35.197283] Allocated by task 297:
[   35.197333]  kasan_save_stack+0x3c/0x68
[   35.197375]  kasan_save_track+0x20/0x40
[   35.197413]  kasan_save_alloc_info+0x40/0x58
[   35.197454]  __kasan_kmalloc+0xd4/0xd8
[   35.197497]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.197542]  kasan_atomics+0xb8/0x2e0
[   35.197582]  kunit_try_run_case+0x170/0x3f0
[   35.197626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.198552]  kthread+0x328/0x630
[   35.199088]  ret_from_fork+0x10/0x20
[   35.199162] 
[   35.199285] The buggy address belongs to the object at fff00000c9a5e780
[   35.199285]  which belongs to the cache kmalloc-64 of size 64
[   35.199357] The buggy address is located 0 bytes to the right of
[   35.199357]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.199429] 
[   35.199452] The buggy address belongs to the physical page:
[   35.199489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.199548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.199940] page_type: f5(slab)
[   35.200283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.200418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.200564] page dumped because: kasan: bad access detected
[   35.200599] 
[   35.200779] Memory state around the buggy address:
[   35.201285]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.201430]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.201562] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.201788]                                      ^
[   35.201830]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.201892]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.202160] ==================================================================
[   35.340727] ==================================================================
[   35.340783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   35.341008] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.341075] 
[   35.341309] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.341633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.341696] Hardware name: linux,dummy-virt (DT)
[   35.341817] Call trace:
[   35.341879]  show_stack+0x20/0x38 (C)
[   35.341963]  dump_stack_lvl+0x8c/0xd0
[   35.342014]  print_report+0x118/0x5e8
[   35.342342]  kasan_report+0xdc/0x128
[   35.342708]  kasan_check_range+0x100/0x1a8
[   35.342815]  __kasan_check_write+0x20/0x30
[   35.343184]  kasan_atomics_helper+0x12d8/0x4858
[   35.343265]  kasan_atomics+0x198/0x2e0
[   35.343810]  kunit_try_run_case+0x170/0x3f0
[   35.343890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.343947]  kthread+0x328/0x630
[   35.343991]  ret_from_fork+0x10/0x20
[   35.344046] 
[   35.344505] Allocated by task 297:
[   35.344856]  kasan_save_stack+0x3c/0x68
[   35.344915]  kasan_save_track+0x20/0x40
[   35.345116]  kasan_save_alloc_info+0x40/0x58
[   35.345628]  __kasan_kmalloc+0xd4/0xd8
[   35.345705]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.346088]  kasan_atomics+0xb8/0x2e0
[   35.346480]  kunit_try_run_case+0x170/0x3f0
[   35.346547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.346622]  kthread+0x328/0x630
[   35.346765]  ret_from_fork+0x10/0x20
[   35.346809] 
[   35.347008] The buggy address belongs to the object at fff00000c9a5e780
[   35.347008]  which belongs to the cache kmalloc-64 of size 64
[   35.347265] The buggy address is located 0 bytes to the right of
[   35.347265]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.347513] 
[   35.348021] The buggy address belongs to the physical page:
[   35.348179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.348328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.348612] page_type: f5(slab)
[   35.348863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.348937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.349119] page dumped because: kasan: bad access detected
[   35.349160] 
[   35.349220] Memory state around the buggy address:
[   35.349268]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.349315]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.349371] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.349411]                                      ^
[   35.349447]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.349490]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.349540] ==================================================================
[   35.217020] ==================================================================
[   35.217100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.217177] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.217237] 
[   35.217273] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.217699] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.217883] Hardware name: linux,dummy-virt (DT)
[   35.218169] Call trace:
[   35.218345]  show_stack+0x20/0x38 (C)
[   35.218413]  dump_stack_lvl+0x8c/0xd0
[   35.218695]  print_report+0x118/0x5e8
[   35.219072]  kasan_report+0xdc/0x128
[   35.219144]  kasan_check_range+0x100/0x1a8
[   35.219390]  __kasan_check_write+0x20/0x30
[   35.219498]  kasan_atomics_helper+0xe44/0x4858
[   35.219786]  kasan_atomics+0x198/0x2e0
[   35.220279]  kunit_try_run_case+0x170/0x3f0
[   35.220377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.220436]  kthread+0x328/0x630
[   35.220957]  ret_from_fork+0x10/0x20
[   35.221173] 
[   35.221225] Allocated by task 297:
[   35.221262]  kasan_save_stack+0x3c/0x68
[   35.221583]  kasan_save_track+0x20/0x40
[   35.221673]  kasan_save_alloc_info+0x40/0x58
[   35.222068]  __kasan_kmalloc+0xd4/0xd8
[   35.222182]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.222446]  kasan_atomics+0xb8/0x2e0
[   35.222612]  kunit_try_run_case+0x170/0x3f0
[   35.222860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.223658]  kthread+0x328/0x630
[   35.223867]  ret_from_fork+0x10/0x20
[   35.224030] 
[   35.224492] The buggy address belongs to the object at fff00000c9a5e780
[   35.224492]  which belongs to the cache kmalloc-64 of size 64
[   35.224569] The buggy address is located 0 bytes to the right of
[   35.224569]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.224635] 
[   35.224676] The buggy address belongs to the physical page:
[   35.225204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.225895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.226182] page_type: f5(slab)
[   35.226401] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.226536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.226774] page dumped because: kasan: bad access detected
[   35.227245] 
[   35.227490] Memory state around the buggy address:
[   35.227691]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.227803]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.227949] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.227991]                                      ^
[   35.228028]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.228073]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.228131] ==================================================================
[   35.471515] ==================================================================
[   35.471568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   35.471622] Read of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.471686] 
[   35.471717] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.471805] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.472028] Hardware name: linux,dummy-virt (DT)
[   35.472109] Call trace:
[   35.472136]  show_stack+0x20/0x38 (C)
[   35.472594]  dump_stack_lvl+0x8c/0xd0
[   35.472703]  print_report+0x118/0x5e8
[   35.472851]  kasan_report+0xdc/0x128
[   35.472949]  __asan_report_load8_noabort+0x20/0x30
[   35.473011]  kasan_atomics_helper+0x3e20/0x4858
[   35.473064]  kasan_atomics+0x198/0x2e0
[   35.473303]  kunit_try_run_case+0x170/0x3f0
[   35.473371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.473696]  kthread+0x328/0x630
[   35.473767]  ret_from_fork+0x10/0x20
[   35.473936] 
[   35.473966] Allocated by task 297:
[   35.474000]  kasan_save_stack+0x3c/0x68
[   35.474042]  kasan_save_track+0x20/0x40
[   35.474288]  kasan_save_alloc_info+0x40/0x58
[   35.474598]  __kasan_kmalloc+0xd4/0xd8
[   35.474839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.474912]  kasan_atomics+0xb8/0x2e0
[   35.474972]  kunit_try_run_case+0x170/0x3f0
[   35.475338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.475419]  kthread+0x328/0x630
[   35.475717]  ret_from_fork+0x10/0x20
[   35.475768] 
[   35.476046] The buggy address belongs to the object at fff00000c9a5e780
[   35.476046]  which belongs to the cache kmalloc-64 of size 64
[   35.476375] The buggy address is located 0 bytes to the right of
[   35.476375]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.476558] 
[   35.476615] The buggy address belongs to the physical page:
[   35.476751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.476846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.476910] page_type: f5(slab)
[   35.476951] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.477068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.477110] page dumped because: kasan: bad access detected
[   35.477142] 
[   35.477184] Memory state around the buggy address:
[   35.477228]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.477277]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.477323] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.477364]                                      ^
[   35.477400]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.477455]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.477506] ==================================================================
[   35.299539] ==================================================================
[   35.299634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   35.300016] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.300086] 
[   35.300121] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.300361] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.300637] Hardware name: linux,dummy-virt (DT)
[   35.300702] Call trace:
[   35.300728]  show_stack+0x20/0x38 (C)
[   35.300821]  dump_stack_lvl+0x8c/0xd0
[   35.300875]  print_report+0x118/0x5e8
[   35.300922]  kasan_report+0xdc/0x128
[   35.300967]  kasan_check_range+0x100/0x1a8
[   35.301014]  __kasan_check_write+0x20/0x30
[   35.301063]  kasan_atomics_helper+0x1128/0x4858
[   35.301123]  kasan_atomics+0x198/0x2e0
[   35.301179]  kunit_try_run_case+0x170/0x3f0
[   35.301236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.301291]  kthread+0x328/0x630
[   35.301335]  ret_from_fork+0x10/0x20
[   35.301381] 
[   35.301403] Allocated by task 297:
[   35.301436]  kasan_save_stack+0x3c/0x68
[   35.301478]  kasan_save_track+0x20/0x40
[   35.301515]  kasan_save_alloc_info+0x40/0x58
[   35.301555]  __kasan_kmalloc+0xd4/0xd8
[   35.301602]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.301658]  kasan_atomics+0xb8/0x2e0
[   35.301745]  kunit_try_run_case+0x170/0x3f0
[   35.301790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.302055]  kthread+0x328/0x630
[   35.302651]  ret_from_fork+0x10/0x20
[   35.302922] 
[   35.302993] The buggy address belongs to the object at fff00000c9a5e780
[   35.302993]  which belongs to the cache kmalloc-64 of size 64
[   35.303496] The buggy address is located 0 bytes to the right of
[   35.303496]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.304124] 
[   35.304226] The buggy address belongs to the physical page:
[   35.304983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.305115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.305182] page_type: f5(slab)
[   35.305224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.305956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.306058] page dumped because: kasan: bad access detected
[   35.306323] 
[   35.306872] Memory state around the buggy address:
[   35.306932]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.307102]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.307206] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.307331]                                      ^
[   35.307408]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.307577]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.307816] ==================================================================
[   35.180627] ==================================================================
[   35.180717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.181143] Read of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.181330] 
[   35.181451] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.182004] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.182195] Hardware name: linux,dummy-virt (DT)
[   35.182293] Call trace:
[   35.182319]  show_stack+0x20/0x38 (C)
[   35.182901]  dump_stack_lvl+0x8c/0xd0
[   35.183307]  print_report+0x118/0x5e8
[   35.183436]  kasan_report+0xdc/0x128
[   35.183486]  __asan_report_load4_noabort+0x20/0x30
[   35.183536]  kasan_atomics_helper+0x3e04/0x4858
[   35.183589]  kasan_atomics+0x198/0x2e0
[   35.184175]  kunit_try_run_case+0x170/0x3f0
[   35.184383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.184597]  kthread+0x328/0x630
[   35.184868]  ret_from_fork+0x10/0x20
[   35.185108] 
[   35.185158] Allocated by task 297:
[   35.185434]  kasan_save_stack+0x3c/0x68
[   35.185730]  kasan_save_track+0x20/0x40
[   35.185967]  kasan_save_alloc_info+0x40/0x58
[   35.186404]  __kasan_kmalloc+0xd4/0xd8
[   35.186466]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.186925]  kasan_atomics+0xb8/0x2e0
[   35.187291]  kunit_try_run_case+0x170/0x3f0
[   35.187368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.187415]  kthread+0x328/0x630
[   35.187726]  ret_from_fork+0x10/0x20
[   35.188128] 
[   35.188179] The buggy address belongs to the object at fff00000c9a5e780
[   35.188179]  which belongs to the cache kmalloc-64 of size 64
[   35.188382] The buggy address is located 0 bytes to the right of
[   35.188382]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.188502] 
[   35.188714] The buggy address belongs to the physical page:
[   35.189032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.189152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.189344] page_type: f5(slab)
[   35.189388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.189771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.190357] page dumped because: kasan: bad access detected
[   35.190419] 
[   35.190588] Memory state around the buggy address:
[   35.190961]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.191070]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.191205] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.191292]                                      ^
[   35.191330]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.191657]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.191742] ==================================================================
[   35.309091] ==================================================================
[   35.309406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   35.309636] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.309830] 
[   35.310021] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.310138] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.310172] Hardware name: linux,dummy-virt (DT)
[   35.310207] Call trace:
[   35.310231]  show_stack+0x20/0x38 (C)
[   35.310526]  dump_stack_lvl+0x8c/0xd0
[   35.311260]  print_report+0x118/0x5e8
[   35.311442]  kasan_report+0xdc/0x128
[   35.311523]  kasan_check_range+0x100/0x1a8
[   35.311973]  __kasan_check_write+0x20/0x30
[   35.312450]  kasan_atomics_helper+0x1190/0x4858
[   35.312677]  kasan_atomics+0x198/0x2e0
[   35.312786]  kunit_try_run_case+0x170/0x3f0
[   35.313207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.313421]  kthread+0x328/0x630
[   35.313715]  ret_from_fork+0x10/0x20
[   35.313871] 
[   35.314180] Allocated by task 297:
[   35.314227]  kasan_save_stack+0x3c/0x68
[   35.314777]  kasan_save_track+0x20/0x40
[   35.315237]  kasan_save_alloc_info+0x40/0x58
[   35.315346]  __kasan_kmalloc+0xd4/0xd8
[   35.315849]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.315919]  kasan_atomics+0xb8/0x2e0
[   35.315975]  kunit_try_run_case+0x170/0x3f0
[   35.316025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.316774]  kthread+0x328/0x630
[   35.316922]  ret_from_fork+0x10/0x20
[   35.316964] 
[   35.317020] The buggy address belongs to the object at fff00000c9a5e780
[   35.317020]  which belongs to the cache kmalloc-64 of size 64
[   35.317088] The buggy address is located 0 bytes to the right of
[   35.317088]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.317349] 
[   35.317402] The buggy address belongs to the physical page:
[   35.317834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.317941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.317993] page_type: f5(slab)
[   35.318032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.318094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.318152] page dumped because: kasan: bad access detected
[   35.318196] 
[   35.318224] Memory state around the buggy address:
[   35.318261]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.318316]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.318362] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.318403]                                      ^
[   35.318440]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.318484]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.318523] ==================================================================
[   35.330301] ==================================================================
[   35.330739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   35.330851] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.331229] 
[   35.331273] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.331598] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.331884] Hardware name: linux,dummy-virt (DT)
[   35.332172] Call trace:
[   35.332674]  show_stack+0x20/0x38 (C)
[   35.332749]  dump_stack_lvl+0x8c/0xd0
[   35.332800]  print_report+0x118/0x5e8
[   35.333174]  kasan_report+0xdc/0x128
[   35.333258]  kasan_check_range+0x100/0x1a8
[   35.333598]  __kasan_check_write+0x20/0x30
[   35.333683]  kasan_atomics_helper+0x126c/0x4858
[   35.334050]  kasan_atomics+0x198/0x2e0
[   35.334608]  kunit_try_run_case+0x170/0x3f0
[   35.334694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.334824]  kthread+0x328/0x630
[   35.334870]  ret_from_fork+0x10/0x20
[   35.334930] 
[   35.334980] Allocated by task 297:
[   35.335382]  kasan_save_stack+0x3c/0x68
[   35.335470]  kasan_save_track+0x20/0x40
[   35.335673]  kasan_save_alloc_info+0x40/0x58
[   35.335891]  __kasan_kmalloc+0xd4/0xd8
[   35.335974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.336273]  kasan_atomics+0xb8/0x2e0
[   35.336327]  kunit_try_run_case+0x170/0x3f0
[   35.336783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.336860]  kthread+0x328/0x630
[   35.337216]  ret_from_fork+0x10/0x20
[   35.337949] 
[   35.338087] The buggy address belongs to the object at fff00000c9a5e780
[   35.338087]  which belongs to the cache kmalloc-64 of size 64
[   35.338298] The buggy address is located 0 bytes to the right of
[   35.338298]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.338487] 
[   35.338561] The buggy address belongs to the physical page:
[   35.338601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.338689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.338752] page_type: f5(slab)
[   35.338814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.338877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.338919] page dumped because: kasan: bad access detected
[   35.338952] 
[   35.338983] Memory state around the buggy address:
[   35.339030]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.339083]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.339151] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.339200]                                      ^
[   35.339241]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.339286]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.339349] ==================================================================
[   35.398250] ==================================================================
[   35.398392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   35.398453] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.398506] 
[   35.398690] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.398790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.398824] Hardware name: linux,dummy-virt (DT)
[   35.399006] Call trace:
[   35.399353]  show_stack+0x20/0x38 (C)
[   35.399835]  dump_stack_lvl+0x8c/0xd0
[   35.400125]  print_report+0x118/0x5e8
[   35.400241]  kasan_report+0xdc/0x128
[   35.400365]  kasan_check_range+0x100/0x1a8
[   35.400415]  __kasan_check_write+0x20/0x30
[   35.400464]  kasan_atomics_helper+0x154c/0x4858
[   35.400800]  kasan_atomics+0x198/0x2e0
[   35.401039]  kunit_try_run_case+0x170/0x3f0
[   35.401370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.401475]  kthread+0x328/0x630
[   35.401522]  ret_from_fork+0x10/0x20
[   35.402098] 
[   35.402297] Allocated by task 297:
[   35.402356]  kasan_save_stack+0x3c/0x68
[   35.402411]  kasan_save_track+0x20/0x40
[   35.402459]  kasan_save_alloc_info+0x40/0x58
[   35.402800]  __kasan_kmalloc+0xd4/0xd8
[   35.403127]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.403213]  kasan_atomics+0xb8/0x2e0
[   35.403322]  kunit_try_run_case+0x170/0x3f0
[   35.403388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.403441]  kthread+0x328/0x630
[   35.403477]  ret_from_fork+0x10/0x20
[   35.403515] 
[   35.403870] The buggy address belongs to the object at fff00000c9a5e780
[   35.403870]  which belongs to the cache kmalloc-64 of size 64
[   35.404169] The buggy address is located 0 bytes to the right of
[   35.404169]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.404467] 
[   35.404605] The buggy address belongs to the physical page:
[   35.404660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.405000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.405129] page_type: f5(slab)
[   35.405219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.405653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.405768] page dumped because: kasan: bad access detected
[   35.405857] 
[   35.406028] Memory state around the buggy address:
[   35.406072]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.406126]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.406171] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.406210]                                      ^
[   35.406272]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.406316]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.406362] ==================================================================
[   35.280502] ==================================================================
[   35.280593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   35.280698] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.280922] 
[   35.280987] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.281090] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.281124] Hardware name: linux,dummy-virt (DT)
[   35.281443] Call trace:
[   35.281606]  show_stack+0x20/0x38 (C)
[   35.281689]  dump_stack_lvl+0x8c/0xd0
[   35.281742]  print_report+0x118/0x5e8
[   35.281922]  kasan_report+0xdc/0x128
[   35.281986]  kasan_check_range+0x100/0x1a8
[   35.282034]  __kasan_check_write+0x20/0x30
[   35.282389]  kasan_atomics_helper+0x1058/0x4858
[   35.282468]  kasan_atomics+0x198/0x2e0
[   35.282658]  kunit_try_run_case+0x170/0x3f0
[   35.282799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.282861]  kthread+0x328/0x630
[   35.282906]  ret_from_fork+0x10/0x20
[   35.282962] 
[   35.283337] Allocated by task 297:
[   35.283565]  kasan_save_stack+0x3c/0x68
[   35.283617]  kasan_save_track+0x20/0x40
[   35.283956]  kasan_save_alloc_info+0x40/0x58
[   35.284181]  __kasan_kmalloc+0xd4/0xd8
[   35.284239]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.284292]  kasan_atomics+0xb8/0x2e0
[   35.284333]  kunit_try_run_case+0x170/0x3f0
[   35.284386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.284432]  kthread+0x328/0x630
[   35.284469]  ret_from_fork+0x10/0x20
[   35.284509] 
[   35.284540] The buggy address belongs to the object at fff00000c9a5e780
[   35.284540]  which belongs to the cache kmalloc-64 of size 64
[   35.284601] The buggy address is located 0 bytes to the right of
[   35.284601]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.284679] 
[   35.284702] The buggy address belongs to the physical page:
[   35.284740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.284795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.284854] page_type: f5(slab)
[   35.284894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.284955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.285003] page dumped because: kasan: bad access detected
[   35.285046] 
[   35.285067] Memory state around the buggy address:
[   35.285112]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.285157]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.285202] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.285256]                                      ^
[   35.285293]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.285352]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.285401] ==================================================================
[   35.370984] ==================================================================
[   35.371326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   35.371801] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.371937] 
[   35.372002] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.372754] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.373043] Hardware name: linux,dummy-virt (DT)
[   35.373118] Call trace:
[   35.373208]  show_stack+0x20/0x38 (C)
[   35.373334]  dump_stack_lvl+0x8c/0xd0
[   35.373385]  print_report+0x118/0x5e8
[   35.373432]  kasan_report+0xdc/0x128
[   35.373782]  kasan_check_range+0x100/0x1a8
[   35.374005]  __kasan_check_write+0x20/0x30
[   35.374198]  kasan_atomics_helper+0x1414/0x4858
[   35.374290]  kasan_atomics+0x198/0x2e0
[   35.374698]  kunit_try_run_case+0x170/0x3f0
[   35.374799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.375151]  kthread+0x328/0x630
[   35.375233]  ret_from_fork+0x10/0x20
[   35.375434] 
[   35.375474] Allocated by task 297:
[   35.375738]  kasan_save_stack+0x3c/0x68
[   35.376018]  kasan_save_track+0x20/0x40
[   35.376069]  kasan_save_alloc_info+0x40/0x58
[   35.376378]  __kasan_kmalloc+0xd4/0xd8
[   35.376734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.376901]  kasan_atomics+0xb8/0x2e0
[   35.377011]  kunit_try_run_case+0x170/0x3f0
[   35.377062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.377389]  kthread+0x328/0x630
[   35.377479]  ret_from_fork+0x10/0x20
[   35.377676] 
[   35.377731] The buggy address belongs to the object at fff00000c9a5e780
[   35.377731]  which belongs to the cache kmalloc-64 of size 64
[   35.377951] The buggy address is located 0 bytes to the right of
[   35.377951]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.378120] 
[   35.378147] The buggy address belongs to the physical page:
[   35.378213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.378570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.378673] page_type: f5(slab)
[   35.379072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.379144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.379329] page dumped because: kasan: bad access detected
[   35.379377] 
[   35.379544] Memory state around the buggy address:
[   35.379600]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.379737]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.379816] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.380063]                                      ^
[   35.380129]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.380199]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.380254] ==================================================================
[   35.080329] ==================================================================
[   35.080389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.081271] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.081357] 
[   35.081406] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.081502] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.081625] Hardware name: linux,dummy-virt (DT)
[   35.081678] Call trace:
[   35.082012]  show_stack+0x20/0x38 (C)
[   35.082161]  dump_stack_lvl+0x8c/0xd0
[   35.082442]  print_report+0x118/0x5e8
[   35.082619]  kasan_report+0xdc/0x128
[   35.082701]  kasan_check_range+0x100/0x1a8
[   35.083047]  __kasan_check_write+0x20/0x30
[   35.083379]  kasan_atomics_helper+0xa04/0x4858
[   35.083468]  kasan_atomics+0x198/0x2e0
[   35.083540]  kunit_try_run_case+0x170/0x3f0
[   35.083616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.083696]  kthread+0x328/0x630
[   35.083857]  ret_from_fork+0x10/0x20
[   35.083993] 
[   35.084051] Allocated by task 297:
[   35.084181]  kasan_save_stack+0x3c/0x68
[   35.084314]  kasan_save_track+0x20/0x40
[   35.084411]  kasan_save_alloc_info+0x40/0x58
[   35.085111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.087091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.087282] page_type: f5(slab)
[   35.087328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.087394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.087797] page dumped because: kasan: bad access detected
[   35.087899] 
[   35.087957] Memory state around the buggy address:
[   35.087997]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.088472]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.088559] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.089062]                                      ^
[   35.089120]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.089337]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.089612] ==================================================================
[   35.070637] ==================================================================
[   35.070715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.070779] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.071188] 
[   35.071304] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.071407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.071616] Hardware name: linux,dummy-virt (DT)
[   35.071860] Call trace:
[   35.071913]  show_stack+0x20/0x38 (C)
[   35.072017]  dump_stack_lvl+0x8c/0xd0
[   35.072214]  print_report+0x118/0x5e8
[   35.072348]  kasan_report+0xdc/0x128
[   35.072444]  kasan_check_range+0x100/0x1a8
[   35.072683]  __kasan_check_write+0x20/0x30
[   35.072927]  kasan_atomics_helper+0x99c/0x4858
[   35.073050]  kasan_atomics+0x198/0x2e0
[   35.073188]  kunit_try_run_case+0x170/0x3f0
[   35.073311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.073556]  kthread+0x328/0x630
[   35.073679]  ret_from_fork+0x10/0x20
[   35.073985] 
[   35.074041] Allocated by task 297:
[   35.074418]  kasan_save_stack+0x3c/0x68
[   35.074498]  kasan_save_track+0x20/0x40
[   35.074871]  kasan_save_alloc_info+0x40/0x58
[   35.074944]  __kasan_kmalloc+0xd4/0xd8
[   35.075122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.075208]  kasan_atomics+0xb8/0x2e0
[   35.075351]  kunit_try_run_case+0x170/0x3f0
[   35.075397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.075575]  kthread+0x328/0x630
[   35.075634]  ret_from_fork+0x10/0x20
[   35.075688] 
[   35.075711] The buggy address belongs to the object at fff00000c9a5e780
[   35.075711]  which belongs to the cache kmalloc-64 of size 64
[   35.075788] The buggy address is located 0 bytes to the right of
[   35.075788]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.075868] 
[   35.075896] The buggy address belongs to the physical page:
[   35.075942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.076000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.076050] page_type: f5(slab)
[   35.076106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.076159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.076211] page dumped because: kasan: bad access detected
[   35.076256] 
[   35.076278] Memory state around the buggy address:
[   35.076314]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.076361]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.076407] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.076463]                                      ^
[   35.076507]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.076552]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.076603] ==================================================================
[   35.319860] ==================================================================
[   35.320083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   35.320309] Write of size 8 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.320372] 
[   35.320408] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.320717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.320958] Hardware name: linux,dummy-virt (DT)
[   35.321221] Call trace:
[   35.321265]  show_stack+0x20/0x38 (C)
[   35.321424]  dump_stack_lvl+0x8c/0xd0
[   35.321649]  print_report+0x118/0x5e8
[   35.321730]  kasan_report+0xdc/0x128
[   35.321778]  kasan_check_range+0x100/0x1a8
[   35.322119]  __kasan_check_write+0x20/0x30
[   35.322206]  kasan_atomics_helper+0x11f8/0x4858
[   35.322260]  kasan_atomics+0x198/0x2e0
[   35.322561]  kunit_try_run_case+0x170/0x3f0
[   35.322944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.323032]  kthread+0x328/0x630
[   35.323400]  ret_from_fork+0x10/0x20
[   35.323517] 
[   35.323606] Allocated by task 297:
[   35.323653]  kasan_save_stack+0x3c/0x68
[   35.324036]  kasan_save_track+0x20/0x40
[   35.324111]  kasan_save_alloc_info+0x40/0x58
[   35.324436]  __kasan_kmalloc+0xd4/0xd8
[   35.324576]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.324693]  kasan_atomics+0xb8/0x2e0
[   35.325502]  kunit_try_run_case+0x170/0x3f0
[   35.325677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.326049]  kthread+0x328/0x630
[   35.326405]  ret_from_fork+0x10/0x20
[   35.326482] 
[   35.326551] The buggy address belongs to the object at fff00000c9a5e780
[   35.326551]  which belongs to the cache kmalloc-64 of size 64
[   35.326806] The buggy address is located 0 bytes to the right of
[   35.326806]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.327039] 
[   35.327141] The buggy address belongs to the physical page:
[   35.327491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.327612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.327679] page_type: f5(slab)
[   35.327731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.327794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.327846] page dumped because: kasan: bad access detected
[   35.327889] 
[   35.327919] Memory state around the buggy address:
[   35.327967]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.328039]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.328093] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.328134]                                      ^
[   35.328170]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.328676]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.328849] ==================================================================
[   34.924968] ==================================================================
[   34.925287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   34.925958] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   34.926621]  print_report+0x118/0x5e8
[   34.927730]  kasan_atomics+0x198/0x2e0
[   34.928343] 
[   34.928483]  kasan_save_alloc_info+0x40/0x58
[   34.928737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.929076] The buggy address belongs to the physical page:
[   34.929434] 
[   34.929652]                                      ^
[   34.931802] ==================================================================
[   35.172434] ==================================================================
[   35.172704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.172914] Write of size 4 at addr fff00000c9a5e7b0 by task kunit_try_catch/297
[   35.172974] 
[   35.173308] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250725 #1 PREEMPT 
[   35.173559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   35.173605] Hardware name: linux,dummy-virt (DT)
[   35.173679] Call trace:
[   35.173838]  show_stack+0x20/0x38 (C)
[   35.174128]  dump_stack_lvl+0x8c/0xd0
[   35.174280]  print_report+0x118/0x5e8
[   35.174339]  kasan_report+0xdc/0x128
[   35.174424]  kasan_check_range+0x100/0x1a8
[   35.174630]  __kasan_check_write+0x20/0x30
[   35.174985]  kasan_atomics_helper+0xd3c/0x4858
[   35.175171]  kasan_atomics+0x198/0x2e0
[   35.175309]  kunit_try_run_case+0x170/0x3f0
[   35.175370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.175428]  kthread+0x328/0x630
[   35.175479]  ret_from_fork+0x10/0x20
[   35.175529] 
[   35.175550] Allocated by task 297:
[   35.175584]  kasan_save_stack+0x3c/0x68
[   35.175964]  kasan_save_track+0x20/0x40
[   35.176285]  kasan_save_alloc_info+0x40/0x58
[   35.176439]  __kasan_kmalloc+0xd4/0xd8
[   35.176484]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.176553]  kasan_atomics+0xb8/0x2e0
[   35.176592]  kunit_try_run_case+0x170/0x3f0
[   35.176631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.176696]  kthread+0x328/0x630
[   35.176741]  ret_from_fork+0x10/0x20
[   35.176778] 
[   35.176809] The buggy address belongs to the object at fff00000c9a5e780
[   35.176809]  which belongs to the cache kmalloc-64 of size 64
[   35.176871] The buggy address is located 0 bytes to the right of
[   35.176871]  allocated 48-byte region [fff00000c9a5e780, fff00000c9a5e7b0)
[   35.176947] 
[   35.176979] The buggy address belongs to the physical page:
[   35.177016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e
[   35.177072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.177122] page_type: f5(slab)
[   35.177164] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.177216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.177268] page dumped because: kasan: bad access detected
[   35.177311] 
[   35.177347] Memory state around the buggy address:
[   35.177391]  fff00000c9a5e680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.177438]  fff00000c9a5e700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.177491] >fff00000c9a5e780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.177540]                                      ^
[   35.177576]  fff00000c9a5e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.177619]  fff00000c9a5e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.177678] ==================================================================

[   28.471578] ==================================================================
[   28.472032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   28.472342] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.472633] 
[   28.472736] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.472784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.472796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.472860] Call Trace:
[   28.472877]  <TASK>
[   28.472892]  dump_stack_lvl+0x73/0xb0
[   28.472921]  print_report+0xd1/0x640
[   28.472957]  ? __virt_addr_valid+0x1db/0x2d0
[   28.472982]  ? kasan_atomics_helper+0x4a0/0x5450
[   28.473004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.473033]  ? kasan_atomics_helper+0x4a0/0x5450
[   28.473056]  kasan_report+0x141/0x180
[   28.473089]  ? kasan_atomics_helper+0x4a0/0x5450
[   28.473117]  kasan_check_range+0x10c/0x1c0
[   28.473147]  __kasan_check_write+0x18/0x20
[   28.473171]  kasan_atomics_helper+0x4a0/0x5450
[   28.473196]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.473220]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.473246]  ? kasan_atomics+0x152/0x310
[   28.473273]  kasan_atomics+0x1dc/0x310
[   28.473297]  ? __pfx_kasan_atomics+0x10/0x10
[   28.473322]  ? __pfx_read_tsc+0x10/0x10
[   28.473346]  ? ktime_get_ts64+0x86/0x230
[   28.473372]  kunit_try_run_case+0x1a5/0x480
[   28.473397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.473421]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.473446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.473475]  ? __kthread_parkme+0x82/0x180
[   28.473498]  ? preempt_count_sub+0x50/0x80
[   28.473523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.473549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.473574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.473600]  kthread+0x337/0x6f0
[   28.473621]  ? trace_preempt_on+0x20/0xc0
[   28.473645]  ? __pfx_kthread+0x10/0x10
[   28.473667]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.473694]  ? calculate_sigpending+0x7b/0xa0
[   28.473719]  ? __pfx_kthread+0x10/0x10
[   28.473743]  ret_from_fork+0x116/0x1d0
[   28.473764]  ? __pfx_kthread+0x10/0x10
[   28.473905]  ret_from_fork_asm+0x1a/0x30
[   28.473962]  </TASK>
[   28.473976] 
[   28.482403] Allocated by task 314:
[   28.482563]  kasan_save_stack+0x45/0x70
[   28.482756]  kasan_save_track+0x18/0x40
[   28.482979]  kasan_save_alloc_info+0x3b/0x50
[   28.483248]  __kasan_kmalloc+0xb7/0xc0
[   28.483381]  __kmalloc_cache_noprof+0x189/0x420
[   28.483538]  kasan_atomics+0x95/0x310
[   28.483727]  kunit_try_run_case+0x1a5/0x480
[   28.484064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.484409]  kthread+0x337/0x6f0
[   28.484529]  ret_from_fork+0x116/0x1d0
[   28.484661]  ret_from_fork_asm+0x1a/0x30
[   28.484800] 
[   28.484866] The buggy address belongs to the object at ffff888106266f00
[   28.484866]  which belongs to the cache kmalloc-64 of size 64
[   28.485386] The buggy address is located 0 bytes to the right of
[   28.485386]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.486026] 
[   28.486302] The buggy address belongs to the physical page:
[   28.486533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.486783] flags: 0x200000000000000(node=0|zone=2)
[   28.486960] page_type: f5(slab)
[   28.487116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.487466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.487809] page dumped because: kasan: bad access detected
[   28.488038] 
[   28.488134] Memory state around the buggy address:
[   28.488342]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.488641]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.488863] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.489113]                                      ^
[   28.489344]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.489664]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.489992] ==================================================================
[   29.726367] ==================================================================
[   29.727069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   29.727782] Read of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.728405] 
[   29.728583] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.728634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.728647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.728670] Call Trace:
[   29.728687]  <TASK>
[   29.728704]  dump_stack_lvl+0x73/0xb0
[   29.728735]  print_report+0xd1/0x640
[   29.728794]  ? __virt_addr_valid+0x1db/0x2d0
[   29.728820]  ? kasan_atomics_helper+0x4f71/0x5450
[   29.728856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.728885]  ? kasan_atomics_helper+0x4f71/0x5450
[   29.728910]  kasan_report+0x141/0x180
[   29.728956]  ? kasan_atomics_helper+0x4f71/0x5450
[   29.728985]  __asan_report_load8_noabort+0x18/0x20
[   29.729012]  kasan_atomics_helper+0x4f71/0x5450
[   29.729039]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.729064]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.729092]  ? kasan_atomics+0x152/0x310
[   29.729121]  kasan_atomics+0x1dc/0x310
[   29.729153]  ? __pfx_kasan_atomics+0x10/0x10
[   29.729179]  ? __pfx_read_tsc+0x10/0x10
[   29.729216]  ? ktime_get_ts64+0x86/0x230
[   29.729243]  kunit_try_run_case+0x1a5/0x480
[   29.729270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.729296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.729320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.729350]  ? __kthread_parkme+0x82/0x180
[   29.729372]  ? preempt_count_sub+0x50/0x80
[   29.729398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.729425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.729452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.729479]  kthread+0x337/0x6f0
[   29.729502]  ? trace_preempt_on+0x20/0xc0
[   29.729527]  ? __pfx_kthread+0x10/0x10
[   29.729550]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.729578]  ? calculate_sigpending+0x7b/0xa0
[   29.729604]  ? __pfx_kthread+0x10/0x10
[   29.729628]  ret_from_fork+0x116/0x1d0
[   29.729650]  ? __pfx_kthread+0x10/0x10
[   29.729673]  ret_from_fork_asm+0x1a/0x30
[   29.729708]  </TASK>
[   29.729720] 
[   29.743410] Allocated by task 314:
[   29.743546]  kasan_save_stack+0x45/0x70
[   29.743691]  kasan_save_track+0x18/0x40
[   29.743829]  kasan_save_alloc_info+0x3b/0x50
[   29.744015]  __kasan_kmalloc+0xb7/0xc0
[   29.744213]  __kmalloc_cache_noprof+0x189/0x420
[   29.744589]  kasan_atomics+0x95/0x310
[   29.744828]  kunit_try_run_case+0x1a5/0x480
[   29.745022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.745264]  kthread+0x337/0x6f0
[   29.745434]  ret_from_fork+0x116/0x1d0
[   29.745585]  ret_from_fork_asm+0x1a/0x30
[   29.745872] 
[   29.745967] The buggy address belongs to the object at ffff888106266f00
[   29.745967]  which belongs to the cache kmalloc-64 of size 64
[   29.746621] The buggy address is located 0 bytes to the right of
[   29.746621]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.747264] 
[   29.747361] The buggy address belongs to the physical page:
[   29.747633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.748202] flags: 0x200000000000000(node=0|zone=2)
[   29.748445] page_type: f5(slab)
[   29.748647] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.749235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.749662] page dumped because: kasan: bad access detected
[   29.750117] 
[   29.750251] Memory state around the buggy address:
[   29.750479]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.750856]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.751321] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.751705]                                      ^
[   29.752174]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.752450]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.752748] ==================================================================
[   29.796186] ==================================================================
[   29.796504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   29.797137] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.797384] 
[   29.797469] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.797518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.797532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.797555] Call Trace:
[   29.797568]  <TASK>
[   29.797584]  dump_stack_lvl+0x73/0xb0
[   29.797614]  print_report+0xd1/0x640
[   29.797638]  ? __virt_addr_valid+0x1db/0x2d0
[   29.797665]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.797689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.797717]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.797741]  kasan_report+0x141/0x180
[   29.797780]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.797809]  kasan_check_range+0x10c/0x1c0
[   29.797848]  __kasan_check_write+0x18/0x20
[   29.797874]  kasan_atomics_helper+0x20c8/0x5450
[   29.797900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.797925]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.797961]  ? kasan_atomics+0x152/0x310
[   29.797990]  kasan_atomics+0x1dc/0x310
[   29.798015]  ? __pfx_kasan_atomics+0x10/0x10
[   29.798042]  ? __pfx_read_tsc+0x10/0x10
[   29.798074]  ? ktime_get_ts64+0x86/0x230
[   29.798101]  kunit_try_run_case+0x1a5/0x480
[   29.798127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.798153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.798176]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.798205]  ? __kthread_parkme+0x82/0x180
[   29.798227]  ? preempt_count_sub+0x50/0x80
[   29.798253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.798279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.798305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.798331]  kthread+0x337/0x6f0
[   29.798353]  ? trace_preempt_on+0x20/0xc0
[   29.798378]  ? __pfx_kthread+0x10/0x10
[   29.798401]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.798426]  ? calculate_sigpending+0x7b/0xa0
[   29.798451]  ? __pfx_kthread+0x10/0x10
[   29.798486]  ret_from_fork+0x116/0x1d0
[   29.798507]  ? __pfx_kthread+0x10/0x10
[   29.798529]  ret_from_fork_asm+0x1a/0x30
[   29.798576]  </TASK>
[   29.798588] 
[   29.806640] Allocated by task 314:
[   29.806815]  kasan_save_stack+0x45/0x70
[   29.807029]  kasan_save_track+0x18/0x40
[   29.807238]  kasan_save_alloc_info+0x3b/0x50
[   29.807451]  __kasan_kmalloc+0xb7/0xc0
[   29.807637]  __kmalloc_cache_noprof+0x189/0x420
[   29.807843]  kasan_atomics+0x95/0x310
[   29.808051]  kunit_try_run_case+0x1a5/0x480
[   29.808297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.808558]  kthread+0x337/0x6f0
[   29.808723]  ret_from_fork+0x116/0x1d0
[   29.808925]  ret_from_fork_asm+0x1a/0x30
[   29.809140] 
[   29.809223] The buggy address belongs to the object at ffff888106266f00
[   29.809223]  which belongs to the cache kmalloc-64 of size 64
[   29.809652] The buggy address is located 0 bytes to the right of
[   29.809652]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.810309] 
[   29.810467] The buggy address belongs to the physical page:
[   29.811018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.811927] flags: 0x200000000000000(node=0|zone=2)
[   29.812355] page_type: f5(slab)
[   29.812643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.813241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.813473] page dumped because: kasan: bad access detected
[   29.813640] 
[   29.813706] Memory state around the buggy address:
[   29.813856]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.814149]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.814488] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.814823]                                      ^
[   29.815085]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.815437]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.815773] ==================================================================
[   29.855127] ==================================================================
[   29.855425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   29.855734] Read of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.856190] 
[   29.856320] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.856383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.856396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.856419] Call Trace:
[   29.856436]  <TASK>
[   29.856451]  dump_stack_lvl+0x73/0xb0
[   29.856483]  print_report+0xd1/0x640
[   29.856508]  ? __virt_addr_valid+0x1db/0x2d0
[   29.856533]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.856557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.856596]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.856620]  kasan_report+0x141/0x180
[   29.856644]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.856683]  __asan_report_load8_noabort+0x18/0x20
[   29.856710]  kasan_atomics_helper+0x4fa5/0x5450
[   29.856735]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.856759]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.856786]  ? kasan_atomics+0x152/0x310
[   29.856814]  kasan_atomics+0x1dc/0x310
[   29.856838]  ? __pfx_kasan_atomics+0x10/0x10
[   29.856864]  ? __pfx_read_tsc+0x10/0x10
[   29.856888]  ? ktime_get_ts64+0x86/0x230
[   29.856913]  kunit_try_run_case+0x1a5/0x480
[   29.856940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.856973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.856997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.857026]  ? __kthread_parkme+0x82/0x180
[   29.857047]  ? preempt_count_sub+0x50/0x80
[   29.857084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.857119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.857149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.857187]  kthread+0x337/0x6f0
[   29.857210]  ? trace_preempt_on+0x20/0xc0
[   29.857234]  ? __pfx_kthread+0x10/0x10
[   29.857269]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.857295]  ? calculate_sigpending+0x7b/0xa0
[   29.857320]  ? __pfx_kthread+0x10/0x10
[   29.857355]  ret_from_fork+0x116/0x1d0
[   29.857377]  ? __pfx_kthread+0x10/0x10
[   29.857400]  ret_from_fork_asm+0x1a/0x30
[   29.857445]  </TASK>
[   29.857456] 
[   29.865289] Allocated by task 314:
[   29.865476]  kasan_save_stack+0x45/0x70
[   29.865665]  kasan_save_track+0x18/0x40
[   29.865846]  kasan_save_alloc_info+0x3b/0x50
[   29.866049]  __kasan_kmalloc+0xb7/0xc0
[   29.866281]  __kmalloc_cache_noprof+0x189/0x420
[   29.866512]  kasan_atomics+0x95/0x310
[   29.866660]  kunit_try_run_case+0x1a5/0x480
[   29.866807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.866996]  kthread+0x337/0x6f0
[   29.867245]  ret_from_fork+0x116/0x1d0
[   29.867470]  ret_from_fork_asm+0x1a/0x30
[   29.867670] 
[   29.867762] The buggy address belongs to the object at ffff888106266f00
[   29.867762]  which belongs to the cache kmalloc-64 of size 64
[   29.868486] The buggy address is located 0 bytes to the right of
[   29.868486]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.868999] 
[   29.869130] The buggy address belongs to the physical page:
[   29.869370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.869706] flags: 0x200000000000000(node=0|zone=2)
[   29.869917] page_type: f5(slab)
[   29.870115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.870444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.870761] page dumped because: kasan: bad access detected
[   29.871008] 
[   29.871149] Memory state around the buggy address:
[   29.871330]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.871550]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.871771] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.872178]                                      ^
[   29.872617]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.873286]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.874157] ==================================================================
[   29.178157] ==================================================================
[   29.178651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   29.179021] Read of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.179364] 
[   29.179723] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.179773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.179846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.179872] Call Trace:
[   29.179887]  <TASK>
[   29.179927]  dump_stack_lvl+0x73/0xb0
[   29.179972]  print_report+0xd1/0x640
[   29.179997]  ? __virt_addr_valid+0x1db/0x2d0
[   29.180022]  ? kasan_atomics_helper+0x4eae/0x5450
[   29.180045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.180082]  ? kasan_atomics_helper+0x4eae/0x5450
[   29.180105]  kasan_report+0x141/0x180
[   29.180129]  ? kasan_atomics_helper+0x4eae/0x5450
[   29.180157]  __asan_report_load8_noabort+0x18/0x20
[   29.180183]  kasan_atomics_helper+0x4eae/0x5450
[   29.180207]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.180232]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.180258]  ? kasan_atomics+0x152/0x310
[   29.180286]  kasan_atomics+0x1dc/0x310
[   29.180310]  ? __pfx_kasan_atomics+0x10/0x10
[   29.180336]  ? __pfx_read_tsc+0x10/0x10
[   29.180359]  ? ktime_get_ts64+0x86/0x230
[   29.180386]  kunit_try_run_case+0x1a5/0x480
[   29.180412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.180437]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.180461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.180489]  ? __kthread_parkme+0x82/0x180
[   29.180532]  ? preempt_count_sub+0x50/0x80
[   29.180557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.180585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.180611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.180638]  kthread+0x337/0x6f0
[   29.180660]  ? trace_preempt_on+0x20/0xc0
[   29.180685]  ? __pfx_kthread+0x10/0x10
[   29.180707]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.180734]  ? calculate_sigpending+0x7b/0xa0
[   29.180759]  ? __pfx_kthread+0x10/0x10
[   29.180827]  ret_from_fork+0x116/0x1d0
[   29.180853]  ? __pfx_kthread+0x10/0x10
[   29.180876]  ret_from_fork_asm+0x1a/0x30
[   29.180909]  </TASK>
[   29.180921] 
[   29.189583] Allocated by task 314:
[   29.190381]  kasan_save_stack+0x45/0x70
[   29.190548]  kasan_save_track+0x18/0x40
[   29.190688]  kasan_save_alloc_info+0x3b/0x50
[   29.191666]  __kasan_kmalloc+0xb7/0xc0
[   29.191939]  __kmalloc_cache_noprof+0x189/0x420
[   29.192327]  kasan_atomics+0x95/0x310
[   29.192527]  kunit_try_run_case+0x1a5/0x480
[   29.192955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.193323]  kthread+0x337/0x6f0
[   29.193499]  ret_from_fork+0x116/0x1d0
[   29.193822]  ret_from_fork_asm+0x1a/0x30
[   29.194308] 
[   29.194394] The buggy address belongs to the object at ffff888106266f00
[   29.194394]  which belongs to the cache kmalloc-64 of size 64
[   29.195285] The buggy address is located 0 bytes to the right of
[   29.195285]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.195893] 
[   29.195993] The buggy address belongs to the physical page:
[   29.196533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.197159] flags: 0x200000000000000(node=0|zone=2)
[   29.197354] page_type: f5(slab)
[   29.197665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.198356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.198766] page dumped because: kasan: bad access detected
[   29.199221] 
[   29.199324] Memory state around the buggy address:
[   29.199526]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.200110]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.200468] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.201025]                                      ^
[   29.201377]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.201691]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.202232] ==================================================================
[   28.663519] ==================================================================
[   28.663933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   28.664453] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.665198] 
[   28.665444] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.665503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.665518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.665543] Call Trace:
[   28.665567]  <TASK>
[   28.665586]  dump_stack_lvl+0x73/0xb0
[   28.665618]  print_report+0xd1/0x640
[   28.665643]  ? __virt_addr_valid+0x1db/0x2d0
[   28.665670]  ? kasan_atomics_helper+0x992/0x5450
[   28.665692]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.665720]  ? kasan_atomics_helper+0x992/0x5450
[   28.665744]  kasan_report+0x141/0x180
[   28.665768]  ? kasan_atomics_helper+0x992/0x5450
[   28.665852]  kasan_check_range+0x10c/0x1c0
[   28.665885]  __kasan_check_write+0x18/0x20
[   28.665910]  kasan_atomics_helper+0x992/0x5450
[   28.665937]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.665972]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.666000]  ? kasan_atomics+0x152/0x310
[   28.666029]  kasan_atomics+0x1dc/0x310
[   28.666066]  ? __pfx_kasan_atomics+0x10/0x10
[   28.666094]  ? __pfx_read_tsc+0x10/0x10
[   28.666118]  ? ktime_get_ts64+0x86/0x230
[   28.666146]  kunit_try_run_case+0x1a5/0x480
[   28.666174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.666200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.666226]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.666255]  ? __kthread_parkme+0x82/0x180
[   28.666278]  ? preempt_count_sub+0x50/0x80
[   28.666304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.666331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.666357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.666385]  kthread+0x337/0x6f0
[   28.666407]  ? trace_preempt_on+0x20/0xc0
[   28.666432]  ? __pfx_kthread+0x10/0x10
[   28.666455]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.666482]  ? calculate_sigpending+0x7b/0xa0
[   28.666509]  ? __pfx_kthread+0x10/0x10
[   28.666532]  ret_from_fork+0x116/0x1d0
[   28.666554]  ? __pfx_kthread+0x10/0x10
[   28.666577]  ret_from_fork_asm+0x1a/0x30
[   28.666611]  </TASK>
[   28.666624] 
[   28.681210] Allocated by task 314:
[   28.681536]  kasan_save_stack+0x45/0x70
[   28.681935]  kasan_save_track+0x18/0x40
[   28.682357]  kasan_save_alloc_info+0x3b/0x50
[   28.682745]  __kasan_kmalloc+0xb7/0xc0
[   28.683305]  __kmalloc_cache_noprof+0x189/0x420
[   28.683483]  kasan_atomics+0x95/0x310
[   28.683618]  kunit_try_run_case+0x1a5/0x480
[   28.683767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.684294]  kthread+0x337/0x6f0
[   28.684665]  ret_from_fork+0x116/0x1d0
[   28.685075]  ret_from_fork_asm+0x1a/0x30
[   28.685481] 
[   28.685653] The buggy address belongs to the object at ffff888106266f00
[   28.685653]  which belongs to the cache kmalloc-64 of size 64
[   28.686961] The buggy address is located 0 bytes to the right of
[   28.686961]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.688078] 
[   28.688162] The buggy address belongs to the physical page:
[   28.688345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.688594] flags: 0x200000000000000(node=0|zone=2)
[   28.688761] page_type: f5(slab)
[   28.689114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.689780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.690528] page dumped because: kasan: bad access detected
[   28.691142] 
[   28.691333] Memory state around the buggy address:
[   28.691910]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.692659]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.693348] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.694017]                                      ^
[   28.694580]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.695239]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.695751] ==================================================================
[   29.510855] ==================================================================
[   29.511387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   29.511880] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.512601] 
[   29.512720] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.512772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.512785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.512807] Call Trace:
[   29.512823]  <TASK>
[   29.512839]  dump_stack_lvl+0x73/0xb0
[   29.512870]  print_report+0xd1/0x640
[   29.512894]  ? __virt_addr_valid+0x1db/0x2d0
[   29.512920]  ? kasan_atomics_helper+0x1c18/0x5450
[   29.512954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.512983]  ? kasan_atomics_helper+0x1c18/0x5450
[   29.513006]  kasan_report+0x141/0x180
[   29.513030]  ? kasan_atomics_helper+0x1c18/0x5450
[   29.513058]  kasan_check_range+0x10c/0x1c0
[   29.513085]  __kasan_check_write+0x18/0x20
[   29.513294]  kasan_atomics_helper+0x1c18/0x5450
[   29.513325]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.513351]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.513377]  ? kasan_atomics+0x152/0x310
[   29.513405]  kasan_atomics+0x1dc/0x310
[   29.513429]  ? __pfx_kasan_atomics+0x10/0x10
[   29.513455]  ? __pfx_read_tsc+0x10/0x10
[   29.513479]  ? ktime_get_ts64+0x86/0x230
[   29.513505]  kunit_try_run_case+0x1a5/0x480
[   29.513531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.513556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.513580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.513608]  ? __kthread_parkme+0x82/0x180
[   29.513630]  ? preempt_count_sub+0x50/0x80
[   29.513656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.513682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.513708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.513733]  kthread+0x337/0x6f0
[   29.513756]  ? trace_preempt_on+0x20/0xc0
[   29.513789]  ? __pfx_kthread+0x10/0x10
[   29.513818]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.513844]  ? calculate_sigpending+0x7b/0xa0
[   29.513870]  ? __pfx_kthread+0x10/0x10
[   29.513893]  ret_from_fork+0x116/0x1d0
[   29.513914]  ? __pfx_kthread+0x10/0x10
[   29.513937]  ret_from_fork_asm+0x1a/0x30
[   29.513983]  </TASK>
[   29.513996] 
[   29.526557] Allocated by task 314:
[   29.526765]  kasan_save_stack+0x45/0x70
[   29.527184]  kasan_save_track+0x18/0x40
[   29.527335]  kasan_save_alloc_info+0x3b/0x50
[   29.527610]  __kasan_kmalloc+0xb7/0xc0
[   29.528072]  __kmalloc_cache_noprof+0x189/0x420
[   29.528397]  kasan_atomics+0x95/0x310
[   29.528575]  kunit_try_run_case+0x1a5/0x480
[   29.528766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.529281]  kthread+0x337/0x6f0
[   29.529417]  ret_from_fork+0x116/0x1d0
[   29.529771]  ret_from_fork_asm+0x1a/0x30
[   29.530182] 
[   29.530281] The buggy address belongs to the object at ffff888106266f00
[   29.530281]  which belongs to the cache kmalloc-64 of size 64
[   29.531197] The buggy address is located 0 bytes to the right of
[   29.531197]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.531750] 
[   29.532104] The buggy address belongs to the physical page:
[   29.532487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.533034] flags: 0x200000000000000(node=0|zone=2)
[   29.533295] page_type: f5(slab)
[   29.533560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.534174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.534452] page dumped because: kasan: bad access detected
[   29.534850] 
[   29.534955] Memory state around the buggy address:
[   29.535525]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.535847]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.536384] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.536725]                                      ^
[   29.537205]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.537545]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.538080] ==================================================================
[   29.594421] ==================================================================
[   29.594668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   29.595666] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.596328] 
[   29.596424] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.596477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.596491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.596513] Call Trace:
[   29.596529]  <TASK>
[   29.596545]  dump_stack_lvl+0x73/0xb0
[   29.596576]  print_report+0xd1/0x640
[   29.596600]  ? __virt_addr_valid+0x1db/0x2d0
[   29.596625]  ? kasan_atomics_helper+0x1d7a/0x5450
[   29.596648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.596676]  ? kasan_atomics_helper+0x1d7a/0x5450
[   29.596699]  kasan_report+0x141/0x180
[   29.596724]  ? kasan_atomics_helper+0x1d7a/0x5450
[   29.596752]  kasan_check_range+0x10c/0x1c0
[   29.596778]  __kasan_check_write+0x18/0x20
[   29.596804]  kasan_atomics_helper+0x1d7a/0x5450
[   29.596829]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.596853]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.596879]  ? kasan_atomics+0x152/0x310
[   29.596907]  kasan_atomics+0x1dc/0x310
[   29.596931]  ? __pfx_kasan_atomics+0x10/0x10
[   29.596966]  ? __pfx_read_tsc+0x10/0x10
[   29.596990]  ? ktime_get_ts64+0x86/0x230
[   29.597021]  kunit_try_run_case+0x1a5/0x480
[   29.597047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.597073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.597096]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.597129]  ? __kthread_parkme+0x82/0x180
[   29.597151]  ? preempt_count_sub+0x50/0x80
[   29.597176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.597202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.597228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.597253]  kthread+0x337/0x6f0
[   29.597275]  ? trace_preempt_on+0x20/0xc0
[   29.597299]  ? __pfx_kthread+0x10/0x10
[   29.597322]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.597347]  ? calculate_sigpending+0x7b/0xa0
[   29.597373]  ? __pfx_kthread+0x10/0x10
[   29.597396]  ret_from_fork+0x116/0x1d0
[   29.597417]  ? __pfx_kthread+0x10/0x10
[   29.597439]  ret_from_fork_asm+0x1a/0x30
[   29.597472]  </TASK>
[   29.597484] 
[   29.608906] Allocated by task 314:
[   29.609277]  kasan_save_stack+0x45/0x70
[   29.609715]  kasan_save_track+0x18/0x40
[   29.610270]  kasan_save_alloc_info+0x3b/0x50
[   29.610829]  __kasan_kmalloc+0xb7/0xc0
[   29.611243]  __kmalloc_cache_noprof+0x189/0x420
[   29.611779]  kasan_atomics+0x95/0x310
[   29.612141]  kunit_try_run_case+0x1a5/0x480
[   29.612542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.613147]  kthread+0x337/0x6f0
[   29.613530]  ret_from_fork+0x116/0x1d0
[   29.613951]  ret_from_fork_asm+0x1a/0x30
[   29.614496] 
[   29.614671] The buggy address belongs to the object at ffff888106266f00
[   29.614671]  which belongs to the cache kmalloc-64 of size 64
[   29.615917] The buggy address is located 0 bytes to the right of
[   29.615917]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.617293] 
[   29.617489] The buggy address belongs to the physical page:
[   29.618114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.618964] flags: 0x200000000000000(node=0|zone=2)
[   29.619422] page_type: f5(slab)
[   29.619739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.620689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.621479] page dumped because: kasan: bad access detected
[   29.622002] 
[   29.622185] Memory state around the buggy address:
[   29.622581]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.622811]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.623350] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.623572]                                      ^
[   29.623730]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.624037]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.624648] ==================================================================
[   29.056743] ==================================================================
[   29.057259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   29.057637] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.058092] 
[   29.058250] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.058298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.058311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.058332] Call Trace:
[   29.058348]  <TASK>
[   29.058362]  dump_stack_lvl+0x73/0xb0
[   29.058392]  print_report+0xd1/0x640
[   29.058417]  ? __virt_addr_valid+0x1db/0x2d0
[   29.058441]  ? kasan_atomics_helper+0x4a02/0x5450
[   29.058465]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.058493]  ? kasan_atomics_helper+0x4a02/0x5450
[   29.058517]  kasan_report+0x141/0x180
[   29.058541]  ? kasan_atomics_helper+0x4a02/0x5450
[   29.058568]  __asan_report_load4_noabort+0x18/0x20
[   29.058595]  kasan_atomics_helper+0x4a02/0x5450
[   29.058621]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.058644]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.058671]  ? kasan_atomics+0x152/0x310
[   29.058698]  kasan_atomics+0x1dc/0x310
[   29.058722]  ? __pfx_kasan_atomics+0x10/0x10
[   29.058750]  ? __pfx_read_tsc+0x10/0x10
[   29.058774]  ? ktime_get_ts64+0x86/0x230
[   29.058799]  kunit_try_run_case+0x1a5/0x480
[   29.058825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.058851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.058875]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.058903]  ? __kthread_parkme+0x82/0x180
[   29.058925]  ? preempt_count_sub+0x50/0x80
[   29.058968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.058995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.059020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.059047]  kthread+0x337/0x6f0
[   29.059069]  ? trace_preempt_on+0x20/0xc0
[   29.059094]  ? __pfx_kthread+0x10/0x10
[   29.059117]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.059143]  ? calculate_sigpending+0x7b/0xa0
[   29.059168]  ? __pfx_kthread+0x10/0x10
[   29.059192]  ret_from_fork+0x116/0x1d0
[   29.059214]  ? __pfx_kthread+0x10/0x10
[   29.059236]  ret_from_fork_asm+0x1a/0x30
[   29.059270]  </TASK>
[   29.059282] 
[   29.067538] Allocated by task 314:
[   29.067719]  kasan_save_stack+0x45/0x70
[   29.068000]  kasan_save_track+0x18/0x40
[   29.068228]  kasan_save_alloc_info+0x3b/0x50
[   29.068442]  __kasan_kmalloc+0xb7/0xc0
[   29.068632]  __kmalloc_cache_noprof+0x189/0x420
[   29.068891]  kasan_atomics+0x95/0x310
[   29.069112]  kunit_try_run_case+0x1a5/0x480
[   29.069354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.069634]  kthread+0x337/0x6f0
[   29.070022]  ret_from_fork+0x116/0x1d0
[   29.070272]  ret_from_fork_asm+0x1a/0x30
[   29.070424] 
[   29.070493] The buggy address belongs to the object at ffff888106266f00
[   29.070493]  which belongs to the cache kmalloc-64 of size 64
[   29.070953] The buggy address is located 0 bytes to the right of
[   29.070953]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.071571] 
[   29.071663] The buggy address belongs to the physical page:
[   29.072002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.072395] flags: 0x200000000000000(node=0|zone=2)
[   29.072589] page_type: f5(slab)
[   29.072711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.073120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.073499] page dumped because: kasan: bad access detected
[   29.073817] 
[   29.073912] Memory state around the buggy address:
[   29.074321]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.074603]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.075081] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.075381]                                      ^
[   29.075575]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.075905]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.076141] ==================================================================
[   29.342749] ==================================================================
[   29.343294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   29.343562] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.343803] 
[   29.343904] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.343963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.343976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.343998] Call Trace:
[   29.344011]  <TASK>
[   29.344026]  dump_stack_lvl+0x73/0xb0
[   29.344054]  print_report+0xd1/0x640
[   29.344077]  ? __virt_addr_valid+0x1db/0x2d0
[   29.344102]  ? kasan_atomics_helper+0x177f/0x5450
[   29.344139]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.344167]  ? kasan_atomics_helper+0x177f/0x5450
[   29.344191]  kasan_report+0x141/0x180
[   29.344215]  ? kasan_atomics_helper+0x177f/0x5450
[   29.344243]  kasan_check_range+0x10c/0x1c0
[   29.344268]  __kasan_check_write+0x18/0x20
[   29.344294]  kasan_atomics_helper+0x177f/0x5450
[   29.344318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.344342]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.344369]  ? kasan_atomics+0x152/0x310
[   29.344397]  kasan_atomics+0x1dc/0x310
[   29.344421]  ? __pfx_kasan_atomics+0x10/0x10
[   29.344448]  ? __pfx_read_tsc+0x10/0x10
[   29.344470]  ? ktime_get_ts64+0x86/0x230
[   29.344497]  kunit_try_run_case+0x1a5/0x480
[   29.344523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.344548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.344572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.344600]  ? __kthread_parkme+0x82/0x180
[   29.344623]  ? preempt_count_sub+0x50/0x80
[   29.344648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.344674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.344700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.344726]  kthread+0x337/0x6f0
[   29.344748]  ? trace_preempt_on+0x20/0xc0
[   29.344772]  ? __pfx_kthread+0x10/0x10
[   29.344795]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.344821]  ? calculate_sigpending+0x7b/0xa0
[   29.344846]  ? __pfx_kthread+0x10/0x10
[   29.344869]  ret_from_fork+0x116/0x1d0
[   29.344890]  ? __pfx_kthread+0x10/0x10
[   29.344912]  ret_from_fork_asm+0x1a/0x30
[   29.344954]  </TASK>
[   29.344966] 
[   29.353255] Allocated by task 314:
[   29.353443]  kasan_save_stack+0x45/0x70
[   29.353608]  kasan_save_track+0x18/0x40
[   29.353747]  kasan_save_alloc_info+0x3b/0x50
[   29.354232]  __kasan_kmalloc+0xb7/0xc0
[   29.354403]  __kmalloc_cache_noprof+0x189/0x420
[   29.354601]  kasan_atomics+0x95/0x310
[   29.354769]  kunit_try_run_case+0x1a5/0x480
[   29.354961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.355397]  kthread+0x337/0x6f0
[   29.355586]  ret_from_fork+0x116/0x1d0
[   29.355733]  ret_from_fork_asm+0x1a/0x30
[   29.356096] 
[   29.356178] The buggy address belongs to the object at ffff888106266f00
[   29.356178]  which belongs to the cache kmalloc-64 of size 64
[   29.356637] The buggy address is located 0 bytes to the right of
[   29.356637]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.357031] 
[   29.357100] The buggy address belongs to the physical page:
[   29.357625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.358005] flags: 0x200000000000000(node=0|zone=2)
[   29.358241] page_type: f5(slab)
[   29.358417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.358760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.359075] page dumped because: kasan: bad access detected
[   29.359250] 
[   29.359316] Memory state around the buggy address:
[   29.359473]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.359694]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.360126] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.360461]                                      ^
[   29.360684]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.361012]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.361296] ==================================================================
[   28.725598] ==================================================================
[   28.725999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   28.726245] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.726674] 
[   28.726758] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.726928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.726959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.726981] Call Trace:
[   28.726998]  <TASK>
[   28.727014]  dump_stack_lvl+0x73/0xb0
[   28.727045]  print_report+0xd1/0x640
[   28.727078]  ? __virt_addr_valid+0x1db/0x2d0
[   28.727103]  ? kasan_atomics_helper+0xac7/0x5450
[   28.727127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.727156]  ? kasan_atomics_helper+0xac7/0x5450
[   28.727180]  kasan_report+0x141/0x180
[   28.727203]  ? kasan_atomics_helper+0xac7/0x5450
[   28.727231]  kasan_check_range+0x10c/0x1c0
[   28.727256]  __kasan_check_write+0x18/0x20
[   28.727282]  kasan_atomics_helper+0xac7/0x5450
[   28.727306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.727331]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.727356]  ? kasan_atomics+0x152/0x310
[   28.727385]  kasan_atomics+0x1dc/0x310
[   28.727409]  ? __pfx_kasan_atomics+0x10/0x10
[   28.727437]  ? __pfx_read_tsc+0x10/0x10
[   28.727461]  ? ktime_get_ts64+0x86/0x230
[   28.727487]  kunit_try_run_case+0x1a5/0x480
[   28.727512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.727537]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.727560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.727588]  ? __kthread_parkme+0x82/0x180
[   28.727611]  ? preempt_count_sub+0x50/0x80
[   28.727636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.727662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.727688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.727714]  kthread+0x337/0x6f0
[   28.727735]  ? trace_preempt_on+0x20/0xc0
[   28.727761]  ? __pfx_kthread+0x10/0x10
[   28.727796]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.727824]  ? calculate_sigpending+0x7b/0xa0
[   28.727849]  ? __pfx_kthread+0x10/0x10
[   28.727873]  ret_from_fork+0x116/0x1d0
[   28.727894]  ? __pfx_kthread+0x10/0x10
[   28.727917]  ret_from_fork_asm+0x1a/0x30
[   28.727960]  </TASK>
[   28.727972] 
[   28.735704] Allocated by task 314:
[   28.735856]  kasan_save_stack+0x45/0x70
[   28.736066]  kasan_save_track+0x18/0x40
[   28.736260]  kasan_save_alloc_info+0x3b/0x50
[   28.736469]  __kasan_kmalloc+0xb7/0xc0
[   28.736656]  __kmalloc_cache_noprof+0x189/0x420
[   28.736875]  kasan_atomics+0x95/0x310
[   28.737324]  kunit_try_run_case+0x1a5/0x480
[   28.737487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.737692]  kthread+0x337/0x6f0
[   28.737999]  ret_from_fork+0x116/0x1d0
[   28.738376]  ret_from_fork_asm+0x1a/0x30
[   28.738577] 
[   28.738671] The buggy address belongs to the object at ffff888106266f00
[   28.738671]  which belongs to the cache kmalloc-64 of size 64
[   28.739349] The buggy address is located 0 bytes to the right of
[   28.739349]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.739738] 
[   28.740516] The buggy address belongs to the physical page:
[   28.740884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.741262] flags: 0x200000000000000(node=0|zone=2)
[   28.741499] page_type: f5(slab)
[   28.742219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.742997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.743705] page dumped because: kasan: bad access detected
[   28.744859] 
[   28.745359] Memory state around the buggy address:
[   28.746375]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.747031]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.747620] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.748239]                                      ^
[   28.748925]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.749767]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.750542] ==================================================================
[   29.203072] ==================================================================
[   29.203800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   29.204742] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.205267] 
[   29.205371] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.205423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.205589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.205614] Call Trace:
[   29.205628]  <TASK>
[   29.205646]  dump_stack_lvl+0x73/0xb0
[   29.205677]  print_report+0xd1/0x640
[   29.205702]  ? __virt_addr_valid+0x1db/0x2d0
[   29.205728]  ? kasan_atomics_helper+0x1467/0x5450
[   29.205750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.205779]  ? kasan_atomics_helper+0x1467/0x5450
[   29.205908]  kasan_report+0x141/0x180
[   29.205936]  ? kasan_atomics_helper+0x1467/0x5450
[   29.205980]  kasan_check_range+0x10c/0x1c0
[   29.206006]  __kasan_check_write+0x18/0x20
[   29.206032]  kasan_atomics_helper+0x1467/0x5450
[   29.206056]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.206081]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.206107]  ? kasan_atomics+0x152/0x310
[   29.206135]  kasan_atomics+0x1dc/0x310
[   29.206160]  ? __pfx_kasan_atomics+0x10/0x10
[   29.206185]  ? __pfx_read_tsc+0x10/0x10
[   29.206210]  ? ktime_get_ts64+0x86/0x230
[   29.206236]  kunit_try_run_case+0x1a5/0x480
[   29.206262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.206287]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.206310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.206339]  ? __kthread_parkme+0x82/0x180
[   29.206361]  ? preempt_count_sub+0x50/0x80
[   29.206385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.206412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.206438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.206464]  kthread+0x337/0x6f0
[   29.206486]  ? trace_preempt_on+0x20/0xc0
[   29.206512]  ? __pfx_kthread+0x10/0x10
[   29.206534]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.206560]  ? calculate_sigpending+0x7b/0xa0
[   29.206585]  ? __pfx_kthread+0x10/0x10
[   29.206609]  ret_from_fork+0x116/0x1d0
[   29.206630]  ? __pfx_kthread+0x10/0x10
[   29.206653]  ret_from_fork_asm+0x1a/0x30
[   29.206686]  </TASK>
[   29.206698] 
[   29.218761] Allocated by task 314:
[   29.219271]  kasan_save_stack+0x45/0x70
[   29.219556]  kasan_save_track+0x18/0x40
[   29.219725]  kasan_save_alloc_info+0x3b/0x50
[   29.220130]  __kasan_kmalloc+0xb7/0xc0
[   29.220304]  __kmalloc_cache_noprof+0x189/0x420
[   29.220518]  kasan_atomics+0x95/0x310
[   29.220700]  kunit_try_run_case+0x1a5/0x480
[   29.220902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.221635]  kthread+0x337/0x6f0
[   29.221794]  ret_from_fork+0x116/0x1d0
[   29.222319]  ret_from_fork_asm+0x1a/0x30
[   29.222668] 
[   29.222763] The buggy address belongs to the object at ffff888106266f00
[   29.222763]  which belongs to the cache kmalloc-64 of size 64
[   29.223839] The buggy address is located 0 bytes to the right of
[   29.223839]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.224530] 
[   29.224640] The buggy address belongs to the physical page:
[   29.225307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.225650] flags: 0x200000000000000(node=0|zone=2)
[   29.226019] page_type: f5(slab)
[   29.226266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.226757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.227320] page dumped because: kasan: bad access detected
[   29.227649] 
[   29.227725] Memory state around the buggy address:
[   29.228017]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.228610]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.229241] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.229649]                                      ^
[   29.230066]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.230545]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.231040] ==================================================================
[   29.566089] ==================================================================
[   29.566772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   29.567337] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.568007] 
[   29.568175] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.568226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.568240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.568263] Call Trace:
[   29.568280]  <TASK>
[   29.568297]  dump_stack_lvl+0x73/0xb0
[   29.568329]  print_report+0xd1/0x640
[   29.568354]  ? __virt_addr_valid+0x1db/0x2d0
[   29.568377]  ? kasan_atomics_helper+0x1ce1/0x5450
[   29.568400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.568536]  ? kasan_atomics_helper+0x1ce1/0x5450
[   29.568570]  kasan_report+0x141/0x180
[   29.568596]  ? kasan_atomics_helper+0x1ce1/0x5450
[   29.568625]  kasan_check_range+0x10c/0x1c0
[   29.568651]  __kasan_check_write+0x18/0x20
[   29.568677]  kasan_atomics_helper+0x1ce1/0x5450
[   29.568703]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.568726]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.568753]  ? kasan_atomics+0x152/0x310
[   29.568780]  kasan_atomics+0x1dc/0x310
[   29.568805]  ? __pfx_kasan_atomics+0x10/0x10
[   29.568831]  ? __pfx_read_tsc+0x10/0x10
[   29.568855]  ? ktime_get_ts64+0x86/0x230
[   29.568881]  kunit_try_run_case+0x1a5/0x480
[   29.568906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.568930]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.568966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.569070]  ? __kthread_parkme+0x82/0x180
[   29.569095]  ? preempt_count_sub+0x50/0x80
[   29.569121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.569152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.569178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.569204]  kthread+0x337/0x6f0
[   29.569226]  ? trace_preempt_on+0x20/0xc0
[   29.569250]  ? __pfx_kthread+0x10/0x10
[   29.569273]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.569298]  ? calculate_sigpending+0x7b/0xa0
[   29.569324]  ? __pfx_kthread+0x10/0x10
[   29.569347]  ret_from_fork+0x116/0x1d0
[   29.569368]  ? __pfx_kthread+0x10/0x10
[   29.569390]  ret_from_fork_asm+0x1a/0x30
[   29.569423]  </TASK>
[   29.569435] 
[   29.581798] Allocated by task 314:
[   29.581971]  kasan_save_stack+0x45/0x70
[   29.582582]  kasan_save_track+0x18/0x40
[   29.582804]  kasan_save_alloc_info+0x3b/0x50
[   29.583138]  __kasan_kmalloc+0xb7/0xc0
[   29.583604]  __kmalloc_cache_noprof+0x189/0x420
[   29.583996]  kasan_atomics+0x95/0x310
[   29.584206]  kunit_try_run_case+0x1a5/0x480
[   29.584406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.585107]  kthread+0x337/0x6f0
[   29.585596]  ret_from_fork+0x116/0x1d0
[   29.585780]  ret_from_fork_asm+0x1a/0x30
[   29.586019] 
[   29.586257] The buggy address belongs to the object at ffff888106266f00
[   29.586257]  which belongs to the cache kmalloc-64 of size 64
[   29.587167] The buggy address is located 0 bytes to the right of
[   29.587167]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.587831] 
[   29.587978] The buggy address belongs to the physical page:
[   29.588231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.588840] flags: 0x200000000000000(node=0|zone=2)
[   29.589145] page_type: f5(slab)
[   29.589495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.589876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.590482] page dumped because: kasan: bad access detected
[   29.590689] 
[   29.591023] Memory state around the buggy address:
[   29.591270]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.591671]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.592156] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.592568]                                      ^
[   29.592777]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.593348]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.593758] ==================================================================
[   29.694752] ==================================================================
[   29.695641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   29.696377] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.697092] 
[   29.697342] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.697428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.697443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.697466] Call Trace:
[   29.697487]  <TASK>
[   29.697518]  dump_stack_lvl+0x73/0xb0
[   29.697550]  print_report+0xd1/0x640
[   29.697575]  ? __virt_addr_valid+0x1db/0x2d0
[   29.697601]  ? kasan_atomics_helper+0x1f43/0x5450
[   29.697625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.697654]  ? kasan_atomics_helper+0x1f43/0x5450
[   29.697678]  kasan_report+0x141/0x180
[   29.697702]  ? kasan_atomics_helper+0x1f43/0x5450
[   29.697730]  kasan_check_range+0x10c/0x1c0
[   29.697756]  __kasan_check_write+0x18/0x20
[   29.697782]  kasan_atomics_helper+0x1f43/0x5450
[   29.697806]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.697849]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.697878]  ? kasan_atomics+0x152/0x310
[   29.697907]  kasan_atomics+0x1dc/0x310
[   29.697932]  ? __pfx_kasan_atomics+0x10/0x10
[   29.697967]  ? __pfx_read_tsc+0x10/0x10
[   29.697991]  ? ktime_get_ts64+0x86/0x230
[   29.698018]  kunit_try_run_case+0x1a5/0x480
[   29.698044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.698078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.698102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.698131]  ? __kthread_parkme+0x82/0x180
[   29.698153]  ? preempt_count_sub+0x50/0x80
[   29.698180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.698208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.698234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.698261]  kthread+0x337/0x6f0
[   29.698284]  ? trace_preempt_on+0x20/0xc0
[   29.698310]  ? __pfx_kthread+0x10/0x10
[   29.698334]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.698361]  ? calculate_sigpending+0x7b/0xa0
[   29.698387]  ? __pfx_kthread+0x10/0x10
[   29.698412]  ret_from_fork+0x116/0x1d0
[   29.698433]  ? __pfx_kthread+0x10/0x10
[   29.698457]  ret_from_fork_asm+0x1a/0x30
[   29.698491]  </TASK>
[   29.698504] 
[   29.711151] Allocated by task 314:
[   29.711551]  kasan_save_stack+0x45/0x70
[   29.711953]  kasan_save_track+0x18/0x40
[   29.712256]  kasan_save_alloc_info+0x3b/0x50
[   29.712780]  __kasan_kmalloc+0xb7/0xc0
[   29.713173]  __kmalloc_cache_noprof+0x189/0x420
[   29.713350]  kasan_atomics+0x95/0x310
[   29.713491]  kunit_try_run_case+0x1a5/0x480
[   29.713641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.713821]  kthread+0x337/0x6f0
[   29.714229]  ret_from_fork+0x116/0x1d0
[   29.714685]  ret_from_fork_asm+0x1a/0x30
[   29.715129] 
[   29.715458] The buggy address belongs to the object at ffff888106266f00
[   29.715458]  which belongs to the cache kmalloc-64 of size 64
[   29.716734] The buggy address is located 0 bytes to the right of
[   29.716734]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.718142] 
[   29.718269] The buggy address belongs to the physical page:
[   29.718467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.718724] flags: 0x200000000000000(node=0|zone=2)
[   29.719078] page_type: f5(slab)
[   29.719395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.720094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.720852] page dumped because: kasan: bad access detected
[   29.721490] 
[   29.721656] Memory state around the buggy address:
[   29.721975]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.722627]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.723336] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.723959]                                      ^
[   29.724338]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.725032]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.725396] ==================================================================
[   29.258918] ==================================================================
[   29.259218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   29.259565] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.259938] 
[   29.260082] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.260132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.260145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.260168] Call Trace:
[   29.260183]  <TASK>
[   29.260198]  dump_stack_lvl+0x73/0xb0
[   29.260249]  print_report+0xd1/0x640
[   29.260274]  ? __virt_addr_valid+0x1db/0x2d0
[   29.260298]  ? kasan_atomics_helper+0x151d/0x5450
[   29.260321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.260349]  ? kasan_atomics_helper+0x151d/0x5450
[   29.260373]  kasan_report+0x141/0x180
[   29.260413]  ? kasan_atomics_helper+0x151d/0x5450
[   29.260441]  kasan_check_range+0x10c/0x1c0
[   29.260467]  __kasan_check_write+0x18/0x20
[   29.260506]  kasan_atomics_helper+0x151d/0x5450
[   29.260544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.260568]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.260608]  ? kasan_atomics+0x152/0x310
[   29.260650]  kasan_atomics+0x1dc/0x310
[   29.260675]  ? __pfx_kasan_atomics+0x10/0x10
[   29.260701]  ? __pfx_read_tsc+0x10/0x10
[   29.260724]  ? ktime_get_ts64+0x86/0x230
[   29.260750]  kunit_try_run_case+0x1a5/0x480
[   29.260776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.260988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.261015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.261043]  ? __kthread_parkme+0x82/0x180
[   29.261080]  ? preempt_count_sub+0x50/0x80
[   29.261135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.261162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.261204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.261229]  kthread+0x337/0x6f0
[   29.261251]  ? trace_preempt_on+0x20/0xc0
[   29.261276]  ? __pfx_kthread+0x10/0x10
[   29.261298]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.261325]  ? calculate_sigpending+0x7b/0xa0
[   29.261349]  ? __pfx_kthread+0x10/0x10
[   29.261373]  ret_from_fork+0x116/0x1d0
[   29.261393]  ? __pfx_kthread+0x10/0x10
[   29.261416]  ret_from_fork_asm+0x1a/0x30
[   29.261449]  </TASK>
[   29.261462] 
[   29.270398] Allocated by task 314:
[   29.270546]  kasan_save_stack+0x45/0x70
[   29.270762]  kasan_save_track+0x18/0x40
[   29.270931]  kasan_save_alloc_info+0x3b/0x50
[   29.271239]  __kasan_kmalloc+0xb7/0xc0
[   29.271428]  __kmalloc_cache_noprof+0x189/0x420
[   29.271628]  kasan_atomics+0x95/0x310
[   29.271807]  kunit_try_run_case+0x1a5/0x480
[   29.272121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.272445]  kthread+0x337/0x6f0
[   29.272561]  ret_from_fork+0x116/0x1d0
[   29.272856]  ret_from_fork_asm+0x1a/0x30
[   29.273186] 
[   29.273274] The buggy address belongs to the object at ffff888106266f00
[   29.273274]  which belongs to the cache kmalloc-64 of size 64
[   29.273775] The buggy address is located 0 bytes to the right of
[   29.273775]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.274435] 
[   29.274542] The buggy address belongs to the physical page:
[   29.274811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.275182] flags: 0x200000000000000(node=0|zone=2)
[   29.275425] page_type: f5(slab)
[   29.275629] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.275988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.276310] page dumped because: kasan: bad access detected
[   29.276552] 
[   29.276638] Memory state around the buggy address:
[   29.276852]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.277466]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.277700] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.278400]                                      ^
[   29.278634]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.279027]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.279405] ==================================================================
[   29.436364] ==================================================================
[   29.436653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   29.436929] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.437622] 
[   29.437721] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.437771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.438221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.438258] Call Trace:
[   29.438274]  <TASK>
[   29.438413]  dump_stack_lvl+0x73/0xb0
[   29.438453]  print_report+0xd1/0x640
[   29.438602]  ? __virt_addr_valid+0x1db/0x2d0
[   29.438641]  ? kasan_atomics_helper+0x19e3/0x5450
[   29.438665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.438699]  ? kasan_atomics_helper+0x19e3/0x5450
[   29.438723]  kasan_report+0x141/0x180
[   29.438747]  ? kasan_atomics_helper+0x19e3/0x5450
[   29.438775]  kasan_check_range+0x10c/0x1c0
[   29.438801]  __kasan_check_write+0x18/0x20
[   29.438828]  kasan_atomics_helper+0x19e3/0x5450
[   29.438854]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.438878]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.438974]  ? kasan_atomics+0x152/0x310
[   29.439008]  kasan_atomics+0x1dc/0x310
[   29.439104]  ? __pfx_kasan_atomics+0x10/0x10
[   29.439138]  ? __pfx_read_tsc+0x10/0x10
[   29.439163]  ? ktime_get_ts64+0x86/0x230
[   29.439190]  kunit_try_run_case+0x1a5/0x480
[   29.439215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.439240]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.439264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.439293]  ? __kthread_parkme+0x82/0x180
[   29.439315]  ? preempt_count_sub+0x50/0x80
[   29.439339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.439365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.439391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.439418]  kthread+0x337/0x6f0
[   29.439440]  ? trace_preempt_on+0x20/0xc0
[   29.439466]  ? __pfx_kthread+0x10/0x10
[   29.439489]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.439515]  ? calculate_sigpending+0x7b/0xa0
[   29.439541]  ? __pfx_kthread+0x10/0x10
[   29.439564]  ret_from_fork+0x116/0x1d0
[   29.439585]  ? __pfx_kthread+0x10/0x10
[   29.439608]  ret_from_fork_asm+0x1a/0x30
[   29.439641]  </TASK>
[   29.439654] 
[   29.448984] Allocated by task 314:
[   29.449120]  kasan_save_stack+0x45/0x70
[   29.449407]  kasan_save_track+0x18/0x40
[   29.449861]  kasan_save_alloc_info+0x3b/0x50
[   29.450118]  __kasan_kmalloc+0xb7/0xc0
[   29.450292]  __kmalloc_cache_noprof+0x189/0x420
[   29.450451]  kasan_atomics+0x95/0x310
[   29.450586]  kunit_try_run_case+0x1a5/0x480
[   29.450734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.451305]  kthread+0x337/0x6f0
[   29.451576]  ret_from_fork+0x116/0x1d0
[   29.451763]  ret_from_fork_asm+0x1a/0x30
[   29.452087] 
[   29.452186] The buggy address belongs to the object at ffff888106266f00
[   29.452186]  which belongs to the cache kmalloc-64 of size 64
[   29.452714] The buggy address is located 0 bytes to the right of
[   29.452714]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.453354] 
[   29.453498] The buggy address belongs to the physical page:
[   29.453753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.454097] flags: 0x200000000000000(node=0|zone=2)
[   29.454333] page_type: f5(slab)
[   29.454455] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.454929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.455255] page dumped because: kasan: bad access detected
[   29.455433] 
[   29.455501] Memory state around the buggy address:
[   29.455659]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.455880]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.456406] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.456723]                                      ^
[   29.456953]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.457278]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.457898] ==================================================================
[   28.490633] ==================================================================
[   28.490860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   28.491659] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.492218] 
[   28.492331] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.492380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.492393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.492414] Call Trace:
[   28.492430]  <TASK>
[   28.492446]  dump_stack_lvl+0x73/0xb0
[   28.492474]  print_report+0xd1/0x640
[   28.492497]  ? __virt_addr_valid+0x1db/0x2d0
[   28.492522]  ? kasan_atomics_helper+0x4b3a/0x5450
[   28.492545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.492573]  ? kasan_atomics_helper+0x4b3a/0x5450
[   28.492597]  kasan_report+0x141/0x180
[   28.492621]  ? kasan_atomics_helper+0x4b3a/0x5450
[   28.492648]  __asan_report_store4_noabort+0x1b/0x30
[   28.492674]  kasan_atomics_helper+0x4b3a/0x5450
[   28.492699]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.492723]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.492750]  ? kasan_atomics+0x152/0x310
[   28.492778]  kasan_atomics+0x1dc/0x310
[   28.492853]  ? __pfx_kasan_atomics+0x10/0x10
[   28.492880]  ? __pfx_read_tsc+0x10/0x10
[   28.492904]  ? ktime_get_ts64+0x86/0x230
[   28.492930]  kunit_try_run_case+0x1a5/0x480
[   28.492967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.492992]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.493015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.493043]  ? __kthread_parkme+0x82/0x180
[   28.493074]  ? preempt_count_sub+0x50/0x80
[   28.493099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.493129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.493155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.493180]  kthread+0x337/0x6f0
[   28.493202]  ? trace_preempt_on+0x20/0xc0
[   28.493227]  ? __pfx_kthread+0x10/0x10
[   28.493249]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.493275]  ? calculate_sigpending+0x7b/0xa0
[   28.493300]  ? __pfx_kthread+0x10/0x10
[   28.493322]  ret_from_fork+0x116/0x1d0
[   28.493344]  ? __pfx_kthread+0x10/0x10
[   28.493365]  ret_from_fork_asm+0x1a/0x30
[   28.493397]  </TASK>
[   28.493409] 
[   28.502118] Allocated by task 314:
[   28.502248]  kasan_save_stack+0x45/0x70
[   28.502392]  kasan_save_track+0x18/0x40
[   28.502527]  kasan_save_alloc_info+0x3b/0x50
[   28.502678]  __kasan_kmalloc+0xb7/0xc0
[   28.502865]  __kmalloc_cache_noprof+0x189/0x420
[   28.503093]  kasan_atomics+0x95/0x310
[   28.503279]  kunit_try_run_case+0x1a5/0x480
[   28.503647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.504074]  kthread+0x337/0x6f0
[   28.504253]  ret_from_fork+0x116/0x1d0
[   28.504439]  ret_from_fork_asm+0x1a/0x30
[   28.504581] 
[   28.504650] The buggy address belongs to the object at ffff888106266f00
[   28.504650]  which belongs to the cache kmalloc-64 of size 64
[   28.505607] The buggy address is located 0 bytes to the right of
[   28.505607]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.506238] 
[   28.506316] The buggy address belongs to the physical page:
[   28.506495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.506742] flags: 0x200000000000000(node=0|zone=2)
[   28.506986] page_type: f5(slab)
[   28.507160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.508119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.508373] page dumped because: kasan: bad access detected
[   28.508552] 
[   28.508643] Memory state around the buggy address:
[   28.509038]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.509376]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.509692] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.510044]                                      ^
[   28.510205]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.510426]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.511117] ==================================================================
[   28.447897] ==================================================================
[   28.448363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   28.448604] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.449086] 
[   28.449237] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.449285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.449299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.449320] Call Trace:
[   28.449335]  <TASK>
[   28.449351]  dump_stack_lvl+0x73/0xb0
[   28.449379]  print_report+0xd1/0x640
[   28.449403]  ? __virt_addr_valid+0x1db/0x2d0
[   28.449428]  ? kasan_atomics_helper+0x4b54/0x5450
[   28.449451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.449479]  ? kasan_atomics_helper+0x4b54/0x5450
[   28.449503]  kasan_report+0x141/0x180
[   28.449526]  ? kasan_atomics_helper+0x4b54/0x5450
[   28.449554]  __asan_report_load4_noabort+0x18/0x20
[   28.449580]  kasan_atomics_helper+0x4b54/0x5450
[   28.449604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.449628]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.449654]  ? kasan_atomics+0x152/0x310
[   28.449682]  kasan_atomics+0x1dc/0x310
[   28.449706]  ? __pfx_kasan_atomics+0x10/0x10
[   28.449731]  ? __pfx_read_tsc+0x10/0x10
[   28.449754]  ? ktime_get_ts64+0x86/0x230
[   28.449780]  kunit_try_run_case+0x1a5/0x480
[   28.449805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.449829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.449853]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.449881]  ? __kthread_parkme+0x82/0x180
[   28.449903]  ? preempt_count_sub+0x50/0x80
[   28.449928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.449976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.450003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.450029]  kthread+0x337/0x6f0
[   28.450051]  ? trace_preempt_on+0x20/0xc0
[   28.450444]  ? __pfx_kthread+0x10/0x10
[   28.450472]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.450499]  ? calculate_sigpending+0x7b/0xa0
[   28.450526]  ? __pfx_kthread+0x10/0x10
[   28.450550]  ret_from_fork+0x116/0x1d0
[   28.450581]  ? __pfx_kthread+0x10/0x10
[   28.450604]  ret_from_fork_asm+0x1a/0x30
[   28.450637]  </TASK>
[   28.450650] 
[   28.462197] Allocated by task 314:
[   28.462373]  kasan_save_stack+0x45/0x70
[   28.462545]  kasan_save_track+0x18/0x40
[   28.462713]  kasan_save_alloc_info+0x3b/0x50
[   28.463460]  __kasan_kmalloc+0xb7/0xc0
[   28.463668]  __kmalloc_cache_noprof+0x189/0x420
[   28.464272]  kasan_atomics+0x95/0x310
[   28.464504]  kunit_try_run_case+0x1a5/0x480
[   28.464666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.464924]  kthread+0x337/0x6f0
[   28.465122]  ret_from_fork+0x116/0x1d0
[   28.465265]  ret_from_fork_asm+0x1a/0x30
[   28.465464] 
[   28.465559] The buggy address belongs to the object at ffff888106266f00
[   28.465559]  which belongs to the cache kmalloc-64 of size 64
[   28.466002] The buggy address is located 0 bytes to the right of
[   28.466002]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.466544] 
[   28.466734] The buggy address belongs to the physical page:
[   28.466920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.467291] flags: 0x200000000000000(node=0|zone=2)
[   28.467684] page_type: f5(slab)
[   28.467825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.468197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.468593] page dumped because: kasan: bad access detected
[   28.468811] 
[   28.468901] Memory state around the buggy address:
[   28.469148]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.469445]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.469716] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.470008]                                      ^
[   28.470237]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.470837]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.471189] ==================================================================
[   28.791273] ==================================================================
[   28.791967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   28.792544] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.792788] 
[   28.792870] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.792919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.792933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.793029] Call Trace:
[   28.793066]  <TASK>
[   28.793084]  dump_stack_lvl+0x73/0xb0
[   28.793115]  print_report+0xd1/0x640
[   28.793145]  ? __virt_addr_valid+0x1db/0x2d0
[   28.793170]  ? kasan_atomics_helper+0xc70/0x5450
[   28.793193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.793221]  ? kasan_atomics_helper+0xc70/0x5450
[   28.793245]  kasan_report+0x141/0x180
[   28.793269]  ? kasan_atomics_helper+0xc70/0x5450
[   28.793297]  kasan_check_range+0x10c/0x1c0
[   28.793322]  __kasan_check_write+0x18/0x20
[   28.793347]  kasan_atomics_helper+0xc70/0x5450
[   28.793372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.793396]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.793423]  ? kasan_atomics+0x152/0x310
[   28.793451]  kasan_atomics+0x1dc/0x310
[   28.793475]  ? __pfx_kasan_atomics+0x10/0x10
[   28.793501]  ? __pfx_read_tsc+0x10/0x10
[   28.793525]  ? ktime_get_ts64+0x86/0x230
[   28.793550]  kunit_try_run_case+0x1a5/0x480
[   28.793577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.793602]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.793625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.793653]  ? __kthread_parkme+0x82/0x180
[   28.793677]  ? preempt_count_sub+0x50/0x80
[   28.793702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.793728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.793753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.793962]  kthread+0x337/0x6f0
[   28.793993]  ? trace_preempt_on+0x20/0xc0
[   28.794020]  ? __pfx_kthread+0x10/0x10
[   28.794063]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.794091]  ? calculate_sigpending+0x7b/0xa0
[   28.794117]  ? __pfx_kthread+0x10/0x10
[   28.794141]  ret_from_fork+0x116/0x1d0
[   28.794162]  ? __pfx_kthread+0x10/0x10
[   28.794185]  ret_from_fork_asm+0x1a/0x30
[   28.794219]  </TASK>
[   28.794231] 
[   28.807173] Allocated by task 314:
[   28.807329]  kasan_save_stack+0x45/0x70
[   28.807479]  kasan_save_track+0x18/0x40
[   28.807617]  kasan_save_alloc_info+0x3b/0x50
[   28.807767]  __kasan_kmalloc+0xb7/0xc0
[   28.807901]  __kmalloc_cache_noprof+0x189/0x420
[   28.808377]  kasan_atomics+0x95/0x310
[   28.808746]  kunit_try_run_case+0x1a5/0x480
[   28.809162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.809691]  kthread+0x337/0x6f0
[   28.810023]  ret_from_fork+0x116/0x1d0
[   28.810405]  ret_from_fork_asm+0x1a/0x30
[   28.810755] 
[   28.810974] The buggy address belongs to the object at ffff888106266f00
[   28.810974]  which belongs to the cache kmalloc-64 of size 64
[   28.812192] The buggy address is located 0 bytes to the right of
[   28.812192]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.813257] 
[   28.813415] The buggy address belongs to the physical page:
[   28.813750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.814399] flags: 0x200000000000000(node=0|zone=2)
[   28.814713] page_type: f5(slab)
[   28.814858] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.815114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.815370] page dumped because: kasan: bad access detected
[   28.815547] 
[   28.815613] Memory state around the buggy address:
[   28.815769]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.816442]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.817188] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.817910]                                      ^
[   28.818398]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.819024]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.819662] ==================================================================
[   29.774835] ==================================================================
[   29.775195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   29.775531] Read of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.775814] 
[   29.775892] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.775940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.775981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.776002] Call Trace:
[   29.776018]  <TASK>
[   29.776033]  dump_stack_lvl+0x73/0xb0
[   29.776139]  print_report+0xd1/0x640
[   29.776167]  ? __virt_addr_valid+0x1db/0x2d0
[   29.776192]  ? kasan_atomics_helper+0x4f98/0x5450
[   29.776215]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.776244]  ? kasan_atomics_helper+0x4f98/0x5450
[   29.776268]  kasan_report+0x141/0x180
[   29.776292]  ? kasan_atomics_helper+0x4f98/0x5450
[   29.776321]  __asan_report_load8_noabort+0x18/0x20
[   29.776347]  kasan_atomics_helper+0x4f98/0x5450
[   29.776371]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.776396]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.776422]  ? kasan_atomics+0x152/0x310
[   29.776451]  kasan_atomics+0x1dc/0x310
[   29.776476]  ? __pfx_kasan_atomics+0x10/0x10
[   29.776504]  ? __pfx_read_tsc+0x10/0x10
[   29.776527]  ? ktime_get_ts64+0x86/0x230
[   29.776565]  kunit_try_run_case+0x1a5/0x480
[   29.776592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.776617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.776653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.776681]  ? __kthread_parkme+0x82/0x180
[   29.776703]  ? preempt_count_sub+0x50/0x80
[   29.776728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.776754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.776780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.776806]  kthread+0x337/0x6f0
[   29.776827]  ? trace_preempt_on+0x20/0xc0
[   29.776852]  ? __pfx_kthread+0x10/0x10
[   29.776874]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.776899]  ? calculate_sigpending+0x7b/0xa0
[   29.776925]  ? __pfx_kthread+0x10/0x10
[   29.776956]  ret_from_fork+0x116/0x1d0
[   29.776977]  ? __pfx_kthread+0x10/0x10
[   29.776999]  ret_from_fork_asm+0x1a/0x30
[   29.777033]  </TASK>
[   29.777044] 
[   29.786162] Allocated by task 314:
[   29.786367]  kasan_save_stack+0x45/0x70
[   29.786591]  kasan_save_track+0x18/0x40
[   29.786817]  kasan_save_alloc_info+0x3b/0x50
[   29.787179]  __kasan_kmalloc+0xb7/0xc0
[   29.787370]  __kmalloc_cache_noprof+0x189/0x420
[   29.787523]  kasan_atomics+0x95/0x310
[   29.787698]  kunit_try_run_case+0x1a5/0x480
[   29.787983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.788402]  kthread+0x337/0x6f0
[   29.788527]  ret_from_fork+0x116/0x1d0
[   29.788787]  ret_from_fork_asm+0x1a/0x30
[   29.789018] 
[   29.789101] The buggy address belongs to the object at ffff888106266f00
[   29.789101]  which belongs to the cache kmalloc-64 of size 64
[   29.790020] The buggy address is located 0 bytes to the right of
[   29.790020]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.790564] 
[   29.790659] The buggy address belongs to the physical page:
[   29.790980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.791362] flags: 0x200000000000000(node=0|zone=2)
[   29.791653] page_type: f5(slab)
[   29.791840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.792261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.792495] page dumped because: kasan: bad access detected
[   29.792664] 
[   29.792728] Memory state around the buggy address:
[   29.792880]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.793233]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.793547] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.793851]                                      ^
[   29.794217]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.794885]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.795376] ==================================================================
[   29.875481] ==================================================================
[   29.876358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   29.877026] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.877263] 
[   29.877344] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.877393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.877405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.877427] Call Trace:
[   29.877442]  <TASK>
[   29.877457]  dump_stack_lvl+0x73/0xb0
[   29.877486]  print_report+0xd1/0x640
[   29.877510]  ? __virt_addr_valid+0x1db/0x2d0
[   29.877536]  ? kasan_atomics_helper+0x224c/0x5450
[   29.877559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.877587]  ? kasan_atomics_helper+0x224c/0x5450
[   29.877611]  kasan_report+0x141/0x180
[   29.877636]  ? kasan_atomics_helper+0x224c/0x5450
[   29.877664]  kasan_check_range+0x10c/0x1c0
[   29.877689]  __kasan_check_write+0x18/0x20
[   29.877715]  kasan_atomics_helper+0x224c/0x5450
[   29.877739]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.877763]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.877790]  ? kasan_atomics+0x152/0x310
[   29.877817]  kasan_atomics+0x1dc/0x310
[   29.877842]  ? __pfx_kasan_atomics+0x10/0x10
[   29.877868]  ? __pfx_read_tsc+0x10/0x10
[   29.877891]  ? ktime_get_ts64+0x86/0x230
[   29.877917]  kunit_try_run_case+0x1a5/0x480
[   29.877953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.877978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.878002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.878031]  ? __kthread_parkme+0x82/0x180
[   29.878083]  ? preempt_count_sub+0x50/0x80
[   29.878120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.878147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.878184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.878211]  kthread+0x337/0x6f0
[   29.878233]  ? trace_preempt_on+0x20/0xc0
[   29.878258]  ? __pfx_kthread+0x10/0x10
[   29.878281]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.878306]  ? calculate_sigpending+0x7b/0xa0
[   29.878332]  ? __pfx_kthread+0x10/0x10
[   29.878383]  ret_from_fork+0x116/0x1d0
[   29.878405]  ? __pfx_kthread+0x10/0x10
[   29.878427]  ret_from_fork_asm+0x1a/0x30
[   29.878471]  </TASK>
[   29.878482] 
[   29.890252] Allocated by task 314:
[   29.890470]  kasan_save_stack+0x45/0x70
[   29.890696]  kasan_save_track+0x18/0x40
[   29.890904]  kasan_save_alloc_info+0x3b/0x50
[   29.891156]  __kasan_kmalloc+0xb7/0xc0
[   29.891373]  __kmalloc_cache_noprof+0x189/0x420
[   29.891598]  kasan_atomics+0x95/0x310
[   29.891776]  kunit_try_run_case+0x1a5/0x480
[   29.892021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.892296]  kthread+0x337/0x6f0
[   29.892502]  ret_from_fork+0x116/0x1d0
[   29.892687]  ret_from_fork_asm+0x1a/0x30
[   29.892890] 
[   29.893009] The buggy address belongs to the object at ffff888106266f00
[   29.893009]  which belongs to the cache kmalloc-64 of size 64
[   29.893576] The buggy address is located 0 bytes to the right of
[   29.893576]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.894186] 
[   29.894323] The buggy address belongs to the physical page:
[   29.894558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.894935] flags: 0x200000000000000(node=0|zone=2)
[   29.895174] page_type: f5(slab)
[   29.895368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.895716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.896055] page dumped because: kasan: bad access detected
[   29.896376] 
[   29.896441] Memory state around the buggy address:
[   29.896592]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.896923]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.897430] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.897733]                                      ^
[   29.897960]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.898375]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.898784] ==================================================================
[   29.011554] ==================================================================
[   29.011923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   29.012279] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.012510] 
[   29.012591] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.012638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.012651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.012674] Call Trace:
[   29.012688]  <TASK>
[   29.012703]  dump_stack_lvl+0x73/0xb0
[   29.012776]  print_report+0xd1/0x640
[   29.012827]  ? __virt_addr_valid+0x1db/0x2d0
[   29.012854]  ? kasan_atomics_helper+0x4a1c/0x5450
[   29.012878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.012907]  ? kasan_atomics_helper+0x4a1c/0x5450
[   29.012930]  kasan_report+0x141/0x180
[   29.012966]  ? kasan_atomics_helper+0x4a1c/0x5450
[   29.012994]  __asan_report_load4_noabort+0x18/0x20
[   29.013021]  kasan_atomics_helper+0x4a1c/0x5450
[   29.013046]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.013070]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.013096]  ? kasan_atomics+0x152/0x310
[   29.013133]  kasan_atomics+0x1dc/0x310
[   29.013278]  ? __pfx_kasan_atomics+0x10/0x10
[   29.013311]  ? __pfx_read_tsc+0x10/0x10
[   29.013337]  ? ktime_get_ts64+0x86/0x230
[   29.013364]  kunit_try_run_case+0x1a5/0x480
[   29.013392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.013417]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.013441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.013471]  ? __kthread_parkme+0x82/0x180
[   29.013492]  ? preempt_count_sub+0x50/0x80
[   29.013518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.013544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.013570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.013596]  kthread+0x337/0x6f0
[   29.013618]  ? trace_preempt_on+0x20/0xc0
[   29.013643]  ? __pfx_kthread+0x10/0x10
[   29.013700]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.013728]  ? calculate_sigpending+0x7b/0xa0
[   29.013754]  ? __pfx_kthread+0x10/0x10
[   29.013822]  ret_from_fork+0x116/0x1d0
[   29.013887]  ? __pfx_kthread+0x10/0x10
[   29.013912]  ret_from_fork_asm+0x1a/0x30
[   29.013957]  </TASK>
[   29.013970] 
[   29.023579] Allocated by task 314:
[   29.023901]  kasan_save_stack+0x45/0x70
[   29.024193]  kasan_save_track+0x18/0x40
[   29.024412]  kasan_save_alloc_info+0x3b/0x50
[   29.024634]  __kasan_kmalloc+0xb7/0xc0
[   29.024769]  __kmalloc_cache_noprof+0x189/0x420
[   29.024927]  kasan_atomics+0x95/0x310
[   29.025385]  kunit_try_run_case+0x1a5/0x480
[   29.025647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.025902]  kthread+0x337/0x6f0
[   29.026090]  ret_from_fork+0x116/0x1d0
[   29.026250]  ret_from_fork_asm+0x1a/0x30
[   29.026392] 
[   29.026460] The buggy address belongs to the object at ffff888106266f00
[   29.026460]  which belongs to the cache kmalloc-64 of size 64
[   29.027215] The buggy address is located 0 bytes to the right of
[   29.027215]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.027610] 
[   29.027680] The buggy address belongs to the physical page:
[   29.028379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.028726] flags: 0x200000000000000(node=0|zone=2)
[   29.028956] page_type: f5(slab)
[   29.029486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.029839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.030287] page dumped because: kasan: bad access detected
[   29.030853] 
[   29.030930] Memory state around the buggy address:
[   29.031201]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.031546]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.031955] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.032271]                                      ^
[   29.032436]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.032764]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.033422] ==================================================================
[   29.156354] ==================================================================
[   29.156693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   29.157108] Read of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.157408] 
[   29.157511] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.157558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.157593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.157615] Call Trace:
[   29.157630]  <TASK>
[   29.157644]  dump_stack_lvl+0x73/0xb0
[   29.157673]  print_report+0xd1/0x640
[   29.157697]  ? __virt_addr_valid+0x1db/0x2d0
[   29.157721]  ? kasan_atomics_helper+0x13b5/0x5450
[   29.157744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.157966]  ? kasan_atomics_helper+0x13b5/0x5450
[   29.158026]  kasan_report+0x141/0x180
[   29.158071]  ? kasan_atomics_helper+0x13b5/0x5450
[   29.158101]  kasan_check_range+0x10c/0x1c0
[   29.158127]  __kasan_check_read+0x15/0x20
[   29.158152]  kasan_atomics_helper+0x13b5/0x5450
[   29.158176]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.158201]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.158227]  ? kasan_atomics+0x152/0x310
[   29.158255]  kasan_atomics+0x1dc/0x310
[   29.158279]  ? __pfx_kasan_atomics+0x10/0x10
[   29.158305]  ? __pfx_read_tsc+0x10/0x10
[   29.158330]  ? ktime_get_ts64+0x86/0x230
[   29.158355]  kunit_try_run_case+0x1a5/0x480
[   29.158402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.158428]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.158452]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.158480]  ? __kthread_parkme+0x82/0x180
[   29.158502]  ? preempt_count_sub+0x50/0x80
[   29.158527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.158553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.158598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.158625]  kthread+0x337/0x6f0
[   29.158647]  ? trace_preempt_on+0x20/0xc0
[   29.158672]  ? __pfx_kthread+0x10/0x10
[   29.158695]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.158721]  ? calculate_sigpending+0x7b/0xa0
[   29.158746]  ? __pfx_kthread+0x10/0x10
[   29.158833]  ret_from_fork+0x116/0x1d0
[   29.158860]  ? __pfx_kthread+0x10/0x10
[   29.158883]  ret_from_fork_asm+0x1a/0x30
[   29.158917]  </TASK>
[   29.158930] 
[   29.167494] Allocated by task 314:
[   29.167693]  kasan_save_stack+0x45/0x70
[   29.167923]  kasan_save_track+0x18/0x40
[   29.168094]  kasan_save_alloc_info+0x3b/0x50
[   29.168420]  __kasan_kmalloc+0xb7/0xc0
[   29.168604]  __kmalloc_cache_noprof+0x189/0x420
[   29.170109]  kasan_atomics+0x95/0x310
[   29.170283]  kunit_try_run_case+0x1a5/0x480
[   29.170702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.171272]  kthread+0x337/0x6f0
[   29.171483]  ret_from_fork+0x116/0x1d0
[   29.171622]  ret_from_fork_asm+0x1a/0x30
[   29.171764] 
[   29.171833] The buggy address belongs to the object at ffff888106266f00
[   29.171833]  which belongs to the cache kmalloc-64 of size 64
[   29.172400] The buggy address is located 0 bytes to the right of
[   29.172400]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.172865] 
[   29.173044] The buggy address belongs to the physical page:
[   29.173332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.173750] flags: 0x200000000000000(node=0|zone=2)
[   29.173915] page_type: f5(slab)
[   29.174049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.174622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.175151] page dumped because: kasan: bad access detected
[   29.175336] 
[   29.175418] Memory state around the buggy address:
[   29.175671]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.176005]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.176351] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.176767]                                      ^
[   29.177001]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.177486]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.177813] ==================================================================
[   29.538719] ==================================================================
[   29.539103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   29.539706] Read of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.540640] 
[   29.540910] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.540988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.541003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.541025] Call Trace:
[   29.541042]  <TASK>
[   29.541059]  dump_stack_lvl+0x73/0xb0
[   29.541092]  print_report+0xd1/0x640
[   29.541116]  ? __virt_addr_valid+0x1db/0x2d0
[   29.541146]  ? kasan_atomics_helper+0x4f30/0x5450
[   29.541170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.541198]  ? kasan_atomics_helper+0x4f30/0x5450
[   29.541223]  kasan_report+0x141/0x180
[   29.541246]  ? kasan_atomics_helper+0x4f30/0x5450
[   29.541275]  __asan_report_load8_noabort+0x18/0x20
[   29.541301]  kasan_atomics_helper+0x4f30/0x5450
[   29.541325]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.541349]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.541375]  ? kasan_atomics+0x152/0x310
[   29.541404]  kasan_atomics+0x1dc/0x310
[   29.541427]  ? __pfx_kasan_atomics+0x10/0x10
[   29.541453]  ? __pfx_read_tsc+0x10/0x10
[   29.541477]  ? ktime_get_ts64+0x86/0x230
[   29.541502]  kunit_try_run_case+0x1a5/0x480
[   29.541528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.541552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.541576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.541603]  ? __kthread_parkme+0x82/0x180
[   29.541625]  ? preempt_count_sub+0x50/0x80
[   29.541650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.541676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.541702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.541728]  kthread+0x337/0x6f0
[   29.541750]  ? trace_preempt_on+0x20/0xc0
[   29.541775]  ? __pfx_kthread+0x10/0x10
[   29.541814]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.541840]  ? calculate_sigpending+0x7b/0xa0
[   29.541867]  ? __pfx_kthread+0x10/0x10
[   29.541890]  ret_from_fork+0x116/0x1d0
[   29.541911]  ? __pfx_kthread+0x10/0x10
[   29.541934]  ret_from_fork_asm+0x1a/0x30
[   29.541977]  </TASK>
[   29.541989] 
[   29.553896] Allocated by task 314:
[   29.554157]  kasan_save_stack+0x45/0x70
[   29.554580]  kasan_save_track+0x18/0x40
[   29.554777]  kasan_save_alloc_info+0x3b/0x50
[   29.555270]  __kasan_kmalloc+0xb7/0xc0
[   29.555469]  __kmalloc_cache_noprof+0x189/0x420
[   29.555654]  kasan_atomics+0x95/0x310
[   29.555930]  kunit_try_run_case+0x1a5/0x480
[   29.556377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.556720]  kthread+0x337/0x6f0
[   29.556993]  ret_from_fork+0x116/0x1d0
[   29.557236]  ret_from_fork_asm+0x1a/0x30
[   29.557629] 
[   29.557734] The buggy address belongs to the object at ffff888106266f00
[   29.557734]  which belongs to the cache kmalloc-64 of size 64
[   29.558418] The buggy address is located 0 bytes to the right of
[   29.558418]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.559253] 
[   29.559336] The buggy address belongs to the physical page:
[   29.559775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.560291] flags: 0x200000000000000(node=0|zone=2)
[   29.560511] page_type: f5(slab)
[   29.560677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.561391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.561744] page dumped because: kasan: bad access detected
[   29.562047] 
[   29.562441] Memory state around the buggy address:
[   29.562650]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563202]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563836] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.564104]                                      ^
[   29.564340]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.564646]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.565412] ==================================================================
[   28.964600] ==================================================================
[   28.965098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   28.965490] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.965875] 
[   28.965983] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.966030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.966043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.966065] Call Trace:
[   28.966079]  <TASK>
[   28.966182]  dump_stack_lvl+0x73/0xb0
[   28.966242]  print_report+0xd1/0x640
[   28.966267]  ? __virt_addr_valid+0x1db/0x2d0
[   28.966292]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.966316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.966343]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.966368]  kasan_report+0x141/0x180
[   28.966392]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.966421]  __asan_report_load4_noabort+0x18/0x20
[   28.966447]  kasan_atomics_helper+0x4a36/0x5450
[   28.966472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.966496]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.966556]  ? kasan_atomics+0x152/0x310
[   28.966584]  kasan_atomics+0x1dc/0x310
[   28.966609]  ? __pfx_kasan_atomics+0x10/0x10
[   28.966635]  ? __pfx_read_tsc+0x10/0x10
[   28.966660]  ? ktime_get_ts64+0x86/0x230
[   28.966685]  kunit_try_run_case+0x1a5/0x480
[   28.966711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.966736]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.966760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.966788]  ? __kthread_parkme+0x82/0x180
[   28.966839]  ? preempt_count_sub+0x50/0x80
[   28.966866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.966916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.966978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.967005]  kthread+0x337/0x6f0
[   28.967052]  ? trace_preempt_on+0x20/0xc0
[   28.967253]  ? __pfx_kthread+0x10/0x10
[   28.967289]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.967316]  ? calculate_sigpending+0x7b/0xa0
[   28.967342]  ? __pfx_kthread+0x10/0x10
[   28.967381]  ret_from_fork+0x116/0x1d0
[   28.967404]  ? __pfx_kthread+0x10/0x10
[   28.967427]  ret_from_fork_asm+0x1a/0x30
[   28.967461]  </TASK>
[   28.967473] 
[   28.977046] Allocated by task 314:
[   28.977191]  kasan_save_stack+0x45/0x70
[   28.977338]  kasan_save_track+0x18/0x40
[   28.977551]  kasan_save_alloc_info+0x3b/0x50
[   28.977760]  __kasan_kmalloc+0xb7/0xc0
[   28.977956]  __kmalloc_cache_noprof+0x189/0x420
[   28.978289]  kasan_atomics+0x95/0x310
[   28.978483]  kunit_try_run_case+0x1a5/0x480
[   28.978683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.979231]  kthread+0x337/0x6f0
[   28.979421]  ret_from_fork+0x116/0x1d0
[   28.979615]  ret_from_fork_asm+0x1a/0x30
[   28.979814] 
[   28.979939] The buggy address belongs to the object at ffff888106266f00
[   28.979939]  which belongs to the cache kmalloc-64 of size 64
[   28.980529] The buggy address is located 0 bytes to the right of
[   28.980529]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.981373] 
[   28.981493] The buggy address belongs to the physical page:
[   28.981773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.982301] flags: 0x200000000000000(node=0|zone=2)
[   28.982581] page_type: f5(slab)
[   28.982767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.983352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.983699] page dumped because: kasan: bad access detected
[   28.984077] 
[   28.984255] Memory state around the buggy address:
[   28.984471]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.984696]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.985300] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.985795]                                      ^
[   28.986017]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.986241]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.986838] ==================================================================
[   29.413905] ==================================================================
[   29.414501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   29.414912] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.415193] 
[   29.415458] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.415665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.415681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.415703] Call Trace:
[   29.415727]  <TASK>
[   29.415745]  dump_stack_lvl+0x73/0xb0
[   29.415775]  print_report+0xd1/0x640
[   29.415877]  ? __virt_addr_valid+0x1db/0x2d0
[   29.415904]  ? kasan_atomics_helper+0x194a/0x5450
[   29.415927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.416005]  ? kasan_atomics_helper+0x194a/0x5450
[   29.416032]  kasan_report+0x141/0x180
[   29.416092]  ? kasan_atomics_helper+0x194a/0x5450
[   29.416122]  kasan_check_range+0x10c/0x1c0
[   29.416149]  __kasan_check_write+0x18/0x20
[   29.416185]  kasan_atomics_helper+0x194a/0x5450
[   29.416210]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.416235]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.416262]  ? kasan_atomics+0x152/0x310
[   29.416290]  kasan_atomics+0x1dc/0x310
[   29.416315]  ? __pfx_kasan_atomics+0x10/0x10
[   29.416341]  ? __pfx_read_tsc+0x10/0x10
[   29.416364]  ? ktime_get_ts64+0x86/0x230
[   29.416391]  kunit_try_run_case+0x1a5/0x480
[   29.416417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.416443]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.416466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.416494]  ? __kthread_parkme+0x82/0x180
[   29.416517]  ? preempt_count_sub+0x50/0x80
[   29.416541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.416568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.416594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.416621]  kthread+0x337/0x6f0
[   29.416642]  ? trace_preempt_on+0x20/0xc0
[   29.416668]  ? __pfx_kthread+0x10/0x10
[   29.416691]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.416717]  ? calculate_sigpending+0x7b/0xa0
[   29.416742]  ? __pfx_kthread+0x10/0x10
[   29.416766]  ret_from_fork+0x116/0x1d0
[   29.416798]  ? __pfx_kthread+0x10/0x10
[   29.416822]  ret_from_fork_asm+0x1a/0x30
[   29.416854]  </TASK>
[   29.416868] 
[   29.426471] Allocated by task 314:
[   29.426913]  kasan_save_stack+0x45/0x70
[   29.427084]  kasan_save_track+0x18/0x40
[   29.427514]  kasan_save_alloc_info+0x3b/0x50
[   29.427926]  __kasan_kmalloc+0xb7/0xc0
[   29.428087]  __kmalloc_cache_noprof+0x189/0x420
[   29.428313]  kasan_atomics+0x95/0x310
[   29.428553]  kunit_try_run_case+0x1a5/0x480
[   29.428752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.428931]  kthread+0x337/0x6f0
[   29.429136]  ret_from_fork+0x116/0x1d0
[   29.429345]  ret_from_fork_asm+0x1a/0x30
[   29.429546] 
[   29.429639] The buggy address belongs to the object at ffff888106266f00
[   29.429639]  which belongs to the cache kmalloc-64 of size 64
[   29.430319] The buggy address is located 0 bytes to the right of
[   29.430319]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.431060] 
[   29.431157] The buggy address belongs to the physical page:
[   29.431441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.431692] flags: 0x200000000000000(node=0|zone=2)
[   29.432119] page_type: f5(slab)
[   29.432294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.432617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.432931] page dumped because: kasan: bad access detected
[   29.433301] 
[   29.433377] Memory state around the buggy address:
[   29.433643]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.433923]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.434153] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.434609]                                      ^
[   29.434875]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.435360]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.435694] ==================================================================
[   28.372368] ==================================================================
[   28.372963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   28.373786] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.374610] 
[   28.374808] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.374917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.374932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.375053] Call Trace:
[   28.375073]  <TASK>
[   28.375092]  dump_stack_lvl+0x73/0xb0
[   28.375134]  print_report+0xd1/0x640
[   28.375159]  ? __virt_addr_valid+0x1db/0x2d0
[   28.375184]  ? kasan_atomics_helper+0x4b88/0x5450
[   28.375209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.375236]  ? kasan_atomics_helper+0x4b88/0x5450
[   28.375260]  kasan_report+0x141/0x180
[   28.375285]  ? kasan_atomics_helper+0x4b88/0x5450
[   28.375315]  __asan_report_load4_noabort+0x18/0x20
[   28.375342]  kasan_atomics_helper+0x4b88/0x5450
[   28.375368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.375393]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.375420]  ? kasan_atomics+0x152/0x310
[   28.375449]  kasan_atomics+0x1dc/0x310
[   28.375474]  ? __pfx_kasan_atomics+0x10/0x10
[   28.375502]  ? __pfx_read_tsc+0x10/0x10
[   28.375528]  ? ktime_get_ts64+0x86/0x230
[   28.375555]  kunit_try_run_case+0x1a5/0x480
[   28.375581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.375609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.375634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.375663]  ? __kthread_parkme+0x82/0x180
[   28.375686]  ? preempt_count_sub+0x50/0x80
[   28.375712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.375738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.375764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.375792]  kthread+0x337/0x6f0
[   28.375821]  ? trace_preempt_on+0x20/0xc0
[   28.375847]  ? __pfx_kthread+0x10/0x10
[   28.375869]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.375895]  ? calculate_sigpending+0x7b/0xa0
[   28.375920]  ? __pfx_kthread+0x10/0x10
[   28.375957]  ret_from_fork+0x116/0x1d0
[   28.375979]  ? __pfx_kthread+0x10/0x10
[   28.376002]  ret_from_fork_asm+0x1a/0x30
[   28.376036]  </TASK>
[   28.376049] 
[   28.388773] Allocated by task 314:
[   28.389329]  kasan_save_stack+0x45/0x70
[   28.389636]  kasan_save_track+0x18/0x40
[   28.389784]  kasan_save_alloc_info+0x3b/0x50
[   28.390244]  __kasan_kmalloc+0xb7/0xc0
[   28.390433]  __kmalloc_cache_noprof+0x189/0x420
[   28.390789]  kasan_atomics+0x95/0x310
[   28.391255]  kunit_try_run_case+0x1a5/0x480
[   28.391424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.391752]  kthread+0x337/0x6f0
[   28.392206]  ret_from_fork+0x116/0x1d0
[   28.392403]  ret_from_fork_asm+0x1a/0x30
[   28.393066] 
[   28.393218] The buggy address belongs to the object at ffff888106266f00
[   28.393218]  which belongs to the cache kmalloc-64 of size 64
[   28.393734] The buggy address is located 0 bytes to the right of
[   28.393734]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.394655] 
[   28.394770] The buggy address belongs to the physical page:
[   28.395273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.395701] flags: 0x200000000000000(node=0|zone=2)
[   28.396138] page_type: f5(slab)
[   28.396316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.396763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.397326] page dumped because: kasan: bad access detected
[   28.397570] 
[   28.397875] Memory state around the buggy address:
[   28.398259]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.398567]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.398902] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.399528]                                      ^
[   28.399758]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.400418]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.400805] ==================================================================
[   28.820465] ==================================================================
[   28.821074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   28.821777] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.822567] 
[   28.822742] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.822790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.822804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.822825] Call Trace:
[   28.822851]  <TASK>
[   28.822868]  dump_stack_lvl+0x73/0xb0
[   28.822896]  print_report+0xd1/0x640
[   28.822920]  ? __virt_addr_valid+0x1db/0x2d0
[   28.822956]  ? kasan_atomics_helper+0x4a84/0x5450
[   28.822980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.823008]  ? kasan_atomics_helper+0x4a84/0x5450
[   28.823031]  kasan_report+0x141/0x180
[   28.823056]  ? kasan_atomics_helper+0x4a84/0x5450
[   28.823083]  __asan_report_load4_noabort+0x18/0x20
[   28.823133]  kasan_atomics_helper+0x4a84/0x5450
[   28.823274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.823298]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.823325]  ? kasan_atomics+0x152/0x310
[   28.823353]  kasan_atomics+0x1dc/0x310
[   28.823378]  ? __pfx_kasan_atomics+0x10/0x10
[   28.823414]  ? __pfx_read_tsc+0x10/0x10
[   28.823437]  ? ktime_get_ts64+0x86/0x230
[   28.823462]  kunit_try_run_case+0x1a5/0x480
[   28.823489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.823513]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.823537]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.823566]  ? __kthread_parkme+0x82/0x180
[   28.823587]  ? preempt_count_sub+0x50/0x80
[   28.823612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.823637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.823663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.823689]  kthread+0x337/0x6f0
[   28.823711]  ? trace_preempt_on+0x20/0xc0
[   28.823735]  ? __pfx_kthread+0x10/0x10
[   28.823758]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.823783]  ? calculate_sigpending+0x7b/0xa0
[   28.823820]  ? __pfx_kthread+0x10/0x10
[   28.823844]  ret_from_fork+0x116/0x1d0
[   28.823864]  ? __pfx_kthread+0x10/0x10
[   28.823887]  ret_from_fork_asm+0x1a/0x30
[   28.823919]  </TASK>
[   28.823932] 
[   28.836894] Allocated by task 314:
[   28.837259]  kasan_save_stack+0x45/0x70
[   28.837680]  kasan_save_track+0x18/0x40
[   28.837933]  kasan_save_alloc_info+0x3b/0x50
[   28.838283]  __kasan_kmalloc+0xb7/0xc0
[   28.838418]  __kmalloc_cache_noprof+0x189/0x420
[   28.838576]  kasan_atomics+0x95/0x310
[   28.838931]  kunit_try_run_case+0x1a5/0x480
[   28.839158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.839357]  kthread+0x337/0x6f0
[   28.839480]  ret_from_fork+0x116/0x1d0
[   28.839615]  ret_from_fork_asm+0x1a/0x30
[   28.839755] 
[   28.839833] The buggy address belongs to the object at ffff888106266f00
[   28.839833]  which belongs to the cache kmalloc-64 of size 64
[   28.840986] The buggy address is located 0 bytes to the right of
[   28.840986]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.842202] 
[   28.842373] The buggy address belongs to the physical page:
[   28.842930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.843716] flags: 0x200000000000000(node=0|zone=2)
[   28.844207] page_type: f5(slab)
[   28.844427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.844739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.845473] page dumped because: kasan: bad access detected
[   28.845957] 
[   28.846258] Memory state around the buggy address:
[   28.846443]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.846665]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.846885] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.847137]                                      ^
[   28.847478]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.847816]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.848158] ==================================================================
[   29.385511] ==================================================================
[   29.386239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   29.387170] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.387665] 
[   29.387755] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.387915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.387931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.387962] Call Trace:
[   29.387981]  <TASK>
[   29.387997]  dump_stack_lvl+0x73/0xb0
[   29.388029]  print_report+0xd1/0x640
[   29.388273]  ? __virt_addr_valid+0x1db/0x2d0
[   29.388313]  ? kasan_atomics_helper+0x18b1/0x5450
[   29.388337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.388365]  ? kasan_atomics_helper+0x18b1/0x5450
[   29.388389]  kasan_report+0x141/0x180
[   29.388414]  ? kasan_atomics_helper+0x18b1/0x5450
[   29.388442]  kasan_check_range+0x10c/0x1c0
[   29.388468]  __kasan_check_write+0x18/0x20
[   29.388494]  kasan_atomics_helper+0x18b1/0x5450
[   29.388518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.388543]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.388569]  ? kasan_atomics+0x152/0x310
[   29.388597]  kasan_atomics+0x1dc/0x310
[   29.388621]  ? __pfx_kasan_atomics+0x10/0x10
[   29.388647]  ? __pfx_read_tsc+0x10/0x10
[   29.388673]  ? ktime_get_ts64+0x86/0x230
[   29.388699]  kunit_try_run_case+0x1a5/0x480
[   29.388725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.388749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.388773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.388812]  ? __kthread_parkme+0x82/0x180
[   29.388838]  ? preempt_count_sub+0x50/0x80
[   29.388865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.388891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.388918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.388957]  kthread+0x337/0x6f0
[   29.388979]  ? trace_preempt_on+0x20/0xc0
[   29.389004]  ? __pfx_kthread+0x10/0x10
[   29.389026]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.389060]  ? calculate_sigpending+0x7b/0xa0
[   29.389085]  ? __pfx_kthread+0x10/0x10
[   29.389108]  ret_from_fork+0x116/0x1d0
[   29.389134]  ? __pfx_kthread+0x10/0x10
[   29.389157]  ret_from_fork_asm+0x1a/0x30
[   29.389190]  </TASK>
[   29.389202] 
[   29.401998] Allocated by task 314:
[   29.402162]  kasan_save_stack+0x45/0x70
[   29.402380]  kasan_save_track+0x18/0x40
[   29.402935]  kasan_save_alloc_info+0x3b/0x50
[   29.403310]  __kasan_kmalloc+0xb7/0xc0
[   29.403603]  __kmalloc_cache_noprof+0x189/0x420
[   29.403991]  kasan_atomics+0x95/0x310
[   29.404226]  kunit_try_run_case+0x1a5/0x480
[   29.404597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.404896]  kthread+0x337/0x6f0
[   29.405038]  ret_from_fork+0x116/0x1d0
[   29.405362]  ret_from_fork_asm+0x1a/0x30
[   29.405625] 
[   29.405721] The buggy address belongs to the object at ffff888106266f00
[   29.405721]  which belongs to the cache kmalloc-64 of size 64
[   29.406656] The buggy address is located 0 bytes to the right of
[   29.406656]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.407681] 
[   29.407780] The buggy address belongs to the physical page:
[   29.408453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.409018] flags: 0x200000000000000(node=0|zone=2)
[   29.409321] page_type: f5(slab)
[   29.409464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.409796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.410214] page dumped because: kasan: bad access detected
[   29.410495] 
[   29.410612] Memory state around the buggy address:
[   29.410893]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.411407]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.411738] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.412185]                                      ^
[   29.412465]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.412748]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.413365] ==================================================================
[   29.076683] ==================================================================
[   29.077135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   29.077485] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.077756] 
[   29.078102] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.078157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.078171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.078193] Call Trace:
[   29.078207]  <TASK>
[   29.078224]  dump_stack_lvl+0x73/0xb0
[   29.078254]  print_report+0xd1/0x640
[   29.078277]  ? __virt_addr_valid+0x1db/0x2d0
[   29.078328]  ? kasan_atomics_helper+0x1217/0x5450
[   29.078352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.078380]  ? kasan_atomics_helper+0x1217/0x5450
[   29.078404]  kasan_report+0x141/0x180
[   29.078429]  ? kasan_atomics_helper+0x1217/0x5450
[   29.078458]  kasan_check_range+0x10c/0x1c0
[   29.078503]  __kasan_check_write+0x18/0x20
[   29.078529]  kasan_atomics_helper+0x1217/0x5450
[   29.078553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.078578]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.078604]  ? kasan_atomics+0x152/0x310
[   29.078632]  kasan_atomics+0x1dc/0x310
[   29.078656]  ? __pfx_kasan_atomics+0x10/0x10
[   29.078682]  ? __pfx_read_tsc+0x10/0x10
[   29.078706]  ? ktime_get_ts64+0x86/0x230
[   29.078731]  kunit_try_run_case+0x1a5/0x480
[   29.078757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.078788]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.078812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.078840]  ? __kthread_parkme+0x82/0x180
[   29.078863]  ? preempt_count_sub+0x50/0x80
[   29.078888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.078913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.079023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.079075]  kthread+0x337/0x6f0
[   29.079099]  ? trace_preempt_on+0x20/0xc0
[   29.079124]  ? __pfx_kthread+0x10/0x10
[   29.079147]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.079173]  ? calculate_sigpending+0x7b/0xa0
[   29.079199]  ? __pfx_kthread+0x10/0x10
[   29.079223]  ret_from_fork+0x116/0x1d0
[   29.079244]  ? __pfx_kthread+0x10/0x10
[   29.079266]  ret_from_fork_asm+0x1a/0x30
[   29.079299]  </TASK>
[   29.079312] 
[   29.087319] Allocated by task 314:
[   29.087503]  kasan_save_stack+0x45/0x70
[   29.087704]  kasan_save_track+0x18/0x40
[   29.087991]  kasan_save_alloc_info+0x3b/0x50
[   29.088265]  __kasan_kmalloc+0xb7/0xc0
[   29.088454]  __kmalloc_cache_noprof+0x189/0x420
[   29.088675]  kasan_atomics+0x95/0x310
[   29.088909]  kunit_try_run_case+0x1a5/0x480
[   29.089091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.089375]  kthread+0x337/0x6f0
[   29.089547]  ret_from_fork+0x116/0x1d0
[   29.089755]  ret_from_fork_asm+0x1a/0x30
[   29.090115] 
[   29.090260] The buggy address belongs to the object at ffff888106266f00
[   29.090260]  which belongs to the cache kmalloc-64 of size 64
[   29.090732] The buggy address is located 0 bytes to the right of
[   29.090732]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.091367] 
[   29.091466] The buggy address belongs to the physical page:
[   29.091722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.092059] flags: 0x200000000000000(node=0|zone=2)
[   29.092235] page_type: f5(slab)
[   29.092355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.092757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.093198] page dumped because: kasan: bad access detected
[   29.093458] 
[   29.093550] Memory state around the buggy address:
[   29.093767]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.094337]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.094603] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.095065]                                      ^
[   29.095270]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.095532]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.095934] ==================================================================
[   29.836233] ==================================================================
[   29.836685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   29.837052] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.837413] 
[   29.837529] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.837605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.837620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.837641] Call Trace:
[   29.837667]  <TASK>
[   29.837687]  dump_stack_lvl+0x73/0xb0
[   29.837717]  print_report+0xd1/0x640
[   29.837742]  ? __virt_addr_valid+0x1db/0x2d0
[   29.837767]  ? kasan_atomics_helper+0x218a/0x5450
[   29.837791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.837820]  ? kasan_atomics_helper+0x218a/0x5450
[   29.837844]  kasan_report+0x141/0x180
[   29.837886]  ? kasan_atomics_helper+0x218a/0x5450
[   29.837928]  kasan_check_range+0x10c/0x1c0
[   29.837963]  __kasan_check_write+0x18/0x20
[   29.838003]  kasan_atomics_helper+0x218a/0x5450
[   29.838042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.838086]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.838114]  ? kasan_atomics+0x152/0x310
[   29.838142]  kasan_atomics+0x1dc/0x310
[   29.838177]  ? __pfx_kasan_atomics+0x10/0x10
[   29.838204]  ? __pfx_read_tsc+0x10/0x10
[   29.838227]  ? ktime_get_ts64+0x86/0x230
[   29.838253]  kunit_try_run_case+0x1a5/0x480
[   29.838280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.838304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.838356]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.838385]  ? __kthread_parkme+0x82/0x180
[   29.838407]  ? preempt_count_sub+0x50/0x80
[   29.838461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.838488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.838526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.838553]  kthread+0x337/0x6f0
[   29.838575]  ? trace_preempt_on+0x20/0xc0
[   29.838600]  ? __pfx_kthread+0x10/0x10
[   29.838649]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.838677]  ? calculate_sigpending+0x7b/0xa0
[   29.838713]  ? __pfx_kthread+0x10/0x10
[   29.838737]  ret_from_fork+0x116/0x1d0
[   29.838784]  ? __pfx_kthread+0x10/0x10
[   29.838807]  ret_from_fork_asm+0x1a/0x30
[   29.838840]  </TASK>
[   29.838863] 
[   29.847042] Allocated by task 314:
[   29.847167]  kasan_save_stack+0x45/0x70
[   29.847306]  kasan_save_track+0x18/0x40
[   29.847436]  kasan_save_alloc_info+0x3b/0x50
[   29.847580]  __kasan_kmalloc+0xb7/0xc0
[   29.847711]  __kmalloc_cache_noprof+0x189/0x420
[   29.847887]  kasan_atomics+0x95/0x310
[   29.848105]  kunit_try_run_case+0x1a5/0x480
[   29.848309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.848558]  kthread+0x337/0x6f0
[   29.848720]  ret_from_fork+0x116/0x1d0
[   29.848902]  ret_from_fork_asm+0x1a/0x30
[   29.849252] 
[   29.849324] The buggy address belongs to the object at ffff888106266f00
[   29.849324]  which belongs to the cache kmalloc-64 of size 64
[   29.849673] The buggy address is located 0 bytes to the right of
[   29.849673]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.850190] 
[   29.850287] The buggy address belongs to the physical page:
[   29.850557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.850922] flags: 0x200000000000000(node=0|zone=2)
[   29.851295] page_type: f5(slab)
[   29.851488] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.851801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.852147] page dumped because: kasan: bad access detected
[   29.852396] 
[   29.852464] Memory state around the buggy address:
[   29.852690]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.852988]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.853378] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.853686]                                      ^
[   29.853887]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.854276]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.854590] ==================================================================
[   28.609117] ==================================================================
[   28.609495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   28.609913] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.610291] 
[   28.610401] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.610450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.610463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.610486] Call Trace:
[   28.610501]  <TASK>
[   28.610518]  dump_stack_lvl+0x73/0xb0
[   28.610548]  print_report+0xd1/0x640
[   28.610573]  ? __virt_addr_valid+0x1db/0x2d0
[   28.610598]  ? kasan_atomics_helper+0x860/0x5450
[   28.610621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.610650]  ? kasan_atomics_helper+0x860/0x5450
[   28.610674]  kasan_report+0x141/0x180
[   28.610699]  ? kasan_atomics_helper+0x860/0x5450
[   28.610728]  kasan_check_range+0x10c/0x1c0
[   28.610753]  __kasan_check_write+0x18/0x20
[   28.610847]  kasan_atomics_helper+0x860/0x5450
[   28.610875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.610900]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.610927]  ? kasan_atomics+0x152/0x310
[   28.610966]  kasan_atomics+0x1dc/0x310
[   28.610990]  ? __pfx_kasan_atomics+0x10/0x10
[   28.611017]  ? __pfx_read_tsc+0x10/0x10
[   28.611042]  ? ktime_get_ts64+0x86/0x230
[   28.611068]  kunit_try_run_case+0x1a5/0x480
[   28.611112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.611137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.611162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.611191]  ? __kthread_parkme+0x82/0x180
[   28.611213]  ? preempt_count_sub+0x50/0x80
[   28.611238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.611264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.611289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.611342]  kthread+0x337/0x6f0
[   28.611364]  ? trace_preempt_on+0x20/0xc0
[   28.611390]  ? __pfx_kthread+0x10/0x10
[   28.611412]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.611438]  ? calculate_sigpending+0x7b/0xa0
[   28.611464]  ? __pfx_kthread+0x10/0x10
[   28.611488]  ret_from_fork+0x116/0x1d0
[   28.611528]  ? __pfx_kthread+0x10/0x10
[   28.611551]  ret_from_fork_asm+0x1a/0x30
[   28.611584]  </TASK>
[   28.611596] 
[   28.620678] Allocated by task 314:
[   28.620816]  kasan_save_stack+0x45/0x70
[   28.620972]  kasan_save_track+0x18/0x40
[   28.621166]  kasan_save_alloc_info+0x3b/0x50
[   28.621374]  __kasan_kmalloc+0xb7/0xc0
[   28.621558]  __kmalloc_cache_noprof+0x189/0x420
[   28.621780]  kasan_atomics+0x95/0x310
[   28.621969]  kunit_try_run_case+0x1a5/0x480
[   28.622180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.622434]  kthread+0x337/0x6f0
[   28.622601]  ret_from_fork+0x116/0x1d0
[   28.622759]  ret_from_fork_asm+0x1a/0x30
[   28.622895] 
[   28.623246] The buggy address belongs to the object at ffff888106266f00
[   28.623246]  which belongs to the cache kmalloc-64 of size 64
[   28.623890] The buggy address is located 0 bytes to the right of
[   28.623890]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.624497] 
[   28.624593] The buggy address belongs to the physical page:
[   28.624915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.625270] flags: 0x200000000000000(node=0|zone=2)
[   28.625434] page_type: f5(slab)
[   28.625552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.625856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.626224] page dumped because: kasan: bad access detected
[   28.626504] 
[   28.626613] Memory state around the buggy address:
[   28.627044]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.627454]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.627905] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.628266]                                      ^
[   28.628517]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.628903]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.629167] ==================================================================
[   29.280155] ==================================================================
[   29.280627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   29.281361] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.281955] 
[   29.282068] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.282118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.282131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.282153] Call Trace:
[   29.282177]  <TASK>
[   29.282192]  dump_stack_lvl+0x73/0xb0
[   29.282222]  print_report+0xd1/0x640
[   29.282246]  ? __virt_addr_valid+0x1db/0x2d0
[   29.282271]  ? kasan_atomics_helper+0x15b6/0x5450
[   29.282294]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.282323]  ? kasan_atomics_helper+0x15b6/0x5450
[   29.282367]  kasan_report+0x141/0x180
[   29.282391]  ? kasan_atomics_helper+0x15b6/0x5450
[   29.282420]  kasan_check_range+0x10c/0x1c0
[   29.282445]  __kasan_check_write+0x18/0x20
[   29.282471]  kasan_atomics_helper+0x15b6/0x5450
[   29.282495]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.282535]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.282561]  ? kasan_atomics+0x152/0x310
[   29.282604]  kasan_atomics+0x1dc/0x310
[   29.282641]  ? __pfx_kasan_atomics+0x10/0x10
[   29.282680]  ? __pfx_read_tsc+0x10/0x10
[   29.282717]  ? ktime_get_ts64+0x86/0x230
[   29.282743]  kunit_try_run_case+0x1a5/0x480
[   29.282783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.282885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.282910]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.282939]  ? __kthread_parkme+0x82/0x180
[   29.282974]  ? preempt_count_sub+0x50/0x80
[   29.282999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.283026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.283052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.283078]  kthread+0x337/0x6f0
[   29.283100]  ? trace_preempt_on+0x20/0xc0
[   29.283125]  ? __pfx_kthread+0x10/0x10
[   29.283155]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.283182]  ? calculate_sigpending+0x7b/0xa0
[   29.283207]  ? __pfx_kthread+0x10/0x10
[   29.283231]  ret_from_fork+0x116/0x1d0
[   29.283253]  ? __pfx_kthread+0x10/0x10
[   29.283276]  ret_from_fork_asm+0x1a/0x30
[   29.283309]  </TASK>
[   29.283322] 
[   29.293804] Allocated by task 314:
[   29.294112]  kasan_save_stack+0x45/0x70
[   29.294378]  kasan_save_track+0x18/0x40
[   29.294617]  kasan_save_alloc_info+0x3b/0x50
[   29.294824]  __kasan_kmalloc+0xb7/0xc0
[   29.295049]  __kmalloc_cache_noprof+0x189/0x420
[   29.295273]  kasan_atomics+0x95/0x310
[   29.295455]  kunit_try_run_case+0x1a5/0x480
[   29.295656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.296248]  kthread+0x337/0x6f0
[   29.296440]  ret_from_fork+0x116/0x1d0
[   29.296627]  ret_from_fork_asm+0x1a/0x30
[   29.296778] 
[   29.296952] The buggy address belongs to the object at ffff888106266f00
[   29.296952]  which belongs to the cache kmalloc-64 of size 64
[   29.297484] The buggy address is located 0 bytes to the right of
[   29.297484]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.298059] 
[   29.298184] The buggy address belongs to the physical page:
[   29.298413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.298770] flags: 0x200000000000000(node=0|zone=2)
[   29.298994] page_type: f5(slab)
[   29.299266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.299511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.299763] page dumped because: kasan: bad access detected
[   29.300014] 
[   29.300330] Memory state around the buggy address:
[   29.300604]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.301010]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.301265] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.301476]                                      ^
[   29.301630]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.301974]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.302832] ==================================================================
[   29.664269] ==================================================================
[   29.665230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   29.665918] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.666642] 
[   29.666863] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.666921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.667057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.667084] Call Trace:
[   29.667103]  <TASK>
[   29.667121]  dump_stack_lvl+0x73/0xb0
[   29.667154]  print_report+0xd1/0x640
[   29.667180]  ? __virt_addr_valid+0x1db/0x2d0
[   29.667245]  ? kasan_atomics_helper+0x1eaa/0x5450
[   29.667268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.667297]  ? kasan_atomics_helper+0x1eaa/0x5450
[   29.667320]  kasan_report+0x141/0x180
[   29.667345]  ? kasan_atomics_helper+0x1eaa/0x5450
[   29.667373]  kasan_check_range+0x10c/0x1c0
[   29.667399]  __kasan_check_write+0x18/0x20
[   29.667424]  kasan_atomics_helper+0x1eaa/0x5450
[   29.667449]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.667473]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.667499]  ? kasan_atomics+0x152/0x310
[   29.667527]  kasan_atomics+0x1dc/0x310
[   29.667551]  ? __pfx_kasan_atomics+0x10/0x10
[   29.667576]  ? __pfx_read_tsc+0x10/0x10
[   29.667601]  ? ktime_get_ts64+0x86/0x230
[   29.667627]  kunit_try_run_case+0x1a5/0x480
[   29.667654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.667679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.667703]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.667731]  ? __kthread_parkme+0x82/0x180
[   29.667753]  ? preempt_count_sub+0x50/0x80
[   29.667779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.667818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.667844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.667870]  kthread+0x337/0x6f0
[   29.667891]  ? trace_preempt_on+0x20/0xc0
[   29.667916]  ? __pfx_kthread+0x10/0x10
[   29.667938]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.667975]  ? calculate_sigpending+0x7b/0xa0
[   29.667999]  ? __pfx_kthread+0x10/0x10
[   29.668023]  ret_from_fork+0x116/0x1d0
[   29.668044]  ? __pfx_kthread+0x10/0x10
[   29.668076]  ret_from_fork_asm+0x1a/0x30
[   29.668109]  </TASK>
[   29.668122] 
[   29.680631] Allocated by task 314:
[   29.680858]  kasan_save_stack+0x45/0x70
[   29.681033]  kasan_save_track+0x18/0x40
[   29.681210]  kasan_save_alloc_info+0x3b/0x50
[   29.681396]  __kasan_kmalloc+0xb7/0xc0
[   29.681562]  __kmalloc_cache_noprof+0x189/0x420
[   29.681758]  kasan_atomics+0x95/0x310
[   29.682418]  kunit_try_run_case+0x1a5/0x480
[   29.682833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.683333]  kthread+0x337/0x6f0
[   29.683622]  ret_from_fork+0x116/0x1d0
[   29.683969]  ret_from_fork_asm+0x1a/0x30
[   29.684369] 
[   29.684468] The buggy address belongs to the object at ffff888106266f00
[   29.684468]  which belongs to the cache kmalloc-64 of size 64
[   29.685477] The buggy address is located 0 bytes to the right of
[   29.685477]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.686382] 
[   29.686477] The buggy address belongs to the physical page:
[   29.686668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.687455] flags: 0x200000000000000(node=0|zone=2)
[   29.688086] page_type: f5(slab)
[   29.688442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.688851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.689619] page dumped because: kasan: bad access detected
[   29.690190] 
[   29.690328] Memory state around the buggy address:
[   29.690777]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.691361]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.691669] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.692231]                                      ^
[   29.692759]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.693492]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.694176] ==================================================================
[   29.816351] ==================================================================
[   29.816618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   29.817216] Read of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.817477] 
[   29.817604] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.817666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.817679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.817715] Call Trace:
[   29.817731]  <TASK>
[   29.817746]  dump_stack_lvl+0x73/0xb0
[   29.817800]  print_report+0xd1/0x640
[   29.817825]  ? __virt_addr_valid+0x1db/0x2d0
[   29.817862]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.817885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.817913]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.817937]  kasan_report+0x141/0x180
[   29.817970]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.817998]  __asan_report_load8_noabort+0x18/0x20
[   29.818025]  kasan_atomics_helper+0x4fb2/0x5450
[   29.818049]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.818084]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.818111]  ? kasan_atomics+0x152/0x310
[   29.818139]  kasan_atomics+0x1dc/0x310
[   29.818163]  ? __pfx_kasan_atomics+0x10/0x10
[   29.818218]  ? __pfx_read_tsc+0x10/0x10
[   29.818243]  ? ktime_get_ts64+0x86/0x230
[   29.818269]  kunit_try_run_case+0x1a5/0x480
[   29.818305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.818330]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.818371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.818409]  ? __kthread_parkme+0x82/0x180
[   29.818431]  ? preempt_count_sub+0x50/0x80
[   29.818484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.818511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.818536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.818563]  kthread+0x337/0x6f0
[   29.818584]  ? trace_preempt_on+0x20/0xc0
[   29.818609]  ? __pfx_kthread+0x10/0x10
[   29.818631]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.818684]  ? calculate_sigpending+0x7b/0xa0
[   29.818710]  ? __pfx_kthread+0x10/0x10
[   29.818769]  ret_from_fork+0x116/0x1d0
[   29.818791]  ? __pfx_kthread+0x10/0x10
[   29.818813]  ret_from_fork_asm+0x1a/0x30
[   29.818856]  </TASK>
[   29.818868] 
[   29.827178] Allocated by task 314:
[   29.827327]  kasan_save_stack+0x45/0x70
[   29.827524]  kasan_save_track+0x18/0x40
[   29.827763]  kasan_save_alloc_info+0x3b/0x50
[   29.827994]  __kasan_kmalloc+0xb7/0xc0
[   29.828164]  __kmalloc_cache_noprof+0x189/0x420
[   29.828400]  kasan_atomics+0x95/0x310
[   29.828622]  kunit_try_run_case+0x1a5/0x480
[   29.828826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.829147]  kthread+0x337/0x6f0
[   29.829307]  ret_from_fork+0x116/0x1d0
[   29.829541]  ret_from_fork_asm+0x1a/0x30
[   29.829739] 
[   29.829816] The buggy address belongs to the object at ffff888106266f00
[   29.829816]  which belongs to the cache kmalloc-64 of size 64
[   29.830456] The buggy address is located 0 bytes to the right of
[   29.830456]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.830986] 
[   29.831056] The buggy address belongs to the physical page:
[   29.831228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.831520] flags: 0x200000000000000(node=0|zone=2)
[   29.831749] page_type: f5(slab)
[   29.832062] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.832400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.832728] page dumped because: kasan: bad access detected
[   29.832983] 
[   29.833081] Memory state around the buggy address:
[   29.833285]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.833501]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.833738] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.834074]                                      ^
[   29.834348]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.834709]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.835018] ==================================================================
[   28.867493] ==================================================================
[   28.867915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   28.868521] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.868861] 
[   28.868970] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.869017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.869030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.869051] Call Trace:
[   28.869065]  <TASK>
[   28.869080]  dump_stack_lvl+0x73/0xb0
[   28.869106]  print_report+0xd1/0x640
[   28.869137]  ? __virt_addr_valid+0x1db/0x2d0
[   28.869162]  ? kasan_atomics_helper+0xde0/0x5450
[   28.869184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.869212]  ? kasan_atomics_helper+0xde0/0x5450
[   28.869236]  kasan_report+0x141/0x180
[   28.869260]  ? kasan_atomics_helper+0xde0/0x5450
[   28.869288]  kasan_check_range+0x10c/0x1c0
[   28.869324]  __kasan_check_write+0x18/0x20
[   28.869351]  kasan_atomics_helper+0xde0/0x5450
[   28.869383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.869407]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.869434]  ? kasan_atomics+0x152/0x310
[   28.869462]  kasan_atomics+0x1dc/0x310
[   28.869486]  ? __pfx_kasan_atomics+0x10/0x10
[   28.869513]  ? __pfx_read_tsc+0x10/0x10
[   28.869536]  ? ktime_get_ts64+0x86/0x230
[   28.869562]  kunit_try_run_case+0x1a5/0x480
[   28.869588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.869612]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.869636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.869673]  ? __kthread_parkme+0x82/0x180
[   28.869696]  ? preempt_count_sub+0x50/0x80
[   28.869721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.869748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.869773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.869799]  kthread+0x337/0x6f0
[   28.869821]  ? trace_preempt_on+0x20/0xc0
[   28.869845]  ? __pfx_kthread+0x10/0x10
[   28.869868]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.869894]  ? calculate_sigpending+0x7b/0xa0
[   28.869920]  ? __pfx_kthread+0x10/0x10
[   28.869955]  ret_from_fork+0x116/0x1d0
[   28.869978]  ? __pfx_kthread+0x10/0x10
[   28.870017]  ret_from_fork_asm+0x1a/0x30
[   28.870059]  </TASK>
[   28.870071] 
[   28.878685] Allocated by task 314:
[   28.878849]  kasan_save_stack+0x45/0x70
[   28.879101]  kasan_save_track+0x18/0x40
[   28.879999]  kasan_save_alloc_info+0x3b/0x50
[   28.880155]  __kasan_kmalloc+0xb7/0xc0
[   28.880287]  __kmalloc_cache_noprof+0x189/0x420
[   28.880442]  kasan_atomics+0x95/0x310
[   28.880576]  kunit_try_run_case+0x1a5/0x480
[   28.880722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.880960]  kthread+0x337/0x6f0
[   28.881135]  ret_from_fork+0x116/0x1d0
[   28.881322]  ret_from_fork_asm+0x1a/0x30
[   28.881529] 
[   28.881617] The buggy address belongs to the object at ffff888106266f00
[   28.881617]  which belongs to the cache kmalloc-64 of size 64
[   28.882764] The buggy address is located 0 bytes to the right of
[   28.882764]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.883277] 
[   28.883347] The buggy address belongs to the physical page:
[   28.883525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.883772] flags: 0x200000000000000(node=0|zone=2)
[   28.883936] page_type: f5(slab)
[   28.884171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.884970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.885453] page dumped because: kasan: bad access detected
[   28.885714] 
[   28.885782] Memory state around the buggy address:
[   28.885939]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.886170]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.886390] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.886651]                                      ^
[   28.887062]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.887726]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.888106] ==================================================================
[   28.629571] ==================================================================
[   28.630019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   28.630396] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.630722] 
[   28.631018] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.631070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.631106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.631128] Call Trace:
[   28.631145]  <TASK>
[   28.631160]  dump_stack_lvl+0x73/0xb0
[   28.631211]  print_report+0xd1/0x640
[   28.631236]  ? __virt_addr_valid+0x1db/0x2d0
[   28.631262]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.631303]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.631333]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.631356]  kasan_report+0x141/0x180
[   28.631381]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.631409]  kasan_check_range+0x10c/0x1c0
[   28.631436]  __kasan_check_write+0x18/0x20
[   28.631462]  kasan_atomics_helper+0x8f9/0x5450
[   28.631487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.631529]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.631556]  ? kasan_atomics+0x152/0x310
[   28.631584]  kasan_atomics+0x1dc/0x310
[   28.631609]  ? __pfx_kasan_atomics+0x10/0x10
[   28.631636]  ? __pfx_read_tsc+0x10/0x10
[   28.631660]  ? ktime_get_ts64+0x86/0x230
[   28.631700]  kunit_try_run_case+0x1a5/0x480
[   28.631727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.631752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.631860]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.631908]  ? __kthread_parkme+0x82/0x180
[   28.631954]  ? preempt_count_sub+0x50/0x80
[   28.631994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.632034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.632103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.632142]  kthread+0x337/0x6f0
[   28.632178]  ? trace_preempt_on+0x20/0xc0
[   28.632216]  ? __pfx_kthread+0x10/0x10
[   28.632252]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.632291]  ? calculate_sigpending+0x7b/0xa0
[   28.632330]  ? __pfx_kthread+0x10/0x10
[   28.632367]  ret_from_fork+0x116/0x1d0
[   28.632401]  ? __pfx_kthread+0x10/0x10
[   28.632436]  ret_from_fork_asm+0x1a/0x30
[   28.632497]  </TASK>
[   28.632509] 
[   28.645172] Allocated by task 314:
[   28.645894]  kasan_save_stack+0x45/0x70
[   28.646431]  kasan_save_track+0x18/0x40
[   28.646895]  kasan_save_alloc_info+0x3b/0x50
[   28.647573]  __kasan_kmalloc+0xb7/0xc0
[   28.648143]  __kmalloc_cache_noprof+0x189/0x420
[   28.648796]  kasan_atomics+0x95/0x310
[   28.649346]  kunit_try_run_case+0x1a5/0x480
[   28.649509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.649686]  kthread+0x337/0x6f0
[   28.650084]  ret_from_fork+0x116/0x1d0
[   28.650582]  ret_from_fork_asm+0x1a/0x30
[   28.651088] 
[   28.651527] The buggy address belongs to the object at ffff888106266f00
[   28.651527]  which belongs to the cache kmalloc-64 of size 64
[   28.652925] The buggy address is located 0 bytes to the right of
[   28.652925]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.654057] 
[   28.654139] The buggy address belongs to the physical page:
[   28.654325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.654579] flags: 0x200000000000000(node=0|zone=2)
[   28.654748] page_type: f5(slab)
[   28.655324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.656497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.657411] page dumped because: kasan: bad access detected
[   28.658163] 
[   28.658462] Memory state around the buggy address:
[   28.659070]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.659683]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.660234] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.660907]                                      ^
[   28.661426]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.661746]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.662517] ==================================================================
[   28.696412] ==================================================================
[   28.697040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   28.697467] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.697707] 
[   28.697828] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.697879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.697893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.697915] Call Trace:
[   28.697932]  <TASK>
[   28.697960]  dump_stack_lvl+0x73/0xb0
[   28.697991]  print_report+0xd1/0x640
[   28.698015]  ? __virt_addr_valid+0x1db/0x2d0
[   28.698040]  ? kasan_atomics_helper+0xa2b/0x5450
[   28.698064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.698092]  ? kasan_atomics_helper+0xa2b/0x5450
[   28.698116]  kasan_report+0x141/0x180
[   28.698139]  ? kasan_atomics_helper+0xa2b/0x5450
[   28.698167]  kasan_check_range+0x10c/0x1c0
[   28.698193]  __kasan_check_write+0x18/0x20
[   28.698218]  kasan_atomics_helper+0xa2b/0x5450
[   28.698242]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.698267]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.698294]  ? kasan_atomics+0x152/0x310
[   28.698323]  kasan_atomics+0x1dc/0x310
[   28.698347]  ? __pfx_kasan_atomics+0x10/0x10
[   28.698384]  ? __pfx_read_tsc+0x10/0x10
[   28.698408]  ? ktime_get_ts64+0x86/0x230
[   28.698435]  kunit_try_run_case+0x1a5/0x480
[   28.698461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.698487]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.698510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.698539]  ? __kthread_parkme+0x82/0x180
[   28.698561]  ? preempt_count_sub+0x50/0x80
[   28.698586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.698613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.698639]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.698665]  kthread+0x337/0x6f0
[   28.698687]  ? trace_preempt_on+0x20/0xc0
[   28.698712]  ? __pfx_kthread+0x10/0x10
[   28.698734]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.698761]  ? calculate_sigpending+0x7b/0xa0
[   28.698925]  ? __pfx_kthread+0x10/0x10
[   28.698971]  ret_from_fork+0x116/0x1d0
[   28.698994]  ? __pfx_kthread+0x10/0x10
[   28.699016]  ret_from_fork_asm+0x1a/0x30
[   28.699050]  </TASK>
[   28.699075] 
[   28.713712] Allocated by task 314:
[   28.714135]  kasan_save_stack+0x45/0x70
[   28.714555]  kasan_save_track+0x18/0x40
[   28.714965]  kasan_save_alloc_info+0x3b/0x50
[   28.715473]  __kasan_kmalloc+0xb7/0xc0
[   28.715850]  __kmalloc_cache_noprof+0x189/0x420
[   28.716480]  kasan_atomics+0x95/0x310
[   28.716864]  kunit_try_run_case+0x1a5/0x480
[   28.717068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.717633]  kthread+0x337/0x6f0
[   28.717899]  ret_from_fork+0x116/0x1d0
[   28.718298]  ret_from_fork_asm+0x1a/0x30
[   28.718545] 
[   28.718614] The buggy address belongs to the object at ffff888106266f00
[   28.718614]  which belongs to the cache kmalloc-64 of size 64
[   28.719565] The buggy address is located 0 bytes to the right of
[   28.719565]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.720753] 
[   28.720925] The buggy address belongs to the physical page:
[   28.721272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.721525] flags: 0x200000000000000(node=0|zone=2)
[   28.721691] page_type: f5(slab)
[   28.721828] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.722145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.722519] page dumped because: kasan: bad access detected
[   28.722740] 
[   28.722806] Memory state around the buggy address:
[   28.723198]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.723509]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.723890] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.724128]                                      ^
[   28.724371]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.724638]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.725178] ==================================================================
[   29.899567] ==================================================================
[   29.900306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   29.900546] Read of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.900894] 
[   29.901024] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.901072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.901086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.901107] Call Trace:
[   29.901128]  <TASK>
[   29.901173]  dump_stack_lvl+0x73/0xb0
[   29.901203]  print_report+0xd1/0x640
[   29.901227]  ? __virt_addr_valid+0x1db/0x2d0
[   29.901265]  ? kasan_atomics_helper+0x5115/0x5450
[   29.901288]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.901343]  ? kasan_atomics_helper+0x5115/0x5450
[   29.901368]  kasan_report+0x141/0x180
[   29.901392]  ? kasan_atomics_helper+0x5115/0x5450
[   29.901431]  __asan_report_load8_noabort+0x18/0x20
[   29.901458]  kasan_atomics_helper+0x5115/0x5450
[   29.901509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.901534]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.901571]  ? kasan_atomics+0x152/0x310
[   29.901599]  kasan_atomics+0x1dc/0x310
[   29.901624]  ? __pfx_kasan_atomics+0x10/0x10
[   29.901676]  ? __pfx_read_tsc+0x10/0x10
[   29.901700]  ? ktime_get_ts64+0x86/0x230
[   29.901727]  kunit_try_run_case+0x1a5/0x480
[   29.901763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.901788]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.901838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.901867]  ? __kthread_parkme+0x82/0x180
[   29.901900]  ? preempt_count_sub+0x50/0x80
[   29.901925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.901977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.902003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.902042]  kthread+0x337/0x6f0
[   29.902075]  ? trace_preempt_on+0x20/0xc0
[   29.902100]  ? __pfx_kthread+0x10/0x10
[   29.902134]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.902160]  ? calculate_sigpending+0x7b/0xa0
[   29.902186]  ? __pfx_kthread+0x10/0x10
[   29.902210]  ret_from_fork+0x116/0x1d0
[   29.902231]  ? __pfx_kthread+0x10/0x10
[   29.902254]  ret_from_fork_asm+0x1a/0x30
[   29.902286]  </TASK>
[   29.902298] 
[   29.910595] Allocated by task 314:
[   29.910774]  kasan_save_stack+0x45/0x70
[   29.910990]  kasan_save_track+0x18/0x40
[   29.911242]  kasan_save_alloc_info+0x3b/0x50
[   29.911473]  __kasan_kmalloc+0xb7/0xc0
[   29.911686]  __kmalloc_cache_noprof+0x189/0x420
[   29.911961]  kasan_atomics+0x95/0x310
[   29.912194]  kunit_try_run_case+0x1a5/0x480
[   29.912432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.912704]  kthread+0x337/0x6f0
[   29.912873]  ret_from_fork+0x116/0x1d0
[   29.913066]  ret_from_fork_asm+0x1a/0x30
[   29.913224] 
[   29.913291] The buggy address belongs to the object at ffff888106266f00
[   29.913291]  which belongs to the cache kmalloc-64 of size 64
[   29.913824] The buggy address is located 0 bytes to the right of
[   29.913824]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.914408] 
[   29.914509] The buggy address belongs to the physical page:
[   29.914810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.915215] flags: 0x200000000000000(node=0|zone=2)
[   29.915471] page_type: f5(slab)
[   29.915642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.915995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.916387] page dumped because: kasan: bad access detected
[   29.916639] 
[   29.916771] Memory state around the buggy address:
[   29.916985]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.917314]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.917643] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.917995]                                      ^
[   29.918404]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.918718]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.919036] ==================================================================
[   29.322373] ==================================================================
[   29.322593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   29.322822] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.323057] 
[   29.323310] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.323363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.323377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.323398] Call Trace:
[   29.323415]  <TASK>
[   29.323431]  dump_stack_lvl+0x73/0xb0
[   29.323462]  print_report+0xd1/0x640
[   29.323485]  ? __virt_addr_valid+0x1db/0x2d0
[   29.323510]  ? kasan_atomics_helper+0x16e7/0x5450
[   29.323533]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.323562]  ? kasan_atomics_helper+0x16e7/0x5450
[   29.323586]  kasan_report+0x141/0x180
[   29.323611]  ? kasan_atomics_helper+0x16e7/0x5450
[   29.323640]  kasan_check_range+0x10c/0x1c0
[   29.323665]  __kasan_check_write+0x18/0x20
[   29.323691]  kasan_atomics_helper+0x16e7/0x5450
[   29.323715]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.323739]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.323766]  ? kasan_atomics+0x152/0x310
[   29.323794]  kasan_atomics+0x1dc/0x310
[   29.323818]  ? __pfx_kasan_atomics+0x10/0x10
[   29.323844]  ? __pfx_read_tsc+0x10/0x10
[   29.323868]  ? ktime_get_ts64+0x86/0x230
[   29.323893]  kunit_try_run_case+0x1a5/0x480
[   29.323920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.323959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.323983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.324011]  ? __kthread_parkme+0x82/0x180
[   29.324053]  ? preempt_count_sub+0x50/0x80
[   29.324080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.324106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.324132]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.324158]  kthread+0x337/0x6f0
[   29.324180]  ? trace_preempt_on+0x20/0xc0
[   29.324206]  ? __pfx_kthread+0x10/0x10
[   29.324228]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.324254]  ? calculate_sigpending+0x7b/0xa0
[   29.324280]  ? __pfx_kthread+0x10/0x10
[   29.324304]  ret_from_fork+0x116/0x1d0
[   29.324325]  ? __pfx_kthread+0x10/0x10
[   29.324348]  ret_from_fork_asm+0x1a/0x30
[   29.324380]  </TASK>
[   29.324393] 
[   29.333580] Allocated by task 314:
[   29.333712]  kasan_save_stack+0x45/0x70
[   29.333857]  kasan_save_track+0x18/0x40
[   29.334006]  kasan_save_alloc_info+0x3b/0x50
[   29.334214]  __kasan_kmalloc+0xb7/0xc0
[   29.334534]  __kmalloc_cache_noprof+0x189/0x420
[   29.334753]  kasan_atomics+0x95/0x310
[   29.334934]  kunit_try_run_case+0x1a5/0x480
[   29.335154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.335611]  kthread+0x337/0x6f0
[   29.335925]  ret_from_fork+0x116/0x1d0
[   29.336157]  ret_from_fork_asm+0x1a/0x30
[   29.336338] 
[   29.336424] The buggy address belongs to the object at ffff888106266f00
[   29.336424]  which belongs to the cache kmalloc-64 of size 64
[   29.336798] The buggy address is located 0 bytes to the right of
[   29.336798]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.337653] 
[   29.337750] The buggy address belongs to the physical page:
[   29.338006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.338254] flags: 0x200000000000000(node=0|zone=2)
[   29.338417] page_type: f5(slab)
[   29.338536] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.338773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.339027] page dumped because: kasan: bad access detected
[   29.339528] 
[   29.339616] Memory state around the buggy address:
[   29.339834]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.340550]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.341179] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.341449]                                      ^
[   29.341652]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.342044]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.342346] ==================================================================
[   28.908312] ==================================================================
[   28.908692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   28.909097] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.909433] 
[   28.909540] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.909588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.909601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.909621] Call Trace:
[   28.909637]  <TASK>
[   28.909652]  dump_stack_lvl+0x73/0xb0
[   28.909682]  print_report+0xd1/0x640
[   28.909707]  ? __virt_addr_valid+0x1db/0x2d0
[   28.909731]  ? kasan_atomics_helper+0xf10/0x5450
[   28.909755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.909783]  ? kasan_atomics_helper+0xf10/0x5450
[   28.909816]  kasan_report+0x141/0x180
[   28.909840]  ? kasan_atomics_helper+0xf10/0x5450
[   28.909868]  kasan_check_range+0x10c/0x1c0
[   28.909894]  __kasan_check_write+0x18/0x20
[   28.909919]  kasan_atomics_helper+0xf10/0x5450
[   28.909955]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.909979]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.910006]  ? kasan_atomics+0x152/0x310
[   28.910034]  kasan_atomics+0x1dc/0x310
[   28.910058]  ? __pfx_kasan_atomics+0x10/0x10
[   28.910084]  ? __pfx_read_tsc+0x10/0x10
[   28.910108]  ? ktime_get_ts64+0x86/0x230
[   28.910133]  kunit_try_run_case+0x1a5/0x480
[   28.910159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.910184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.910207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.910235]  ? __kthread_parkme+0x82/0x180
[   28.910258]  ? preempt_count_sub+0x50/0x80
[   28.910283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.910310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.910335]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.910363]  kthread+0x337/0x6f0
[   28.910384]  ? trace_preempt_on+0x20/0xc0
[   28.910410]  ? __pfx_kthread+0x10/0x10
[   28.910433]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.910459]  ? calculate_sigpending+0x7b/0xa0
[   28.910484]  ? __pfx_kthread+0x10/0x10
[   28.910507]  ret_from_fork+0x116/0x1d0
[   28.910528]  ? __pfx_kthread+0x10/0x10
[   28.910551]  ret_from_fork_asm+0x1a/0x30
[   28.910583]  </TASK>
[   28.910595] 
[   28.926410] Allocated by task 314:
[   28.926546]  kasan_save_stack+0x45/0x70
[   28.926696]  kasan_save_track+0x18/0x40
[   28.926846]  kasan_save_alloc_info+0x3b/0x50
[   28.927014]  __kasan_kmalloc+0xb7/0xc0
[   28.927149]  __kmalloc_cache_noprof+0x189/0x420
[   28.927306]  kasan_atomics+0x95/0x310
[   28.927439]  kunit_try_run_case+0x1a5/0x480
[   28.927586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.927762]  kthread+0x337/0x6f0
[   28.927881]  ret_from_fork+0x116/0x1d0
[   28.929010]  ret_from_fork_asm+0x1a/0x30
[   28.929652] 
[   28.930085] The buggy address belongs to the object at ffff888106266f00
[   28.930085]  which belongs to the cache kmalloc-64 of size 64
[   28.931746] The buggy address is located 0 bytes to the right of
[   28.931746]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.933592] 
[   28.933939] The buggy address belongs to the physical page:
[   28.934790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.935744] flags: 0x200000000000000(node=0|zone=2)
[   28.936066] page_type: f5(slab)
[   28.936244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.936602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.937138] page dumped because: kasan: bad access detected
[   28.937415] 
[   28.937544] Memory state around the buggy address:
[   28.937776]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.938373]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.938715] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.939323]                                      ^
[   28.939504]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.939985]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.940297] ==================================================================
[   29.458259] ==================================================================
[   29.458482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   29.458825] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.459447] 
[   29.459626] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.459674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.459688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.459709] Call Trace:
[   29.459724]  <TASK>
[   29.459739]  dump_stack_lvl+0x73/0xb0
[   29.459811]  print_report+0xd1/0x640
[   29.459837]  ? __virt_addr_valid+0x1db/0x2d0
[   29.459874]  ? kasan_atomics_helper+0x1a7f/0x5450
[   29.459898]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.459926]  ? kasan_atomics_helper+0x1a7f/0x5450
[   29.459961]  kasan_report+0x141/0x180
[   29.459986]  ? kasan_atomics_helper+0x1a7f/0x5450
[   29.460024]  kasan_check_range+0x10c/0x1c0
[   29.460050]  __kasan_check_write+0x18/0x20
[   29.460075]  kasan_atomics_helper+0x1a7f/0x5450
[   29.460126]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.460150]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.460177]  ? kasan_atomics+0x152/0x310
[   29.460205]  kasan_atomics+0x1dc/0x310
[   29.460229]  ? __pfx_kasan_atomics+0x10/0x10
[   29.460255]  ? __pfx_read_tsc+0x10/0x10
[   29.460279]  ? ktime_get_ts64+0x86/0x230
[   29.460304]  kunit_try_run_case+0x1a5/0x480
[   29.460330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.460355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.460378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.460406]  ? __kthread_parkme+0x82/0x180
[   29.460427]  ? preempt_count_sub+0x50/0x80
[   29.460453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.460479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.460504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.460531]  kthread+0x337/0x6f0
[   29.460552]  ? trace_preempt_on+0x20/0xc0
[   29.460576]  ? __pfx_kthread+0x10/0x10
[   29.460599]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.460625]  ? calculate_sigpending+0x7b/0xa0
[   29.460651]  ? __pfx_kthread+0x10/0x10
[   29.460675]  ret_from_fork+0x116/0x1d0
[   29.460696]  ? __pfx_kthread+0x10/0x10
[   29.460719]  ret_from_fork_asm+0x1a/0x30
[   29.460751]  </TASK>
[   29.460764] 
[   29.471279] Allocated by task 314:
[   29.471505]  kasan_save_stack+0x45/0x70
[   29.471731]  kasan_save_track+0x18/0x40
[   29.472356]  kasan_save_alloc_info+0x3b/0x50
[   29.473010]  __kasan_kmalloc+0xb7/0xc0
[   29.473318]  __kmalloc_cache_noprof+0x189/0x420
[   29.473794]  kasan_atomics+0x95/0x310
[   29.474010]  kunit_try_run_case+0x1a5/0x480
[   29.474453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.474669]  kthread+0x337/0x6f0
[   29.475019]  ret_from_fork+0x116/0x1d0
[   29.475174]  ret_from_fork_asm+0x1a/0x30
[   29.475388] 
[   29.475542] The buggy address belongs to the object at ffff888106266f00
[   29.475542]  which belongs to the cache kmalloc-64 of size 64
[   29.476415] The buggy address is located 0 bytes to the right of
[   29.476415]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.477064] 
[   29.477178] The buggy address belongs to the physical page:
[   29.477621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.478161] flags: 0x200000000000000(node=0|zone=2)
[   29.478403] page_type: f5(slab)
[   29.478707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.479209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.479540] page dumped because: kasan: bad access detected
[   29.479909] 
[   29.480033] Memory state around the buggy address:
[   29.480456]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.480920]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.481254] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.481731]                                      ^
[   29.482100]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.482587]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.482914] ==================================================================
[   28.401968] ==================================================================
[   28.402591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   28.403013] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.403346] 
[   28.403431] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.403970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.403986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.404009] Call Trace:
[   28.404028]  <TASK>
[   28.404044]  dump_stack_lvl+0x73/0xb0
[   28.404089]  print_report+0xd1/0x640
[   28.404114]  ? __virt_addr_valid+0x1db/0x2d0
[   28.404140]  ? kasan_atomics_helper+0x4b6e/0x5450
[   28.404163]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.404191]  ? kasan_atomics_helper+0x4b6e/0x5450
[   28.404215]  kasan_report+0x141/0x180
[   28.404240]  ? kasan_atomics_helper+0x4b6e/0x5450
[   28.404268]  __asan_report_store4_noabort+0x1b/0x30
[   28.404295]  kasan_atomics_helper+0x4b6e/0x5450
[   28.404319]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.404343]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.404371]  ? kasan_atomics+0x152/0x310
[   28.404399]  kasan_atomics+0x1dc/0x310
[   28.404423]  ? __pfx_kasan_atomics+0x10/0x10
[   28.404449]  ? __pfx_read_tsc+0x10/0x10
[   28.404472]  ? ktime_get_ts64+0x86/0x230
[   28.404498]  kunit_try_run_case+0x1a5/0x480
[   28.404525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.404550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.404574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.404602]  ? __kthread_parkme+0x82/0x180
[   28.404624]  ? preempt_count_sub+0x50/0x80
[   28.404649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.404675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.404700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.404726]  kthread+0x337/0x6f0
[   28.404748]  ? trace_preempt_on+0x20/0xc0
[   28.404772]  ? __pfx_kthread+0x10/0x10
[   28.404865]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.404894]  ? calculate_sigpending+0x7b/0xa0
[   28.404921]  ? __pfx_kthread+0x10/0x10
[   28.404956]  ret_from_fork+0x116/0x1d0
[   28.404978]  ? __pfx_kthread+0x10/0x10
[   28.405001]  ret_from_fork_asm+0x1a/0x30
[   28.405034]  </TASK>
[   28.405047] 
[   28.417233] Allocated by task 314:
[   28.417568]  kasan_save_stack+0x45/0x70
[   28.417782]  kasan_save_track+0x18/0x40
[   28.418042]  kasan_save_alloc_info+0x3b/0x50
[   28.418487]  __kasan_kmalloc+0xb7/0xc0
[   28.418659]  __kmalloc_cache_noprof+0x189/0x420
[   28.419267]  kasan_atomics+0x95/0x310
[   28.419428]  kunit_try_run_case+0x1a5/0x480
[   28.419583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.419763]  kthread+0x337/0x6f0
[   28.419894]  ret_from_fork+0x116/0x1d0
[   28.420266]  ret_from_fork_asm+0x1a/0x30
[   28.420741] 
[   28.421216] The buggy address belongs to the object at ffff888106266f00
[   28.421216]  which belongs to the cache kmalloc-64 of size 64
[   28.421810] The buggy address is located 0 bytes to the right of
[   28.421810]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.422834] 
[   28.423155] The buggy address belongs to the physical page:
[   28.423717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.424337] flags: 0x200000000000000(node=0|zone=2)
[   28.424512] page_type: f5(slab)
[   28.424635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.424886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.425361] page dumped because: kasan: bad access detected
[   28.425579] 
[   28.425647] Memory state around the buggy address:
[   28.425873]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.426297]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.426610] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.426894]                                      ^
[   28.427138]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.427554]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.427956] ==================================================================
[   28.334993] ==================================================================
[   28.335894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   28.336853] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.337662] 
[   28.337940] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.338003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.338016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.338037] Call Trace:
[   28.338049]  <TASK>
[   28.338064]  dump_stack_lvl+0x73/0xb0
[   28.338104]  print_report+0xd1/0x640
[   28.338219]  ? __virt_addr_valid+0x1db/0x2d0
[   28.338249]  ? kasan_atomics_helper+0x4ba2/0x5450
[   28.338270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.338297]  ? kasan_atomics_helper+0x4ba2/0x5450
[   28.338321]  kasan_report+0x141/0x180
[   28.338344]  ? kasan_atomics_helper+0x4ba2/0x5450
[   28.338371]  __asan_report_store4_noabort+0x1b/0x30
[   28.338397]  kasan_atomics_helper+0x4ba2/0x5450
[   28.338421]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.338444]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.338471]  ? kasan_atomics+0x152/0x310
[   28.338499]  kasan_atomics+0x1dc/0x310
[   28.338523]  ? __pfx_kasan_atomics+0x10/0x10
[   28.338548]  ? __pfx_read_tsc+0x10/0x10
[   28.338571]  ? ktime_get_ts64+0x86/0x230
[   28.338595]  kunit_try_run_case+0x1a5/0x480
[   28.338620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.338644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.338667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.338694]  ? __kthread_parkme+0x82/0x180
[   28.338715]  ? preempt_count_sub+0x50/0x80
[   28.338740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.338765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.338812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.338838]  kthread+0x337/0x6f0
[   28.338860]  ? trace_preempt_on+0x20/0xc0
[   28.338884]  ? __pfx_kthread+0x10/0x10
[   28.338907]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.338932]  ? calculate_sigpending+0x7b/0xa0
[   28.338966]  ? __pfx_kthread+0x10/0x10
[   28.338988]  ret_from_fork+0x116/0x1d0
[   28.339008]  ? __pfx_kthread+0x10/0x10
[   28.339030]  ret_from_fork_asm+0x1a/0x30
[   28.339063]  </TASK>
[   28.339074] 
[   28.355004] Allocated by task 314:
[   28.355578]  kasan_save_stack+0x45/0x70
[   28.356005]  kasan_save_track+0x18/0x40
[   28.356528]  kasan_save_alloc_info+0x3b/0x50
[   28.357096]  __kasan_kmalloc+0xb7/0xc0
[   28.357478]  __kmalloc_cache_noprof+0x189/0x420
[   28.357780]  kasan_atomics+0x95/0x310
[   28.358328]  kunit_try_run_case+0x1a5/0x480
[   28.358549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.359320]  kthread+0x337/0x6f0
[   28.359459]  ret_from_fork+0x116/0x1d0
[   28.359595]  ret_from_fork_asm+0x1a/0x30
[   28.359734] 
[   28.359879] The buggy address belongs to the object at ffff888106266f00
[   28.359879]  which belongs to the cache kmalloc-64 of size 64
[   28.361566] The buggy address is located 0 bytes to the right of
[   28.361566]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.362921] 
[   28.363308] The buggy address belongs to the physical page:
[   28.363504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.363764] flags: 0x200000000000000(node=0|zone=2)
[   28.364548] page_type: f5(slab)
[   28.365011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.365864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.366541] page dumped because: kasan: bad access detected
[   28.366731] 
[   28.366930] Memory state around the buggy address:
[   28.367643]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.368453]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.369016] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.369744]                                      ^
[   28.370166]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.370718]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.371580] ==================================================================
[   29.116173] ==================================================================
[   29.116514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   29.116895] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.117280] 
[   29.117390] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.117438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.117451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.117472] Call Trace:
[   29.117486]  <TASK>
[   29.117501]  dump_stack_lvl+0x73/0xb0
[   29.117531]  print_report+0xd1/0x640
[   29.117577]  ? __virt_addr_valid+0x1db/0x2d0
[   29.117604]  ? kasan_atomics_helper+0x12e6/0x5450
[   29.117627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.117656]  ? kasan_atomics_helper+0x12e6/0x5450
[   29.117679]  kasan_report+0x141/0x180
[   29.117703]  ? kasan_atomics_helper+0x12e6/0x5450
[   29.117731]  kasan_check_range+0x10c/0x1c0
[   29.117979]  __kasan_check_write+0x18/0x20
[   29.118012]  kasan_atomics_helper+0x12e6/0x5450
[   29.118038]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.118084]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.118112]  ? kasan_atomics+0x152/0x310
[   29.118140]  kasan_atomics+0x1dc/0x310
[   29.118166]  ? __pfx_kasan_atomics+0x10/0x10
[   29.118191]  ? __pfx_read_tsc+0x10/0x10
[   29.118215]  ? ktime_get_ts64+0x86/0x230
[   29.118240]  kunit_try_run_case+0x1a5/0x480
[   29.118267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.118291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.118314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.118342]  ? __kthread_parkme+0x82/0x180
[   29.118364]  ? preempt_count_sub+0x50/0x80
[   29.118389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.118416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.118442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.118468]  kthread+0x337/0x6f0
[   29.118490]  ? trace_preempt_on+0x20/0xc0
[   29.118533]  ? __pfx_kthread+0x10/0x10
[   29.118556]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.118582]  ? calculate_sigpending+0x7b/0xa0
[   29.118608]  ? __pfx_kthread+0x10/0x10
[   29.118631]  ret_from_fork+0x116/0x1d0
[   29.118653]  ? __pfx_kthread+0x10/0x10
[   29.118676]  ret_from_fork_asm+0x1a/0x30
[   29.118708]  </TASK>
[   29.118721] 
[   29.127232] Allocated by task 314:
[   29.127397]  kasan_save_stack+0x45/0x70
[   29.127545]  kasan_save_track+0x18/0x40
[   29.127681]  kasan_save_alloc_info+0x3b/0x50
[   29.127894]  __kasan_kmalloc+0xb7/0xc0
[   29.128249]  __kmalloc_cache_noprof+0x189/0x420
[   29.128505]  kasan_atomics+0x95/0x310
[   29.128663]  kunit_try_run_case+0x1a5/0x480
[   29.128951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.129164]  kthread+0x337/0x6f0
[   29.129290]  ret_from_fork+0x116/0x1d0
[   29.129425]  ret_from_fork_asm+0x1a/0x30
[   29.129566] 
[   29.129662] The buggy address belongs to the object at ffff888106266f00
[   29.129662]  which belongs to the cache kmalloc-64 of size 64
[   29.130500] The buggy address is located 0 bytes to the right of
[   29.130500]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.131212] 
[   29.131319] The buggy address belongs to the physical page:
[   29.131580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.132137] flags: 0x200000000000000(node=0|zone=2)
[   29.132340] page_type: f5(slab)
[   29.132497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.132977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.133291] page dumped because: kasan: bad access detected
[   29.133530] 
[   29.133623] Memory state around the buggy address:
[   29.134012]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.134352]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.134629] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.135098]                                      ^
[   29.135293]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.135630]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.135972] ==================================================================
[   28.751463] ==================================================================
[   28.751703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   28.752856] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.754070] 
[   28.754412] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.754470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.754484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.754505] Call Trace:
[   28.754522]  <TASK>
[   28.754539]  dump_stack_lvl+0x73/0xb0
[   28.754570]  print_report+0xd1/0x640
[   28.754595]  ? __virt_addr_valid+0x1db/0x2d0
[   28.754621]  ? kasan_atomics_helper+0xb6a/0x5450
[   28.754644]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.754672]  ? kasan_atomics_helper+0xb6a/0x5450
[   28.754696]  kasan_report+0x141/0x180
[   28.754719]  ? kasan_atomics_helper+0xb6a/0x5450
[   28.754747]  kasan_check_range+0x10c/0x1c0
[   28.754772]  __kasan_check_write+0x18/0x20
[   28.754927]  kasan_atomics_helper+0xb6a/0x5450
[   28.754980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.755005]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.755033]  ? kasan_atomics+0x152/0x310
[   28.755094]  kasan_atomics+0x1dc/0x310
[   28.755119]  ? __pfx_kasan_atomics+0x10/0x10
[   28.755145]  ? __pfx_read_tsc+0x10/0x10
[   28.755170]  ? ktime_get_ts64+0x86/0x230
[   28.755196]  kunit_try_run_case+0x1a5/0x480
[   28.755223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.755248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.755271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.755300]  ? __kthread_parkme+0x82/0x180
[   28.755322]  ? preempt_count_sub+0x50/0x80
[   28.755346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.755372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.755398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.755424]  kthread+0x337/0x6f0
[   28.755446]  ? trace_preempt_on+0x20/0xc0
[   28.755472]  ? __pfx_kthread+0x10/0x10
[   28.755494]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.755521]  ? calculate_sigpending+0x7b/0xa0
[   28.755546]  ? __pfx_kthread+0x10/0x10
[   28.755570]  ret_from_fork+0x116/0x1d0
[   28.755591]  ? __pfx_kthread+0x10/0x10
[   28.755614]  ret_from_fork_asm+0x1a/0x30
[   28.755647]  </TASK>
[   28.755660] 
[   28.773528] Allocated by task 314:
[   28.773673]  kasan_save_stack+0x45/0x70
[   28.774141]  kasan_save_track+0x18/0x40
[   28.774717]  kasan_save_alloc_info+0x3b/0x50
[   28.775459]  __kasan_kmalloc+0xb7/0xc0
[   28.775906]  __kmalloc_cache_noprof+0x189/0x420
[   28.776545]  kasan_atomics+0x95/0x310
[   28.776706]  kunit_try_run_case+0x1a5/0x480
[   28.777242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.777935]  kthread+0x337/0x6f0
[   28.778489]  ret_from_fork+0x116/0x1d0
[   28.779019]  ret_from_fork_asm+0x1a/0x30
[   28.779219] 
[   28.779292] The buggy address belongs to the object at ffff888106266f00
[   28.779292]  which belongs to the cache kmalloc-64 of size 64
[   28.779659] The buggy address is located 0 bytes to the right of
[   28.779659]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.781339] 
[   28.781559] The buggy address belongs to the physical page:
[   28.782292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.783411] flags: 0x200000000000000(node=0|zone=2)
[   28.784100] page_type: f5(slab)
[   28.784277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.784517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.784751] page dumped because: kasan: bad access detected
[   28.785729] 
[   28.785919] Memory state around the buggy address:
[   28.786635]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.787496]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.788180] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.788999]                                      ^
[   28.789413]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.789647]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.790298] ==================================================================
[   28.531517] ==================================================================
[   28.531897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   28.532279] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.532589] 
[   28.532680] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.532727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.532741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.532763] Call Trace:
[   28.532779]  <TASK>
[   28.532935]  dump_stack_lvl+0x73/0xb0
[   28.532983]  print_report+0xd1/0x640
[   28.533009]  ? __virt_addr_valid+0x1db/0x2d0
[   28.533035]  ? kasan_atomics_helper+0x5fe/0x5450
[   28.533068]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.533097]  ? kasan_atomics_helper+0x5fe/0x5450
[   28.533121]  kasan_report+0x141/0x180
[   28.533149]  ? kasan_atomics_helper+0x5fe/0x5450
[   28.533177]  kasan_check_range+0x10c/0x1c0
[   28.533203]  __kasan_check_write+0x18/0x20
[   28.533228]  kasan_atomics_helper+0x5fe/0x5450
[   28.533253]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.533276]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.533302]  ? kasan_atomics+0x152/0x310
[   28.533330]  kasan_atomics+0x1dc/0x310
[   28.533354]  ? __pfx_kasan_atomics+0x10/0x10
[   28.533379]  ? __pfx_read_tsc+0x10/0x10
[   28.533404]  ? ktime_get_ts64+0x86/0x230
[   28.533429]  kunit_try_run_case+0x1a5/0x480
[   28.533455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.533480]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.533503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.533531]  ? __kthread_parkme+0x82/0x180
[   28.533553]  ? preempt_count_sub+0x50/0x80
[   28.533578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.533604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.533630]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.533656]  kthread+0x337/0x6f0
[   28.533677]  ? trace_preempt_on+0x20/0xc0
[   28.533702]  ? __pfx_kthread+0x10/0x10
[   28.533724]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.533750]  ? calculate_sigpending+0x7b/0xa0
[   28.533775]  ? __pfx_kthread+0x10/0x10
[   28.533852]  ret_from_fork+0x116/0x1d0
[   28.533873]  ? __pfx_kthread+0x10/0x10
[   28.533897]  ret_from_fork_asm+0x1a/0x30
[   28.533929]  </TASK>
[   28.533942] 
[   28.542372] Allocated by task 314:
[   28.542504]  kasan_save_stack+0x45/0x70
[   28.542650]  kasan_save_track+0x18/0x40
[   28.542927]  kasan_save_alloc_info+0x3b/0x50
[   28.543310]  __kasan_kmalloc+0xb7/0xc0
[   28.543513]  __kmalloc_cache_noprof+0x189/0x420
[   28.543691]  kasan_atomics+0x95/0x310
[   28.543824]  kunit_try_run_case+0x1a5/0x480
[   28.543984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.544165]  kthread+0x337/0x6f0
[   28.544286]  ret_from_fork+0x116/0x1d0
[   28.544418]  ret_from_fork_asm+0x1a/0x30
[   28.544558] 
[   28.544625] The buggy address belongs to the object at ffff888106266f00
[   28.544625]  which belongs to the cache kmalloc-64 of size 64
[   28.545231] The buggy address is located 0 bytes to the right of
[   28.545231]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.545868] 
[   28.545982] The buggy address belongs to the physical page:
[   28.546483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.546940] flags: 0x200000000000000(node=0|zone=2)
[   28.547191] page_type: f5(slab)
[   28.547505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.548253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.548508] page dumped because: kasan: bad access detected
[   28.548684] 
[   28.548752] Memory state around the buggy address:
[   28.549357]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.549710]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.550261] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.550519]                                      ^
[   28.550680]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.550981]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.551370] ==================================================================
[   29.361652] ==================================================================
[   29.361876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   29.362394] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.362741] 
[   29.362850] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.362898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.362912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.362933] Call Trace:
[   29.362958]  <TASK>
[   29.362973]  dump_stack_lvl+0x73/0xb0
[   29.363002]  print_report+0xd1/0x640
[   29.363027]  ? __virt_addr_valid+0x1db/0x2d0
[   29.363052]  ? kasan_atomics_helper+0x1818/0x5450
[   29.363170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.363198]  ? kasan_atomics_helper+0x1818/0x5450
[   29.363221]  kasan_report+0x141/0x180
[   29.363246]  ? kasan_atomics_helper+0x1818/0x5450
[   29.363275]  kasan_check_range+0x10c/0x1c0
[   29.363301]  __kasan_check_write+0x18/0x20
[   29.363326]  kasan_atomics_helper+0x1818/0x5450
[   29.363351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.363374]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.363400]  ? kasan_atomics+0x152/0x310
[   29.363428]  kasan_atomics+0x1dc/0x310
[   29.363453]  ? __pfx_kasan_atomics+0x10/0x10
[   29.363478]  ? __pfx_read_tsc+0x10/0x10
[   29.363502]  ? ktime_get_ts64+0x86/0x230
[   29.363528]  kunit_try_run_case+0x1a5/0x480
[   29.363553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.363577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.363601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.363630]  ? __kthread_parkme+0x82/0x180
[   29.363652]  ? preempt_count_sub+0x50/0x80
[   29.363677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.363702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.363728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.363754]  kthread+0x337/0x6f0
[   29.363776]  ? trace_preempt_on+0x20/0xc0
[   29.363957]  ? __pfx_kthread+0x10/0x10
[   29.363985]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.364012]  ? calculate_sigpending+0x7b/0xa0
[   29.364038]  ? __pfx_kthread+0x10/0x10
[   29.364061]  ret_from_fork+0x116/0x1d0
[   29.364083]  ? __pfx_kthread+0x10/0x10
[   29.364106]  ret_from_fork_asm+0x1a/0x30
[   29.364138]  </TASK>
[   29.364151] 
[   29.373955] Allocated by task 314:
[   29.374606]  kasan_save_stack+0x45/0x70
[   29.374828]  kasan_save_track+0x18/0x40
[   29.374978]  kasan_save_alloc_info+0x3b/0x50
[   29.375699]  __kasan_kmalloc+0xb7/0xc0
[   29.376013]  __kmalloc_cache_noprof+0x189/0x420
[   29.376463]  kasan_atomics+0x95/0x310
[   29.376643]  kunit_try_run_case+0x1a5/0x480
[   29.377021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.377257]  kthread+0x337/0x6f0
[   29.377404]  ret_from_fork+0x116/0x1d0
[   29.377571]  ret_from_fork_asm+0x1a/0x30
[   29.377755] 
[   29.378331] The buggy address belongs to the object at ffff888106266f00
[   29.378331]  which belongs to the cache kmalloc-64 of size 64
[   29.378777] The buggy address is located 0 bytes to the right of
[   29.378777]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.379398] 
[   29.379485] The buggy address belongs to the physical page:
[   29.379704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.380542] flags: 0x200000000000000(node=0|zone=2)
[   29.380781] page_type: f5(slab)
[   29.381391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.381767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.382219] page dumped because: kasan: bad access detected
[   29.382408] 
[   29.382478] Memory state around the buggy address:
[   29.382640]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.382866]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.383696] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.384394]                                      ^
[   29.384570]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.384805]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.385037] ==================================================================
[   28.428554] ==================================================================
[   28.428985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   28.429296] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.429613] 
[   28.429719] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.429767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.429780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.429802] Call Trace:
[   28.429818]  <TASK>
[   28.429833]  dump_stack_lvl+0x73/0xb0
[   28.429862]  print_report+0xd1/0x640
[   28.429886]  ? __virt_addr_valid+0x1db/0x2d0
[   28.429911]  ? kasan_atomics_helper+0x3df/0x5450
[   28.429934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.430055]  ? kasan_atomics_helper+0x3df/0x5450
[   28.430082]  kasan_report+0x141/0x180
[   28.430107]  ? kasan_atomics_helper+0x3df/0x5450
[   28.430135]  kasan_check_range+0x10c/0x1c0
[   28.430159]  __kasan_check_read+0x15/0x20
[   28.430184]  kasan_atomics_helper+0x3df/0x5450
[   28.430209]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.430232]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.430260]  ? kasan_atomics+0x152/0x310
[   28.430302]  kasan_atomics+0x1dc/0x310
[   28.430328]  ? __pfx_kasan_atomics+0x10/0x10
[   28.430354]  ? __pfx_read_tsc+0x10/0x10
[   28.430379]  ? ktime_get_ts64+0x86/0x230
[   28.430405]  kunit_try_run_case+0x1a5/0x480
[   28.430430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.430455]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.430480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.430508]  ? __kthread_parkme+0x82/0x180
[   28.430530]  ? preempt_count_sub+0x50/0x80
[   28.430554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.430580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.430606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.430632]  kthread+0x337/0x6f0
[   28.430654]  ? trace_preempt_on+0x20/0xc0
[   28.430678]  ? __pfx_kthread+0x10/0x10
[   28.430701]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.430727]  ? calculate_sigpending+0x7b/0xa0
[   28.430752]  ? __pfx_kthread+0x10/0x10
[   28.430776]  ret_from_fork+0x116/0x1d0
[   28.430921]  ? __pfx_kthread+0x10/0x10
[   28.430960]  ret_from_fork_asm+0x1a/0x30
[   28.430994]  </TASK>
[   28.431005] 
[   28.438874] Allocated by task 314:
[   28.439199]  kasan_save_stack+0x45/0x70
[   28.439427]  kasan_save_track+0x18/0x40
[   28.439621]  kasan_save_alloc_info+0x3b/0x50
[   28.439926]  __kasan_kmalloc+0xb7/0xc0
[   28.440190]  __kmalloc_cache_noprof+0x189/0x420
[   28.440369]  kasan_atomics+0x95/0x310
[   28.440543]  kunit_try_run_case+0x1a5/0x480
[   28.440689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.441133]  kthread+0x337/0x6f0
[   28.441312]  ret_from_fork+0x116/0x1d0
[   28.441568]  ret_from_fork_asm+0x1a/0x30
[   28.441746] 
[   28.441837] The buggy address belongs to the object at ffff888106266f00
[   28.441837]  which belongs to the cache kmalloc-64 of size 64
[   28.442340] The buggy address is located 0 bytes to the right of
[   28.442340]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.443052] 
[   28.443165] The buggy address belongs to the physical page:
[   28.443375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.443708] flags: 0x200000000000000(node=0|zone=2)
[   28.443875] page_type: f5(slab)
[   28.444009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.444248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.444485] page dumped because: kasan: bad access detected
[   28.444922] 
[   28.445023] Memory state around the buggy address:
[   28.445323]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.445722]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.446242] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.446510]                                      ^
[   28.446667]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.447157]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.447477] ==================================================================
[   28.570426] ==================================================================
[   28.570884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   28.571403] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.571650] 
[   28.571730] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.571777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.571840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.571864] Call Trace:
[   28.571879]  <TASK>
[   28.571895]  dump_stack_lvl+0x73/0xb0
[   28.571924]  print_report+0xd1/0x640
[   28.571962]  ? __virt_addr_valid+0x1db/0x2d0
[   28.571988]  ? kasan_atomics_helper+0x72f/0x5450
[   28.572011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.572039]  ? kasan_atomics_helper+0x72f/0x5450
[   28.572074]  kasan_report+0x141/0x180
[   28.572099]  ? kasan_atomics_helper+0x72f/0x5450
[   28.572127]  kasan_check_range+0x10c/0x1c0
[   28.572152]  __kasan_check_write+0x18/0x20
[   28.572178]  kasan_atomics_helper+0x72f/0x5450
[   28.572202]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.572227]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.572253]  ? kasan_atomics+0x152/0x310
[   28.572280]  kasan_atomics+0x1dc/0x310
[   28.572305]  ? __pfx_kasan_atomics+0x10/0x10
[   28.572331]  ? __pfx_read_tsc+0x10/0x10
[   28.572354]  ? ktime_get_ts64+0x86/0x230
[   28.572379]  kunit_try_run_case+0x1a5/0x480
[   28.572406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.572431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.572455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.572482]  ? __kthread_parkme+0x82/0x180
[   28.572504]  ? preempt_count_sub+0x50/0x80
[   28.572529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.572555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.572582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.572608]  kthread+0x337/0x6f0
[   28.572630]  ? trace_preempt_on+0x20/0xc0
[   28.572654]  ? __pfx_kthread+0x10/0x10
[   28.572677]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.572703]  ? calculate_sigpending+0x7b/0xa0
[   28.572728]  ? __pfx_kthread+0x10/0x10
[   28.572751]  ret_from_fork+0x116/0x1d0
[   28.572772]  ? __pfx_kthread+0x10/0x10
[   28.572847]  ret_from_fork_asm+0x1a/0x30
[   28.572881]  </TASK>
[   28.572893] 
[   28.581570] Allocated by task 314:
[   28.581716]  kasan_save_stack+0x45/0x70
[   28.582050]  kasan_save_track+0x18/0x40
[   28.582229]  kasan_save_alloc_info+0x3b/0x50
[   28.582387]  __kasan_kmalloc+0xb7/0xc0
[   28.582520]  __kmalloc_cache_noprof+0x189/0x420
[   28.582692]  kasan_atomics+0x95/0x310
[   28.582999]  kunit_try_run_case+0x1a5/0x480
[   28.583401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.583599]  kthread+0x337/0x6f0
[   28.583719]  ret_from_fork+0x116/0x1d0
[   28.583856]  ret_from_fork_asm+0x1a/0x30
[   28.584069] 
[   28.584289] The buggy address belongs to the object at ffff888106266f00
[   28.584289]  which belongs to the cache kmalloc-64 of size 64
[   28.584830] The buggy address is located 0 bytes to the right of
[   28.584830]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.585373] 
[   28.585475] The buggy address belongs to the physical page:
[   28.585712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.585974] flags: 0x200000000000000(node=0|zone=2)
[   28.586141] page_type: f5(slab)
[   28.586263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.586499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.586731] page dumped because: kasan: bad access detected
[   28.586906] 
[   28.586996] Memory state around the buggy address:
[   28.587222]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.587567]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.587892] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.588427]                                      ^
[   28.588654]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.589131]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.589461] ==================================================================
[   28.987578] ==================================================================
[   28.987918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   28.988571] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.989108] 
[   28.989268] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.989319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.989333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.989355] Call Trace:
[   28.989407]  <TASK>
[   28.989423]  dump_stack_lvl+0x73/0xb0
[   28.989452]  print_report+0xd1/0x640
[   28.989476]  ? __virt_addr_valid+0x1db/0x2d0
[   28.989501]  ? kasan_atomics_helper+0x1079/0x5450
[   28.989556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.989585]  ? kasan_atomics_helper+0x1079/0x5450
[   28.989609]  kasan_report+0x141/0x180
[   28.989633]  ? kasan_atomics_helper+0x1079/0x5450
[   28.989686]  kasan_check_range+0x10c/0x1c0
[   28.989712]  __kasan_check_write+0x18/0x20
[   28.989738]  kasan_atomics_helper+0x1079/0x5450
[   28.989763]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.989841]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.989906]  ? kasan_atomics+0x152/0x310
[   28.989935]  kasan_atomics+0x1dc/0x310
[   28.989972]  ? __pfx_kasan_atomics+0x10/0x10
[   28.989998]  ? __pfx_read_tsc+0x10/0x10
[   28.990068]  ? ktime_get_ts64+0x86/0x230
[   28.990095]  kunit_try_run_case+0x1a5/0x480
[   28.990122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.990146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.990170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.990233]  ? __kthread_parkme+0x82/0x180
[   28.990256]  ? preempt_count_sub+0x50/0x80
[   28.990282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.990309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.990335]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.990362]  kthread+0x337/0x6f0
[   28.990383]  ? trace_preempt_on+0x20/0xc0
[   28.990409]  ? __pfx_kthread+0x10/0x10
[   28.990431]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.990458]  ? calculate_sigpending+0x7b/0xa0
[   28.990484]  ? __pfx_kthread+0x10/0x10
[   28.990507]  ret_from_fork+0x116/0x1d0
[   28.990528]  ? __pfx_kthread+0x10/0x10
[   28.990551]  ret_from_fork_asm+0x1a/0x30
[   28.990584]  </TASK>
[   28.990597] 
[   29.001036] Allocated by task 314:
[   29.001237]  kasan_save_stack+0x45/0x70
[   29.001440]  kasan_save_track+0x18/0x40
[   29.001663]  kasan_save_alloc_info+0x3b/0x50
[   29.002013]  __kasan_kmalloc+0xb7/0xc0
[   29.002241]  __kmalloc_cache_noprof+0x189/0x420
[   29.002449]  kasan_atomics+0x95/0x310
[   29.002613]  kunit_try_run_case+0x1a5/0x480
[   29.003029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.003341]  kthread+0x337/0x6f0
[   29.003532]  ret_from_fork+0x116/0x1d0
[   29.003763]  ret_from_fork_asm+0x1a/0x30
[   29.004098] 
[   29.004176] The buggy address belongs to the object at ffff888106266f00
[   29.004176]  which belongs to the cache kmalloc-64 of size 64
[   29.004678] The buggy address is located 0 bytes to the right of
[   29.004678]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.005211] 
[   29.005282] The buggy address belongs to the physical page:
[   29.005460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.006191] flags: 0x200000000000000(node=0|zone=2)
[   29.006433] page_type: f5(slab)
[   29.006638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.007340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.007601] page dumped because: kasan: bad access detected
[   29.007778] 
[   29.007845] Memory state around the buggy address:
[   29.008084]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.008510]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.009455] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.009856]                                      ^
[   29.010219]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.010557]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.011034] ==================================================================
[   28.298506] ==================================================================
[   28.299301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   28.299865] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.300678] 
[   28.300983] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.301038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.301077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.301099] Call Trace:
[   28.301112]  <TASK>
[   28.301136]  dump_stack_lvl+0x73/0xb0
[   28.301170]  print_report+0xd1/0x640
[   28.301197]  ? __virt_addr_valid+0x1db/0x2d0
[   28.301328]  ? kasan_atomics_helper+0x4bbc/0x5450
[   28.301350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.301378]  ? kasan_atomics_helper+0x4bbc/0x5450
[   28.301401]  kasan_report+0x141/0x180
[   28.301424]  ? kasan_atomics_helper+0x4bbc/0x5450
[   28.301453]  __asan_report_load4_noabort+0x18/0x20
[   28.301479]  kasan_atomics_helper+0x4bbc/0x5450
[   28.301502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.301526]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.301551]  ? kasan_atomics+0x152/0x310
[   28.301579]  kasan_atomics+0x1dc/0x310
[   28.301602]  ? __pfx_kasan_atomics+0x10/0x10
[   28.301627]  ? __pfx_read_tsc+0x10/0x10
[   28.301651]  ? ktime_get_ts64+0x86/0x230
[   28.301676]  kunit_try_run_case+0x1a5/0x480
[   28.301703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.301726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.301750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.301797]  ? __kthread_parkme+0x82/0x180
[   28.301822]  ? preempt_count_sub+0x50/0x80
[   28.301848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.301873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.301898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.301923]  kthread+0x337/0x6f0
[   28.301952]  ? trace_preempt_on+0x20/0xc0
[   28.301977]  ? __pfx_kthread+0x10/0x10
[   28.301998]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.302023]  ? calculate_sigpending+0x7b/0xa0
[   28.302064]  ? __pfx_kthread+0x10/0x10
[   28.302086]  ret_from_fork+0x116/0x1d0
[   28.302107]  ? __pfx_kthread+0x10/0x10
[   28.302128]  ret_from_fork_asm+0x1a/0x30
[   28.302162]  </TASK>
[   28.302173] 
[   28.318587] Allocated by task 314:
[   28.319010]  kasan_save_stack+0x45/0x70
[   28.319540]  kasan_save_track+0x18/0x40
[   28.320019]  kasan_save_alloc_info+0x3b/0x50
[   28.320429]  __kasan_kmalloc+0xb7/0xc0
[   28.320572]  __kmalloc_cache_noprof+0x189/0x420
[   28.320730]  kasan_atomics+0x95/0x310
[   28.321014]  kunit_try_run_case+0x1a5/0x480
[   28.321651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.322251]  kthread+0x337/0x6f0
[   28.322662]  ret_from_fork+0x116/0x1d0
[   28.323144]  ret_from_fork_asm+0x1a/0x30
[   28.323593] 
[   28.323752] The buggy address belongs to the object at ffff888106266f00
[   28.323752]  which belongs to the cache kmalloc-64 of size 64
[   28.324593] The buggy address is located 0 bytes to the right of
[   28.324593]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.324997] 
[   28.325100] The buggy address belongs to the physical page:
[   28.325891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.326892] flags: 0x200000000000000(node=0|zone=2)
[   28.327462] page_type: f5(slab)
[   28.327913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.328791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.329698] page dumped because: kasan: bad access detected
[   28.330358] 
[   28.330623] Memory state around the buggy address:
[   28.331195]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.331633]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.332457] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.333114]                                      ^
[   28.333570]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.334308]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.334535] ==================================================================
[   28.551724] ==================================================================
[   28.552148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   28.552557] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.552853] 
[   28.552966] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.553014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.553027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.553049] Call Trace:
[   28.553079]  <TASK>
[   28.553095]  dump_stack_lvl+0x73/0xb0
[   28.553129]  print_report+0xd1/0x640
[   28.553153]  ? __virt_addr_valid+0x1db/0x2d0
[   28.553178]  ? kasan_atomics_helper+0x697/0x5450
[   28.553201]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.553229]  ? kasan_atomics_helper+0x697/0x5450
[   28.553253]  kasan_report+0x141/0x180
[   28.553277]  ? kasan_atomics_helper+0x697/0x5450
[   28.553305]  kasan_check_range+0x10c/0x1c0
[   28.553331]  __kasan_check_write+0x18/0x20
[   28.553357]  kasan_atomics_helper+0x697/0x5450
[   28.553382]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.553406]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.553432]  ? kasan_atomics+0x152/0x310
[   28.553459]  kasan_atomics+0x1dc/0x310
[   28.553483]  ? __pfx_kasan_atomics+0x10/0x10
[   28.553510]  ? __pfx_read_tsc+0x10/0x10
[   28.553533]  ? ktime_get_ts64+0x86/0x230
[   28.553559]  kunit_try_run_case+0x1a5/0x480
[   28.553585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.553609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.553634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.553662]  ? __kthread_parkme+0x82/0x180
[   28.553684]  ? preempt_count_sub+0x50/0x80
[   28.553708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.553735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.553761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.553787]  kthread+0x337/0x6f0
[   28.553808]  ? trace_preempt_on+0x20/0xc0
[   28.553832]  ? __pfx_kthread+0x10/0x10
[   28.553854]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.553880]  ? calculate_sigpending+0x7b/0xa0
[   28.553906]  ? __pfx_kthread+0x10/0x10
[   28.553929]  ret_from_fork+0x116/0x1d0
[   28.553959]  ? __pfx_kthread+0x10/0x10
[   28.553981]  ret_from_fork_asm+0x1a/0x30
[   28.554014]  </TASK>
[   28.554026] 
[   28.562388] Allocated by task 314:
[   28.562569]  kasan_save_stack+0x45/0x70
[   28.562740]  kasan_save_track+0x18/0x40
[   28.563056]  kasan_save_alloc_info+0x3b/0x50
[   28.563339]  __kasan_kmalloc+0xb7/0xc0
[   28.563480]  __kmalloc_cache_noprof+0x189/0x420
[   28.563636]  kasan_atomics+0x95/0x310
[   28.563769]  kunit_try_run_case+0x1a5/0x480
[   28.564075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.564335]  kthread+0x337/0x6f0
[   28.564502]  ret_from_fork+0x116/0x1d0
[   28.564688]  ret_from_fork_asm+0x1a/0x30
[   28.564856] 
[   28.564952] The buggy address belongs to the object at ffff888106266f00
[   28.564952]  which belongs to the cache kmalloc-64 of size 64
[   28.565508] The buggy address is located 0 bytes to the right of
[   28.565508]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.565895] 
[   28.565990] The buggy address belongs to the physical page:
[   28.566344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.566961] flags: 0x200000000000000(node=0|zone=2)
[   28.567268] page_type: f5(slab)
[   28.567427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.567695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.568035] page dumped because: kasan: bad access detected
[   28.568317] 
[   28.568383] Memory state around the buggy address:
[   28.568539]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.568758]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.568989] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.569212]                                      ^
[   28.569368]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.569672]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.569994] ==================================================================
[   28.589963] ==================================================================
[   28.590634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   28.591043] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.591323] 
[   28.591407] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.591454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.591468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.591490] Call Trace:
[   28.591505]  <TASK>
[   28.591521]  dump_stack_lvl+0x73/0xb0
[   28.591549]  print_report+0xd1/0x640
[   28.591573]  ? __virt_addr_valid+0x1db/0x2d0
[   28.591598]  ? kasan_atomics_helper+0x7c7/0x5450
[   28.591621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.591650]  ? kasan_atomics_helper+0x7c7/0x5450
[   28.591674]  kasan_report+0x141/0x180
[   28.591699]  ? kasan_atomics_helper+0x7c7/0x5450
[   28.591728]  kasan_check_range+0x10c/0x1c0
[   28.591754]  __kasan_check_write+0x18/0x20
[   28.591780]  kasan_atomics_helper+0x7c7/0x5450
[   28.591862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.591887]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.591914]  ? kasan_atomics+0x152/0x310
[   28.591953]  kasan_atomics+0x1dc/0x310
[   28.591979]  ? __pfx_kasan_atomics+0x10/0x10
[   28.592005]  ? __pfx_read_tsc+0x10/0x10
[   28.592029]  ? ktime_get_ts64+0x86/0x230
[   28.592063]  kunit_try_run_case+0x1a5/0x480
[   28.592088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.592113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.592136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.592164]  ? __kthread_parkme+0x82/0x180
[   28.592187]  ? preempt_count_sub+0x50/0x80
[   28.592212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.592239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.592265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.592291]  kthread+0x337/0x6f0
[   28.592313]  ? trace_preempt_on+0x20/0xc0
[   28.592337]  ? __pfx_kthread+0x10/0x10
[   28.592360]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.592385]  ? calculate_sigpending+0x7b/0xa0
[   28.592411]  ? __pfx_kthread+0x10/0x10
[   28.592434]  ret_from_fork+0x116/0x1d0
[   28.592456]  ? __pfx_kthread+0x10/0x10
[   28.592479]  ret_from_fork_asm+0x1a/0x30
[   28.592512]  </TASK>
[   28.592524] 
[   28.600459] Allocated by task 314:
[   28.600614]  kasan_save_stack+0x45/0x70
[   28.600772]  kasan_save_track+0x18/0x40
[   28.600907]  kasan_save_alloc_info+0x3b/0x50
[   28.601129]  __kasan_kmalloc+0xb7/0xc0
[   28.601332]  __kmalloc_cache_noprof+0x189/0x420
[   28.601554]  kasan_atomics+0x95/0x310
[   28.601705]  kunit_try_run_case+0x1a5/0x480
[   28.601916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.602233]  kthread+0x337/0x6f0
[   28.602361]  ret_from_fork+0x116/0x1d0
[   28.602504]  ret_from_fork_asm+0x1a/0x30
[   28.602705] 
[   28.602797] The buggy address belongs to the object at ffff888106266f00
[   28.602797]  which belongs to the cache kmalloc-64 of size 64
[   28.603307] The buggy address is located 0 bytes to the right of
[   28.603307]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.603788] 
[   28.603884] The buggy address belongs to the physical page:
[   28.604173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.604495] flags: 0x200000000000000(node=0|zone=2)
[   28.604710] page_type: f5(slab)
[   28.604844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.605390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.605634] page dumped because: kasan: bad access detected
[   28.605824] 
[   28.605914] Memory state around the buggy address:
[   28.606290]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.606621]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.607031] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.607403]                                      ^
[   28.607619]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.608061]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.608451] ==================================================================
[   28.888484] ==================================================================
[   28.888715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   28.889331] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.889691] 
[   28.889793] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.889840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.889860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.889881] Call Trace:
[   28.889895]  <TASK>
[   28.889910]  dump_stack_lvl+0x73/0xb0
[   28.889939]  print_report+0xd1/0x640
[   28.889974]  ? __virt_addr_valid+0x1db/0x2d0
[   28.889999]  ? kasan_atomics_helper+0xe78/0x5450
[   28.890021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.890049]  ? kasan_atomics_helper+0xe78/0x5450
[   28.890082]  kasan_report+0x141/0x180
[   28.890106]  ? kasan_atomics_helper+0xe78/0x5450
[   28.890134]  kasan_check_range+0x10c/0x1c0
[   28.890160]  __kasan_check_write+0x18/0x20
[   28.890185]  kasan_atomics_helper+0xe78/0x5450
[   28.890210]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.890234]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.890260]  ? kasan_atomics+0x152/0x310
[   28.890288]  kasan_atomics+0x1dc/0x310
[   28.890312]  ? __pfx_kasan_atomics+0x10/0x10
[   28.890338]  ? __pfx_read_tsc+0x10/0x10
[   28.890362]  ? ktime_get_ts64+0x86/0x230
[   28.890388]  kunit_try_run_case+0x1a5/0x480
[   28.890414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.890438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.890463]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.890491]  ? __kthread_parkme+0x82/0x180
[   28.890513]  ? preempt_count_sub+0x50/0x80
[   28.890538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.890564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.890589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.890615]  kthread+0x337/0x6f0
[   28.890637]  ? trace_preempt_on+0x20/0xc0
[   28.890662]  ? __pfx_kthread+0x10/0x10
[   28.890686]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.890712]  ? calculate_sigpending+0x7b/0xa0
[   28.890737]  ? __pfx_kthread+0x10/0x10
[   28.890760]  ret_from_fork+0x116/0x1d0
[   28.890781]  ? __pfx_kthread+0x10/0x10
[   28.890815]  ret_from_fork_asm+0x1a/0x30
[   28.890848]  </TASK>
[   28.890862] 
[   28.899378] Allocated by task 314:
[   28.899559]  kasan_save_stack+0x45/0x70
[   28.899804]  kasan_save_track+0x18/0x40
[   28.900179]  kasan_save_alloc_info+0x3b/0x50
[   28.900334]  __kasan_kmalloc+0xb7/0xc0
[   28.900466]  __kmalloc_cache_noprof+0x189/0x420
[   28.900622]  kasan_atomics+0x95/0x310
[   28.900831]  kunit_try_run_case+0x1a5/0x480
[   28.901055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.901368]  kthread+0x337/0x6f0
[   28.901536]  ret_from_fork+0x116/0x1d0
[   28.901724]  ret_from_fork_asm+0x1a/0x30
[   28.901988] 
[   28.902080] The buggy address belongs to the object at ffff888106266f00
[   28.902080]  which belongs to the cache kmalloc-64 of size 64
[   28.902557] The buggy address is located 0 bytes to the right of
[   28.902557]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.903246] 
[   28.903344] The buggy address belongs to the physical page:
[   28.903553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.903897] flags: 0x200000000000000(node=0|zone=2)
[   28.904293] page_type: f5(slab)
[   28.904421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.904735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.905199] page dumped because: kasan: bad access detected
[   28.905467] 
[   28.905559] Memory state around the buggy address:
[   28.905774]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.906229]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.906514] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.906730]                                      ^
[   28.907120]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.907477]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.907754] ==================================================================
[   28.941176] ==================================================================
[   28.941524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   28.942039] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.942564] 
[   28.942675] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.942724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.942738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.942760] Call Trace:
[   28.942889]  <TASK>
[   28.942905]  dump_stack_lvl+0x73/0xb0
[   28.942937]  print_report+0xd1/0x640
[   28.943017]  ? __virt_addr_valid+0x1db/0x2d0
[   28.943043]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.943081]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.943111]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.943136]  kasan_report+0x141/0x180
[   28.943161]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.943190]  kasan_check_range+0x10c/0x1c0
[   28.943249]  __kasan_check_write+0x18/0x20
[   28.943276]  kasan_atomics_helper+0xfa9/0x5450
[   28.943301]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.943325]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.943352]  ? kasan_atomics+0x152/0x310
[   28.943412]  kasan_atomics+0x1dc/0x310
[   28.943438]  ? __pfx_kasan_atomics+0x10/0x10
[   28.943465]  ? __pfx_read_tsc+0x10/0x10
[   28.943490]  ? ktime_get_ts64+0x86/0x230
[   28.943515]  kunit_try_run_case+0x1a5/0x480
[   28.943542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.943568]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.943592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.943620]  ? __kthread_parkme+0x82/0x180
[   28.943642]  ? preempt_count_sub+0x50/0x80
[   28.943667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.943695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.943720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.943746]  kthread+0x337/0x6f0
[   28.943768]  ? trace_preempt_on+0x20/0xc0
[   28.943847]  ? __pfx_kthread+0x10/0x10
[   28.943873]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.943900]  ? calculate_sigpending+0x7b/0xa0
[   28.943926]  ? __pfx_kthread+0x10/0x10
[   28.943963]  ret_from_fork+0x116/0x1d0
[   28.943986]  ? __pfx_kthread+0x10/0x10
[   28.944008]  ret_from_fork_asm+0x1a/0x30
[   28.944042]  </TASK>
[   28.944055] 
[   28.953641] Allocated by task 314:
[   28.953998]  kasan_save_stack+0x45/0x70
[   28.954282]  kasan_save_track+0x18/0x40
[   28.954462]  kasan_save_alloc_info+0x3b/0x50
[   28.954693]  __kasan_kmalloc+0xb7/0xc0
[   28.955003]  __kmalloc_cache_noprof+0x189/0x420
[   28.955256]  kasan_atomics+0x95/0x310
[   28.955476]  kunit_try_run_case+0x1a5/0x480
[   28.955686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.956021]  kthread+0x337/0x6f0
[   28.956144]  ret_from_fork+0x116/0x1d0
[   28.956277]  ret_from_fork_asm+0x1a/0x30
[   28.956695] 
[   28.956893] The buggy address belongs to the object at ffff888106266f00
[   28.956893]  which belongs to the cache kmalloc-64 of size 64
[   28.957619] The buggy address is located 0 bytes to the right of
[   28.957619]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.958016] 
[   28.958088] The buggy address belongs to the physical page:
[   28.958313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.958768] flags: 0x200000000000000(node=0|zone=2)
[   28.959108] page_type: f5(slab)
[   28.959646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.960291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.960549] page dumped because: kasan: bad access detected
[   28.960725] 
[   28.960909] Memory state around the buggy address:
[   28.961371]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.961736]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.962290] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.962610]                                      ^
[   28.962964]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.963476]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.963822] ==================================================================
[   28.848618] ==================================================================
[   28.848982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   28.849331] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.849586] 
[   28.849670] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.849717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.849730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.849752] Call Trace:
[   28.849767]  <TASK>
[   28.849783]  dump_stack_lvl+0x73/0xb0
[   28.849812]  print_report+0xd1/0x640
[   28.849837]  ? __virt_addr_valid+0x1db/0x2d0
[   28.849863]  ? kasan_atomics_helper+0xd47/0x5450
[   28.849886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.849914]  ? kasan_atomics_helper+0xd47/0x5450
[   28.849938]  kasan_report+0x141/0x180
[   28.849974]  ? kasan_atomics_helper+0xd47/0x5450
[   28.850003]  kasan_check_range+0x10c/0x1c0
[   28.850038]  __kasan_check_write+0x18/0x20
[   28.850077]  kasan_atomics_helper+0xd47/0x5450
[   28.850102]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.850126]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.850152]  ? kasan_atomics+0x152/0x310
[   28.850180]  kasan_atomics+0x1dc/0x310
[   28.850205]  ? __pfx_kasan_atomics+0x10/0x10
[   28.850247]  ? __pfx_read_tsc+0x10/0x10
[   28.850276]  ? ktime_get_ts64+0x86/0x230
[   28.850302]  kunit_try_run_case+0x1a5/0x480
[   28.850328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.850353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.850376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.850404]  ? __kthread_parkme+0x82/0x180
[   28.850427]  ? preempt_count_sub+0x50/0x80
[   28.850451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.850478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.850503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.850529]  kthread+0x337/0x6f0
[   28.850551]  ? trace_preempt_on+0x20/0xc0
[   28.850575]  ? __pfx_kthread+0x10/0x10
[   28.850598]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.850624]  ? calculate_sigpending+0x7b/0xa0
[   28.850649]  ? __pfx_kthread+0x10/0x10
[   28.850672]  ret_from_fork+0x116/0x1d0
[   28.850694]  ? __pfx_kthread+0x10/0x10
[   28.850716]  ret_from_fork_asm+0x1a/0x30
[   28.850750]  </TASK>
[   28.850762] 
[   28.859197] Allocated by task 314:
[   28.859359]  kasan_save_stack+0x45/0x70
[   28.859537]  kasan_save_track+0x18/0x40
[   28.859673]  kasan_save_alloc_info+0x3b/0x50
[   28.859822]  __kasan_kmalloc+0xb7/0xc0
[   28.859963]  __kmalloc_cache_noprof+0x189/0x420
[   28.860165]  kasan_atomics+0x95/0x310
[   28.860484]  kunit_try_run_case+0x1a5/0x480
[   28.860701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.860960]  kthread+0x337/0x6f0
[   28.861286]  ret_from_fork+0x116/0x1d0
[   28.861484]  ret_from_fork_asm+0x1a/0x30
[   28.861625] 
[   28.861692] The buggy address belongs to the object at ffff888106266f00
[   28.861692]  which belongs to the cache kmalloc-64 of size 64
[   28.862314] The buggy address is located 0 bytes to the right of
[   28.862314]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.863008] 
[   28.863119] The buggy address belongs to the physical page:
[   28.863406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.863698] flags: 0x200000000000000(node=0|zone=2)
[   28.863863] page_type: f5(slab)
[   28.863992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.864228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.864460] page dumped because: kasan: bad access detected
[   28.864685] 
[   28.864777] Memory state around the buggy address:
[   28.865020]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.865642]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.865882] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.866107]                                      ^
[   28.866264]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.866482]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.866696] ==================================================================
[   29.136411] ==================================================================
[   29.136927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   29.137300] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.137624] 
[   29.137747] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.137958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.137974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.137997] Call Trace:
[   29.138037]  <TASK>
[   29.138060]  dump_stack_lvl+0x73/0xb0
[   29.138092]  print_report+0xd1/0x640
[   29.138116]  ? __virt_addr_valid+0x1db/0x2d0
[   29.138142]  ? kasan_atomics_helper+0x49ce/0x5450
[   29.138165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.138193]  ? kasan_atomics_helper+0x49ce/0x5450
[   29.138217]  kasan_report+0x141/0x180
[   29.138241]  ? kasan_atomics_helper+0x49ce/0x5450
[   29.138269]  __asan_report_load4_noabort+0x18/0x20
[   29.138296]  kasan_atomics_helper+0x49ce/0x5450
[   29.138321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.138345]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.138372]  ? kasan_atomics+0x152/0x310
[   29.138399]  kasan_atomics+0x1dc/0x310
[   29.138424]  ? __pfx_kasan_atomics+0x10/0x10
[   29.138449]  ? __pfx_read_tsc+0x10/0x10
[   29.138474]  ? ktime_get_ts64+0x86/0x230
[   29.138499]  kunit_try_run_case+0x1a5/0x480
[   29.138525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.138549]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.138572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.138601]  ? __kthread_parkme+0x82/0x180
[   29.138658]  ? preempt_count_sub+0x50/0x80
[   29.138683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.138709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.138735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.138761]  kthread+0x337/0x6f0
[   29.138872]  ? trace_preempt_on+0x20/0xc0
[   29.138898]  ? __pfx_kthread+0x10/0x10
[   29.138921]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.138959]  ? calculate_sigpending+0x7b/0xa0
[   29.138984]  ? __pfx_kthread+0x10/0x10
[   29.139008]  ret_from_fork+0x116/0x1d0
[   29.139028]  ? __pfx_kthread+0x10/0x10
[   29.139071]  ret_from_fork_asm+0x1a/0x30
[   29.139104]  </TASK>
[   29.139117] 
[   29.147345] Allocated by task 314:
[   29.147488]  kasan_save_stack+0x45/0x70
[   29.147711]  kasan_save_track+0x18/0x40
[   29.147975]  kasan_save_alloc_info+0x3b/0x50
[   29.148223]  __kasan_kmalloc+0xb7/0xc0
[   29.148372]  __kmalloc_cache_noprof+0x189/0x420
[   29.148530]  kasan_atomics+0x95/0x310
[   29.148663]  kunit_try_run_case+0x1a5/0x480
[   29.148961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.149275]  kthread+0x337/0x6f0
[   29.149448]  ret_from_fork+0x116/0x1d0
[   29.149634]  ret_from_fork_asm+0x1a/0x30
[   29.150019] 
[   29.150123] The buggy address belongs to the object at ffff888106266f00
[   29.150123]  which belongs to the cache kmalloc-64 of size 64
[   29.150637] The buggy address is located 0 bytes to the right of
[   29.150637]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.151242] 
[   29.151345] The buggy address belongs to the physical page:
[   29.151640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.152113] flags: 0x200000000000000(node=0|zone=2)
[   29.152333] page_type: f5(slab)
[   29.152511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.152929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.153235] page dumped because: kasan: bad access detected
[   29.153460] 
[   29.153554] Memory state around the buggy address:
[   29.153938]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.154326]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.154576] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.154921]                                      ^
[   29.155134]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.155397]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.155702] ==================================================================
[   29.231477] ==================================================================
[   29.231805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   29.232462] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.233331] 
[   29.233546] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.233602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.233616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.233639] Call Trace:
[   29.233657]  <TASK>
[   29.233673]  dump_stack_lvl+0x73/0xb0
[   29.233704]  print_report+0xd1/0x640
[   29.233728]  ? __virt_addr_valid+0x1db/0x2d0
[   29.233753]  ? kasan_atomics_helper+0x50d4/0x5450
[   29.233776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.233936]  ? kasan_atomics_helper+0x50d4/0x5450
[   29.233976]  kasan_report+0x141/0x180
[   29.234001]  ? kasan_atomics_helper+0x50d4/0x5450
[   29.234030]  __asan_report_store8_noabort+0x1b/0x30
[   29.234071]  kasan_atomics_helper+0x50d4/0x5450
[   29.234097]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.234123]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.234150]  ? kasan_atomics+0x152/0x310
[   29.234178]  kasan_atomics+0x1dc/0x310
[   29.234203]  ? __pfx_kasan_atomics+0x10/0x10
[   29.234229]  ? __pfx_read_tsc+0x10/0x10
[   29.234253]  ? ktime_get_ts64+0x86/0x230
[   29.234279]  kunit_try_run_case+0x1a5/0x480
[   29.234306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.234331]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.234355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.234384]  ? __kthread_parkme+0x82/0x180
[   29.234406]  ? preempt_count_sub+0x50/0x80
[   29.234431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.234457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.234483]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.234509]  kthread+0x337/0x6f0
[   29.234532]  ? trace_preempt_on+0x20/0xc0
[   29.234557]  ? __pfx_kthread+0x10/0x10
[   29.234579]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.234604]  ? calculate_sigpending+0x7b/0xa0
[   29.234630]  ? __pfx_kthread+0x10/0x10
[   29.234655]  ret_from_fork+0x116/0x1d0
[   29.234676]  ? __pfx_kthread+0x10/0x10
[   29.234700]  ret_from_fork_asm+0x1a/0x30
[   29.234733]  </TASK>
[   29.234745] 
[   29.247211] Allocated by task 314:
[   29.247349]  kasan_save_stack+0x45/0x70
[   29.247496]  kasan_save_track+0x18/0x40
[   29.247631]  kasan_save_alloc_info+0x3b/0x50
[   29.247778]  __kasan_kmalloc+0xb7/0xc0
[   29.247907]  __kmalloc_cache_noprof+0x189/0x420
[   29.248648]  kasan_atomics+0x95/0x310
[   29.248923]  kunit_try_run_case+0x1a5/0x480
[   29.249629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.250219]  kthread+0x337/0x6f0
[   29.250545]  ret_from_fork+0x116/0x1d0
[   29.250737]  ret_from_fork_asm+0x1a/0x30
[   29.251264] 
[   29.251371] The buggy address belongs to the object at ffff888106266f00
[   29.251371]  which belongs to the cache kmalloc-64 of size 64
[   29.252233] The buggy address is located 0 bytes to the right of
[   29.252233]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.252729] 
[   29.252853] The buggy address belongs to the physical page:
[   29.253620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.254717] flags: 0x200000000000000(node=0|zone=2)
[   29.255031] page_type: f5(slab)
[   29.255195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.255503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.255825] page dumped because: kasan: bad access detected
[   29.256035] 
[   29.256102] Memory state around the buggy address:
[   29.256255]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.256569]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.256884] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.257365]                                      ^
[   29.257572]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.257793]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.258271] ==================================================================
[   29.483617] ==================================================================
[   29.483984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   29.484416] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.485174] 
[   29.485287] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.485335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.485348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.485370] Call Trace:
[   29.485386]  <TASK>
[   29.485402]  dump_stack_lvl+0x73/0xb0
[   29.485431]  print_report+0xd1/0x640
[   29.485456]  ? __virt_addr_valid+0x1db/0x2d0
[   29.485480]  ? kasan_atomics_helper+0x1b22/0x5450
[   29.485727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.485762]  ? kasan_atomics_helper+0x1b22/0x5450
[   29.485787]  kasan_report+0x141/0x180
[   29.485812]  ? kasan_atomics_helper+0x1b22/0x5450
[   29.485840]  kasan_check_range+0x10c/0x1c0
[   29.485867]  __kasan_check_write+0x18/0x20
[   29.485893]  kasan_atomics_helper+0x1b22/0x5450
[   29.485918]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.485954]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.485980]  ? kasan_atomics+0x152/0x310
[   29.486008]  kasan_atomics+0x1dc/0x310
[   29.486033]  ? __pfx_kasan_atomics+0x10/0x10
[   29.486059]  ? __pfx_read_tsc+0x10/0x10
[   29.486098]  ? ktime_get_ts64+0x86/0x230
[   29.486126]  kunit_try_run_case+0x1a5/0x480
[   29.486169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.486193]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.486217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.486245]  ? __kthread_parkme+0x82/0x180
[   29.486267]  ? preempt_count_sub+0x50/0x80
[   29.486291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.486318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.486345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.486371]  kthread+0x337/0x6f0
[   29.486392]  ? trace_preempt_on+0x20/0xc0
[   29.486417]  ? __pfx_kthread+0x10/0x10
[   29.486441]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.486467]  ? calculate_sigpending+0x7b/0xa0
[   29.486492]  ? __pfx_kthread+0x10/0x10
[   29.486516]  ret_from_fork+0x116/0x1d0
[   29.486538]  ? __pfx_kthread+0x10/0x10
[   29.486560]  ret_from_fork_asm+0x1a/0x30
[   29.486594]  </TASK>
[   29.486607] 
[   29.498416] Allocated by task 314:
[   29.498841]  kasan_save_stack+0x45/0x70
[   29.499083]  kasan_save_track+0x18/0x40
[   29.499497]  kasan_save_alloc_info+0x3b/0x50
[   29.499690]  __kasan_kmalloc+0xb7/0xc0
[   29.500101]  __kmalloc_cache_noprof+0x189/0x420
[   29.500319]  kasan_atomics+0x95/0x310
[   29.500495]  kunit_try_run_case+0x1a5/0x480
[   29.500677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.501223]  kthread+0x337/0x6f0
[   29.501380]  ret_from_fork+0x116/0x1d0
[   29.501546]  ret_from_fork_asm+0x1a/0x30
[   29.501734] 
[   29.501822] The buggy address belongs to the object at ffff888106266f00
[   29.501822]  which belongs to the cache kmalloc-64 of size 64
[   29.502730] The buggy address is located 0 bytes to the right of
[   29.502730]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.503640] 
[   29.503795] The buggy address belongs to the physical page:
[   29.504215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.504717] flags: 0x200000000000000(node=0|zone=2)
[   29.505113] page_type: f5(slab)
[   29.505348] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.505893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.506421] page dumped because: kasan: bad access detected
[   29.506778] 
[   29.506911] Memory state around the buggy address:
[   29.507210]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.507611]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.508321] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.508631]                                      ^
[   29.509024]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.509610]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.510090] ==================================================================
[   28.511608] ==================================================================
[   28.511981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   28.513096] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   28.513409] 
[   28.513510] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   28.513559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.513572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.513594] Call Trace:
[   28.513608]  <TASK>
[   28.513624]  dump_stack_lvl+0x73/0xb0
[   28.513654]  print_report+0xd1/0x640
[   28.513678]  ? __virt_addr_valid+0x1db/0x2d0
[   28.513703]  ? kasan_atomics_helper+0x565/0x5450
[   28.513725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.513754]  ? kasan_atomics_helper+0x565/0x5450
[   28.513777]  kasan_report+0x141/0x180
[   28.513856]  ? kasan_atomics_helper+0x565/0x5450
[   28.513886]  kasan_check_range+0x10c/0x1c0
[   28.513912]  __kasan_check_write+0x18/0x20
[   28.513937]  kasan_atomics_helper+0x565/0x5450
[   28.513973]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.513997]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.514023]  ? kasan_atomics+0x152/0x310
[   28.514051]  kasan_atomics+0x1dc/0x310
[   28.514086]  ? __pfx_kasan_atomics+0x10/0x10
[   28.514113]  ? __pfx_read_tsc+0x10/0x10
[   28.514137]  ? ktime_get_ts64+0x86/0x230
[   28.514163]  kunit_try_run_case+0x1a5/0x480
[   28.514189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.514215]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.514239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.514267]  ? __kthread_parkme+0x82/0x180
[   28.514288]  ? preempt_count_sub+0x50/0x80
[   28.514313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.514339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.514365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.514391]  kthread+0x337/0x6f0
[   28.514413]  ? trace_preempt_on+0x20/0xc0
[   28.514438]  ? __pfx_kthread+0x10/0x10
[   28.514460]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.514486]  ? calculate_sigpending+0x7b/0xa0
[   28.514511]  ? __pfx_kthread+0x10/0x10
[   28.514534]  ret_from_fork+0x116/0x1d0
[   28.514555]  ? __pfx_kthread+0x10/0x10
[   28.514577]  ret_from_fork_asm+0x1a/0x30
[   28.514611]  </TASK>
[   28.514623] 
[   28.523036] Allocated by task 314:
[   28.523186]  kasan_save_stack+0x45/0x70
[   28.523337]  kasan_save_track+0x18/0x40
[   28.523474]  kasan_save_alloc_info+0x3b/0x50
[   28.523655]  __kasan_kmalloc+0xb7/0xc0
[   28.524057]  __kmalloc_cache_noprof+0x189/0x420
[   28.524313]  kasan_atomics+0x95/0x310
[   28.524505]  kunit_try_run_case+0x1a5/0x480
[   28.524714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.525063]  kthread+0x337/0x6f0
[   28.525263]  ret_from_fork+0x116/0x1d0
[   28.525447]  ret_from_fork_asm+0x1a/0x30
[   28.525616] 
[   28.525706] The buggy address belongs to the object at ffff888106266f00
[   28.525706]  which belongs to the cache kmalloc-64 of size 64
[   28.526290] The buggy address is located 0 bytes to the right of
[   28.526290]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   28.526846] 
[   28.526933] The buggy address belongs to the physical page:
[   28.527154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   28.527400] flags: 0x200000000000000(node=0|zone=2)
[   28.527565] page_type: f5(slab)
[   28.527685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.527920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.528213] page dumped because: kasan: bad access detected
[   28.528471] 
[   28.528560] Memory state around the buggy address:
[   28.528786]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.529302]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.529653] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.530126]                                      ^
[   28.530323]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.530591]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.530886] ==================================================================
[   29.034052] ==================================================================
[   29.034426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   29.034772] Write of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.035221] 
[   29.035370] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.035420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.035433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.035456] Call Trace:
[   29.035471]  <TASK>
[   29.035488]  dump_stack_lvl+0x73/0xb0
[   29.035554]  print_report+0xd1/0x640
[   29.035579]  ? __virt_addr_valid+0x1db/0x2d0
[   29.035605]  ? kasan_atomics_helper+0x1148/0x5450
[   29.035627]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.035687]  ? kasan_atomics_helper+0x1148/0x5450
[   29.035712]  kasan_report+0x141/0x180
[   29.035736]  ? kasan_atomics_helper+0x1148/0x5450
[   29.035765]  kasan_check_range+0x10c/0x1c0
[   29.035842]  __kasan_check_write+0x18/0x20
[   29.035870]  kasan_atomics_helper+0x1148/0x5450
[   29.035895]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.035919]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.036022]  ? kasan_atomics+0x152/0x310
[   29.036076]  kasan_atomics+0x1dc/0x310
[   29.036126]  ? __pfx_kasan_atomics+0x10/0x10
[   29.036153]  ? __pfx_read_tsc+0x10/0x10
[   29.036178]  ? ktime_get_ts64+0x86/0x230
[   29.036252]  kunit_try_run_case+0x1a5/0x480
[   29.036279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.036304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.036328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.036356]  ? __kthread_parkme+0x82/0x180
[   29.036378]  ? preempt_count_sub+0x50/0x80
[   29.036404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.036429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.036455]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.036481]  kthread+0x337/0x6f0
[   29.036503]  ? trace_preempt_on+0x20/0xc0
[   29.036528]  ? __pfx_kthread+0x10/0x10
[   29.036550]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.036585]  ? calculate_sigpending+0x7b/0xa0
[   29.036612]  ? __pfx_kthread+0x10/0x10
[   29.036636]  ret_from_fork+0x116/0x1d0
[   29.036657]  ? __pfx_kthread+0x10/0x10
[   29.036680]  ret_from_fork_asm+0x1a/0x30
[   29.036713]  </TASK>
[   29.036725] 
[   29.046663] Allocated by task 314:
[   29.046800]  kasan_save_stack+0x45/0x70
[   29.046981]  kasan_save_track+0x18/0x40
[   29.047416]  kasan_save_alloc_info+0x3b/0x50
[   29.047848]  __kasan_kmalloc+0xb7/0xc0
[   29.048015]  __kmalloc_cache_noprof+0x189/0x420
[   29.048252]  kasan_atomics+0x95/0x310
[   29.048470]  kunit_try_run_case+0x1a5/0x480
[   29.048670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.049017]  kthread+0x337/0x6f0
[   29.049208]  ret_from_fork+0x116/0x1d0
[   29.049431]  ret_from_fork_asm+0x1a/0x30
[   29.049646] 
[   29.049741] The buggy address belongs to the object at ffff888106266f00
[   29.049741]  which belongs to the cache kmalloc-64 of size 64
[   29.050512] The buggy address is located 0 bytes to the right of
[   29.050512]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.051273] 
[   29.051377] The buggy address belongs to the physical page:
[   29.051650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.052152] flags: 0x200000000000000(node=0|zone=2)
[   29.052401] page_type: f5(slab)
[   29.052564] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.053031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.053338] page dumped because: kasan: bad access detected
[   29.053519] 
[   29.053586] Memory state around the buggy address:
[   29.053784]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.054341]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.054688] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.055283]                                      ^
[   29.055552]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.056001]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.056360] ==================================================================
[   29.625078] ==================================================================
[   29.625317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   29.625552] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.626186] 
[   29.626368] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.626416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.626429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.626451] Call Trace:
[   29.626467]  <TASK>
[   29.626484]  dump_stack_lvl+0x73/0xb0
[   29.626512]  print_report+0xd1/0x640
[   29.626536]  ? __virt_addr_valid+0x1db/0x2d0
[   29.626561]  ? kasan_atomics_helper+0x1e12/0x5450
[   29.626584]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.626612]  ? kasan_atomics_helper+0x1e12/0x5450
[   29.626635]  kasan_report+0x141/0x180
[   29.626659]  ? kasan_atomics_helper+0x1e12/0x5450
[   29.626710]  kasan_check_range+0x10c/0x1c0
[   29.626750]  __kasan_check_write+0x18/0x20
[   29.626774]  kasan_atomics_helper+0x1e12/0x5450
[   29.626813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.626851]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.626878]  ? kasan_atomics+0x152/0x310
[   29.626905]  kasan_atomics+0x1dc/0x310
[   29.626955]  ? __pfx_kasan_atomics+0x10/0x10
[   29.626994]  ? __pfx_read_tsc+0x10/0x10
[   29.627018]  ? ktime_get_ts64+0x86/0x230
[   29.627044]  kunit_try_run_case+0x1a5/0x480
[   29.627083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.627122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.627147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.627175]  ? __kthread_parkme+0x82/0x180
[   29.627197]  ? preempt_count_sub+0x50/0x80
[   29.627222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.627259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.627285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.627311]  kthread+0x337/0x6f0
[   29.627333]  ? trace_preempt_on+0x20/0xc0
[   29.627357]  ? __pfx_kthread+0x10/0x10
[   29.627380]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.627406]  ? calculate_sigpending+0x7b/0xa0
[   29.627431]  ? __pfx_kthread+0x10/0x10
[   29.627454]  ret_from_fork+0x116/0x1d0
[   29.627475]  ? __pfx_kthread+0x10/0x10
[   29.627497]  ret_from_fork_asm+0x1a/0x30
[   29.627530]  </TASK>
[   29.627542] 
[   29.644173] Allocated by task 314:
[   29.644636]  kasan_save_stack+0x45/0x70
[   29.645177]  kasan_save_track+0x18/0x40
[   29.645761]  kasan_save_alloc_info+0x3b/0x50
[   29.646398]  __kasan_kmalloc+0xb7/0xc0
[   29.646901]  __kmalloc_cache_noprof+0x189/0x420
[   29.647533]  kasan_atomics+0x95/0x310
[   29.648050]  kunit_try_run_case+0x1a5/0x480
[   29.648675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.649491]  kthread+0x337/0x6f0
[   29.649653]  ret_from_fork+0x116/0x1d0
[   29.650106]  ret_from_fork_asm+0x1a/0x30
[   29.650625] 
[   29.651021] The buggy address belongs to the object at ffff888106266f00
[   29.651021]  which belongs to the cache kmalloc-64 of size 64
[   29.651758] The buggy address is located 0 bytes to the right of
[   29.651758]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.653515] 
[   29.653743] The buggy address belongs to the physical page:
[   29.654367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.655201] flags: 0x200000000000000(node=0|zone=2)
[   29.655588] page_type: f5(slab)
[   29.655724] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.656667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.657673] page dumped because: kasan: bad access detected
[   29.658352] 
[   29.658593] Memory state around the buggy address:
[   29.658774]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.659692]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.660586] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.661301]                                      ^
[   29.661751]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.662597]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.663095] ==================================================================
[   29.303374] ==================================================================
[   29.304059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   29.304367] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.304652] 
[   29.304755] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.304802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.304816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.304837] Call Trace:
[   29.304852]  <TASK>
[   29.304867]  dump_stack_lvl+0x73/0xb0
[   29.304895]  print_report+0xd1/0x640
[   29.304920]  ? __virt_addr_valid+0x1db/0x2d0
[   29.304958]  ? kasan_atomics_helper+0x164f/0x5450
[   29.304981]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.305010]  ? kasan_atomics_helper+0x164f/0x5450
[   29.305034]  kasan_report+0x141/0x180
[   29.305113]  ? kasan_atomics_helper+0x164f/0x5450
[   29.305152]  kasan_check_range+0x10c/0x1c0
[   29.305178]  __kasan_check_write+0x18/0x20
[   29.305203]  kasan_atomics_helper+0x164f/0x5450
[   29.305228]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.305253]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.305279]  ? kasan_atomics+0x152/0x310
[   29.305307]  kasan_atomics+0x1dc/0x310
[   29.305331]  ? __pfx_kasan_atomics+0x10/0x10
[   29.305357]  ? __pfx_read_tsc+0x10/0x10
[   29.305381]  ? ktime_get_ts64+0x86/0x230
[   29.305407]  kunit_try_run_case+0x1a5/0x480
[   29.305433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.305458]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.305481]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.305509]  ? __kthread_parkme+0x82/0x180
[   29.305531]  ? preempt_count_sub+0x50/0x80
[   29.305557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.305582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.305608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.305634]  kthread+0x337/0x6f0
[   29.305656]  ? trace_preempt_on+0x20/0xc0
[   29.305682]  ? __pfx_kthread+0x10/0x10
[   29.305705]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.305731]  ? calculate_sigpending+0x7b/0xa0
[   29.305757]  ? __pfx_kthread+0x10/0x10
[   29.305780]  ret_from_fork+0x116/0x1d0
[   29.305880]  ? __pfx_kthread+0x10/0x10
[   29.305905]  ret_from_fork_asm+0x1a/0x30
[   29.305939]  </TASK>
[   29.305962] 
[   29.313703] Allocated by task 314:
[   29.313885]  kasan_save_stack+0x45/0x70
[   29.314146]  kasan_save_track+0x18/0x40
[   29.314318]  kasan_save_alloc_info+0x3b/0x50
[   29.314502]  __kasan_kmalloc+0xb7/0xc0
[   29.314669]  __kmalloc_cache_noprof+0x189/0x420
[   29.314861]  kasan_atomics+0x95/0x310
[   29.315031]  kunit_try_run_case+0x1a5/0x480
[   29.315225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.315404]  kthread+0x337/0x6f0
[   29.315524]  ret_from_fork+0x116/0x1d0
[   29.315657]  ret_from_fork_asm+0x1a/0x30
[   29.315853] 
[   29.315953] The buggy address belongs to the object at ffff888106266f00
[   29.315953]  which belongs to the cache kmalloc-64 of size 64
[   29.316484] The buggy address is located 0 bytes to the right of
[   29.316484]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.317234] 
[   29.317324] The buggy address belongs to the physical page:
[   29.317578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.318004] flags: 0x200000000000000(node=0|zone=2)
[   29.318502] page_type: f5(slab)
[   29.318723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.319020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.319475] page dumped because: kasan: bad access detected
[   29.319716] 
[   29.319855] Memory state around the buggy address:
[   29.320064]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.320288]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.320510] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.320727]                                      ^
[   29.320884]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.321197]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.321864] ==================================================================
[   29.753431] ==================================================================
[   29.753725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   29.754225] Write of size 8 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.754645] 
[   29.754753] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.754879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.754896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.754918] Call Trace:
[   29.754957]  <TASK>
[   29.754977]  dump_stack_lvl+0x73/0xb0
[   29.755007]  print_report+0xd1/0x640
[   29.755033]  ? __virt_addr_valid+0x1db/0x2d0
[   29.755059]  ? kasan_atomics_helper+0x2006/0x5450
[   29.755083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.755113]  ? kasan_atomics_helper+0x2006/0x5450
[   29.755149]  kasan_report+0x141/0x180
[   29.755173]  ? kasan_atomics_helper+0x2006/0x5450
[   29.755214]  kasan_check_range+0x10c/0x1c0
[   29.755242]  __kasan_check_write+0x18/0x20
[   29.755268]  kasan_atomics_helper+0x2006/0x5450
[   29.755294]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.755319]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.755348]  ? kasan_atomics+0x152/0x310
[   29.755377]  kasan_atomics+0x1dc/0x310
[   29.755402]  ? __pfx_kasan_atomics+0x10/0x10
[   29.755440]  ? __pfx_read_tsc+0x10/0x10
[   29.755465]  ? ktime_get_ts64+0x86/0x230
[   29.755491]  kunit_try_run_case+0x1a5/0x480
[   29.755519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.755545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.755569]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.755609]  ? __kthread_parkme+0x82/0x180
[   29.755632]  ? preempt_count_sub+0x50/0x80
[   29.755668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.755694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.755730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.755757]  kthread+0x337/0x6f0
[   29.755779]  ? trace_preempt_on+0x20/0xc0
[   29.756006]  ? __pfx_kthread+0x10/0x10
[   29.756031]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.756072]  ? calculate_sigpending+0x7b/0xa0
[   29.756099]  ? __pfx_kthread+0x10/0x10
[   29.756124]  ret_from_fork+0x116/0x1d0
[   29.756147]  ? __pfx_kthread+0x10/0x10
[   29.756170]  ret_from_fork_asm+0x1a/0x30
[   29.756204]  </TASK>
[   29.756218] 
[   29.765431] Allocated by task 314:
[   29.765615]  kasan_save_stack+0x45/0x70
[   29.765867]  kasan_save_track+0x18/0x40
[   29.766066]  kasan_save_alloc_info+0x3b/0x50
[   29.766290]  __kasan_kmalloc+0xb7/0xc0
[   29.766497]  __kmalloc_cache_noprof+0x189/0x420
[   29.766673]  kasan_atomics+0x95/0x310
[   29.766879]  kunit_try_run_case+0x1a5/0x480
[   29.767221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.767418]  kthread+0x337/0x6f0
[   29.767539]  ret_from_fork+0x116/0x1d0
[   29.767672]  ret_from_fork_asm+0x1a/0x30
[   29.767828] 
[   29.767919] The buggy address belongs to the object at ffff888106266f00
[   29.767919]  which belongs to the cache kmalloc-64 of size 64
[   29.768611] The buggy address is located 0 bytes to the right of
[   29.768611]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.769477] 
[   29.769559] The buggy address belongs to the physical page:
[   29.769807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.770511] flags: 0x200000000000000(node=0|zone=2)
[   29.770729] page_type: f5(slab)
[   29.770896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.771403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.771742] page dumped because: kasan: bad access detected
[   29.771995] 
[   29.772228] Memory state around the buggy address:
[   29.772464]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.772782]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.773269] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.773607]                                      ^
[   29.773819]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.774298]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.774528] ==================================================================
[   29.096412] ==================================================================
[   29.096665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   29.097031] Read of size 4 at addr ffff888106266f30 by task kunit_try_catch/314
[   29.097351] 
[   29.097434] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) 
[   29.097572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.097588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.097610] Call Trace:
[   29.097625]  <TASK>
[   29.097640]  dump_stack_lvl+0x73/0xb0
[   29.097692]  print_report+0xd1/0x640
[   29.097718]  ? __virt_addr_valid+0x1db/0x2d0
[   29.097741]  ? kasan_atomics_helper+0x49e8/0x5450
[   29.097765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.098009]  ? kasan_atomics_helper+0x49e8/0x5450
[   29.098034]  kasan_report+0x141/0x180
[   29.098084]  ? kasan_atomics_helper+0x49e8/0x5450
[   29.098112]  __asan_report_load4_noabort+0x18/0x20
[   29.098139]  kasan_atomics_helper+0x49e8/0x5450
[   29.098163]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.098188]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.098234]  ? kasan_atomics+0x152/0x310
[   29.098262]  kasan_atomics+0x1dc/0x310
[   29.098288]  ? __pfx_kasan_atomics+0x10/0x10
[   29.098314]  ? __pfx_read_tsc+0x10/0x10
[   29.098338]  ? ktime_get_ts64+0x86/0x230
[   29.098364]  kunit_try_run_case+0x1a5/0x480
[   29.098389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.098414]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.098438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.098466]  ? __kthread_parkme+0x82/0x180
[   29.098488]  ? preempt_count_sub+0x50/0x80
[   29.098513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.098539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.098565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.098612]  kthread+0x337/0x6f0
[   29.098635]  ? trace_preempt_on+0x20/0xc0
[   29.098660]  ? __pfx_kthread+0x10/0x10
[   29.098682]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.098708]  ? calculate_sigpending+0x7b/0xa0
[   29.098733]  ? __pfx_kthread+0x10/0x10
[   29.098757]  ret_from_fork+0x116/0x1d0
[   29.098784]  ? __pfx_kthread+0x10/0x10
[   29.098806]  ret_from_fork_asm+0x1a/0x30
[   29.098839]  </TASK>
[   29.098851] 
[   29.107187] Allocated by task 314:
[   29.107366]  kasan_save_stack+0x45/0x70
[   29.107562]  kasan_save_track+0x18/0x40
[   29.107758]  kasan_save_alloc_info+0x3b/0x50
[   29.108072]  __kasan_kmalloc+0xb7/0xc0
[   29.108292]  __kmalloc_cache_noprof+0x189/0x420
[   29.108514]  kasan_atomics+0x95/0x310
[   29.108651]  kunit_try_run_case+0x1a5/0x480
[   29.108937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.109241]  kthread+0x337/0x6f0
[   29.109376]  ret_from_fork+0x116/0x1d0
[   29.109525]  ret_from_fork_asm+0x1a/0x30
[   29.109723] 
[   29.110026] The buggy address belongs to the object at ffff888106266f00
[   29.110026]  which belongs to the cache kmalloc-64 of size 64
[   29.110549] The buggy address is located 0 bytes to the right of
[   29.110549]  allocated 48-byte region [ffff888106266f00, ffff888106266f30)
[   29.111056] 
[   29.111183] The buggy address belongs to the physical page:
[   29.111443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106266
[   29.111864] flags: 0x200000000000000(node=0|zone=2)
[   29.112163] page_type: f5(slab)
[   29.112317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.112556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.112985] page dumped because: kasan: bad access detected
[   29.113287] 
[   29.113380] Memory state around the buggy address:
[   29.113617]  ffff888106266e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.114031]  ffff888106266e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.114419] >ffff888106266f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.114738]                                      ^
[   29.114990]  ffff888106266f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.115213]  ffff888106267000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.115628] ==================================================================