Hay
Date
July 8, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.015602] ==================================================================
[   34.015669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   34.015721] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.015772] 
[   34.015802] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.015888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.015917] Hardware name: linux,dummy-virt (DT)
[   34.015950] Call trace:
[   34.015974]  show_stack+0x20/0x38 (C)
[   34.016021]  dump_stack_lvl+0x8c/0xd0
[   34.016069]  print_report+0x118/0x5d0
[   34.016116]  kasan_report+0xdc/0x128
[   34.016166]  kasan_check_range+0x100/0x1a8
[   34.016223]  __kasan_check_write+0x20/0x30
[   34.016269]  kasan_atomics_helper+0x126c/0x4858
[   34.016320]  kasan_atomics+0x198/0x2e0
[   34.016369]  kunit_try_run_case+0x170/0x3f0
[   34.016419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.016477]  kthread+0x328/0x630
[   34.016925]  ret_from_fork+0x10/0x20
[   34.017076] 
[   34.017098] Allocated by task 296:
[   34.017130]  kasan_save_stack+0x3c/0x68
[   34.017176]  kasan_save_track+0x20/0x40
[   34.017367]  kasan_save_alloc_info+0x40/0x58
[   34.017426]  __kasan_kmalloc+0xd4/0xd8
[   34.017520]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.017563]  kasan_atomics+0xb8/0x2e0
[   34.017609]  kunit_try_run_case+0x170/0x3f0
[   34.017772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.017862]  kthread+0x328/0x630
[   34.017981]  ret_from_fork+0x10/0x20
[   34.018019] 
[   34.018043] The buggy address belongs to the object at fff00000c9a67800
[   34.018043]  which belongs to the cache kmalloc-64 of size 64
[   34.018103] The buggy address is located 0 bytes to the right of
[   34.018103]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.018170] 
[   34.018195] The buggy address belongs to the physical page:
[   34.018245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.018492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.018546] page_type: f5(slab)
[   34.018666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.018720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.018762] page dumped because: kasan: bad access detected
[   34.018837] 
[   34.018929] Memory state around the buggy address:
[   34.019035]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.019115]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.019160] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.019216]                                      ^
[   34.019253]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.019296]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.020073] ==================================================================
[   34.112574] ==================================================================
[   34.113406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   34.114126] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.114663] 
[   34.115276] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.116086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.116123] Hardware name: linux,dummy-virt (DT)
[   34.116833] Call trace:
[   34.116932]  show_stack+0x20/0x38 (C)
[   34.117463]  dump_stack_lvl+0x8c/0xd0
[   34.118049]  print_report+0x118/0x5d0
[   34.118107]  kasan_report+0xdc/0x128
[   34.118155]  kasan_check_range+0x100/0x1a8
[   34.118202]  __kasan_check_write+0x20/0x30
[   34.118260]  kasan_atomics_helper+0x15b4/0x4858
[   34.118312]  kasan_atomics+0x198/0x2e0
[   34.118360]  kunit_try_run_case+0x170/0x3f0
[   34.120442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.121245]  kthread+0x328/0x630
[   34.121422]  ret_from_fork+0x10/0x20
[   34.121648] 
[   34.121735] Allocated by task 296:
[   34.121767]  kasan_save_stack+0x3c/0x68
[   34.121830]  kasan_save_track+0x20/0x40
[   34.122307]  kasan_save_alloc_info+0x40/0x58
[   34.122659]  __kasan_kmalloc+0xd4/0xd8
[   34.122812]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.123011]  kasan_atomics+0xb8/0x2e0
[   34.123922]  kunit_try_run_case+0x170/0x3f0
[   34.124091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.124139]  kthread+0x328/0x630
[   34.124332]  ret_from_fork+0x10/0x20
[   34.124787] 
[   34.124815] The buggy address belongs to the object at fff00000c9a67800
[   34.124815]  which belongs to the cache kmalloc-64 of size 64
[   34.125052] The buggy address is located 0 bytes to the right of
[   34.125052]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.125219] 
[   34.125636] The buggy address belongs to the physical page:
[   34.125870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.126170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.126243] page_type: f5(slab)
[   34.126284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.126337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.126979] page dumped because: kasan: bad access detected
[   34.127021] 
[   34.127043] Memory state around the buggy address:
[   34.127077]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.127693]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.128059] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.128105]                                      ^
[   34.128143]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.128189]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.128761] ==================================================================
[   33.858004] ==================================================================
[   33.858191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   33.858494] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.858688] 
[   33.858829] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.859239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.859276] Hardware name: linux,dummy-virt (DT)
[   33.859313] Call trace:
[   33.859659]  show_stack+0x20/0x38 (C)
[   33.860008]  kasan_atomics+0x198/0x2e0
[   33.862689] The buggy address belongs to the object at fff00000c9a67800
[   33.862689]  which belongs to the cache kmalloc-64 of size 64
[   33.866582] ==================================================================
[   34.146069] ==================================================================
[   34.146119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   34.146171] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.146238] 
[   34.146270] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.146356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.146385] Hardware name: linux,dummy-virt (DT)
[   34.146418] Call trace:
[   34.146442]  show_stack+0x20/0x38 (C)
[   34.146490]  dump_stack_lvl+0x8c/0xd0
[   34.146540]  print_report+0x118/0x5d0
[   34.146588]  kasan_report+0xdc/0x128
[   34.146638]  __asan_report_load8_noabort+0x20/0x30
[   34.146688]  kasan_atomics_helper+0x3df4/0x4858
[   34.146737]  kasan_atomics+0x198/0x2e0
[   34.146786]  kunit_try_run_case+0x170/0x3f0
[   34.146837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.146893]  kthread+0x328/0x630
[   34.146938]  ret_from_fork+0x10/0x20
[   34.146987] 
[   34.147007] Allocated by task 296:
[   34.147037]  kasan_save_stack+0x3c/0x68
[   34.147081]  kasan_save_track+0x20/0x40
[   34.147122]  kasan_save_alloc_info+0x40/0x58
[   34.147161]  __kasan_kmalloc+0xd4/0xd8
[   34.147200]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.148180]  kasan_atomics+0xb8/0x2e0
[   34.148242]  kunit_try_run_case+0x170/0x3f0
[   34.148282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.148463]  kthread+0x328/0x630
[   34.148606]  ret_from_fork+0x10/0x20
[   34.148647] 
[   34.148670] The buggy address belongs to the object at fff00000c9a67800
[   34.148670]  which belongs to the cache kmalloc-64 of size 64
[   34.148730] The buggy address is located 0 bytes to the right of
[   34.148730]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.148800] 
[   34.148821] The buggy address belongs to the physical page:
[   34.148853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.149004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.149068] page_type: f5(slab)
[   34.149106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.149158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.149200] page dumped because: kasan: bad access detected
[   34.149643] 
[   34.149675] Memory state around the buggy address:
[   34.149712]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.149759]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.149806] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.149846]                                      ^
[   34.149880]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.149927]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.149968] ==================================================================
[   34.003955] ==================================================================
[   34.004031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   34.004082] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.004713] 
[   34.004748] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.005187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.005251] Hardware name: linux,dummy-virt (DT)
[   34.005307] Call trace:
[   34.005332]  show_stack+0x20/0x38 (C)
[   34.005386]  dump_stack_lvl+0x8c/0xd0
[   34.005509]  print_report+0x118/0x5d0
[   34.005689]  kasan_report+0xdc/0x128
[   34.005741]  kasan_check_range+0x100/0x1a8
[   34.005811]  __kasan_check_write+0x20/0x30
[   34.005957]  kasan_atomics_helper+0x1190/0x4858
[   34.006349]  kasan_atomics+0x198/0x2e0
[   34.006402]  kunit_try_run_case+0x170/0x3f0
[   34.006751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.006827]  kthread+0x328/0x630
[   34.006878]  ret_from_fork+0x10/0x20
[   34.006983] 
[   34.007003] Allocated by task 296:
[   34.007034]  kasan_save_stack+0x3c/0x68
[   34.007289]  kasan_save_track+0x20/0x40
[   34.007424]  kasan_save_alloc_info+0x40/0x58
[   34.007513]  __kasan_kmalloc+0xd4/0xd8
[   34.007554]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.007598]  kasan_atomics+0xb8/0x2e0
[   34.007642]  kunit_try_run_case+0x170/0x3f0
[   34.007793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.007842]  kthread+0x328/0x630
[   34.007876]  ret_from_fork+0x10/0x20
[   34.007966] 
[   34.008032] The buggy address belongs to the object at fff00000c9a67800
[   34.008032]  which belongs to the cache kmalloc-64 of size 64
[   34.008118] The buggy address is located 0 bytes to the right of
[   34.008118]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.008183] 
[   34.008217] The buggy address belongs to the physical page:
[   34.008249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.008303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.008349] page_type: f5(slab)
[   34.008389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.008438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.008481] page dumped because: kasan: bad access detected
[   34.008835] 
[   34.008863] Memory state around the buggy address:
[   34.008925]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.008972]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.009016] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.009056]                                      ^
[   34.009431]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.009483]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.009523] ==================================================================
[   33.914081] ==================================================================
[   33.914509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.914599] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.914825] 
[   33.914861] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.914948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.914977] Hardware name: linux,dummy-virt (DT)
[   33.915011] Call trace:
[   33.915304]  show_stack+0x20/0x38 (C)
[   33.915555]  dump_stack_lvl+0x8c/0xd0
[   33.915887]  print_report+0x118/0x5d0
[   33.916128]  kasan_report+0xdc/0x128
[   33.916568]  __asan_report_load4_noabort+0x20/0x30
[   33.916760]  kasan_atomics_helper+0x3e04/0x4858
[   33.917067]  kasan_atomics+0x198/0x2e0
[   33.917126]  kunit_try_run_case+0x170/0x3f0
[   33.917178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.917430]  kthread+0x328/0x630
[   33.917485]  ret_from_fork+0x10/0x20
[   33.917918] 
[   33.917946] Allocated by task 296:
[   33.918134]  kasan_save_stack+0x3c/0x68
[   33.918187]  kasan_save_track+0x20/0x40
[   33.918744]  kasan_save_alloc_info+0x40/0x58
[   33.918797]  __kasan_kmalloc+0xd4/0xd8
[   33.919158]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.919484]  kasan_atomics+0xb8/0x2e0
[   33.919763]  kunit_try_run_case+0x170/0x3f0
[   33.920078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.920314]  kthread+0x328/0x630
[   33.920456]  ret_from_fork+0x10/0x20
[   33.920908] 
[   33.920974] The buggy address belongs to the object at fff00000c9a67800
[   33.920974]  which belongs to the cache kmalloc-64 of size 64
[   33.921259] The buggy address is located 0 bytes to the right of
[   33.921259]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.921450] 
[   33.921518] The buggy address belongs to the physical page:
[   33.921763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.921822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.921955] page_type: f5(slab)
[   33.922050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.922158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.922202] page dumped because: kasan: bad access detected
[   33.922311] 
[   33.922332] Memory state around the buggy address:
[   33.922610]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.922914]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.923057] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.923175]                                      ^
[   33.923222]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.923266]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.923306] ==================================================================
[   33.951952] ==================================================================
[   33.952164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.952722] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.953029] 
[   33.953065] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.953174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.953252] Hardware name: linux,dummy-virt (DT)
[   33.953287] Call trace:
[   33.953314]  show_stack+0x20/0x38 (C)
[   33.953367]  dump_stack_lvl+0x8c/0xd0
[   33.953416]  print_report+0x118/0x5d0
[   33.953466]  kasan_report+0xdc/0x128
[   33.953790]  __asan_report_store8_noabort+0x20/0x30
[   33.953884]  kasan_atomics_helper+0x3e5c/0x4858
[   33.954176]  kasan_atomics+0x198/0x2e0
[   33.954243]  kunit_try_run_case+0x170/0x3f0
[   33.954295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.954352]  kthread+0x328/0x630
[   33.954396]  ret_from_fork+0x10/0x20
[   33.954508] 
[   33.954612] Allocated by task 296:
[   33.954643]  kasan_save_stack+0x3c/0x68
[   33.954689]  kasan_save_track+0x20/0x40
[   33.954735]  kasan_save_alloc_info+0x40/0x58
[   33.954847]  __kasan_kmalloc+0xd4/0xd8
[   33.954887]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.954985]  kasan_atomics+0xb8/0x2e0
[   33.955078]  kunit_try_run_case+0x170/0x3f0
[   33.955140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.955245]  kthread+0x328/0x630
[   33.955280]  ret_from_fork+0x10/0x20
[   33.955711] 
[   33.955735] The buggy address belongs to the object at fff00000c9a67800
[   33.955735]  which belongs to the cache kmalloc-64 of size 64
[   33.955795] The buggy address is located 0 bytes to the right of
[   33.955795]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.955860] 
[   33.955883] The buggy address belongs to the physical page:
[   33.955916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.956406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.956742] page_type: f5(slab)
[   33.956809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.957132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.957250] page dumped because: kasan: bad access detected
[   33.957285] 
[   33.957420] Memory state around the buggy address:
[   33.957466]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.957514]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.957558] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.957599]                                      ^
[   33.957874]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.957948]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.958160] ==================================================================
[   33.959904] ==================================================================
[   33.959970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.960188] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.960450] 
[   33.960490] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.960754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.961151] Hardware name: linux,dummy-virt (DT)
[   33.961187] Call trace:
[   33.961225]  show_stack+0x20/0x38 (C)
[   33.961279]  dump_stack_lvl+0x8c/0xd0
[   33.961352]  print_report+0x118/0x5d0
[   33.961404]  kasan_report+0xdc/0x128
[   33.961452]  kasan_check_range+0x100/0x1a8
[   33.961500]  __kasan_check_write+0x20/0x30
[   33.961593]  kasan_atomics_helper+0xeb8/0x4858
[   33.961761]  kasan_atomics+0x198/0x2e0
[   33.962171]  kunit_try_run_case+0x170/0x3f0
[   33.962299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.962356]  kthread+0x328/0x630
[   33.962401]  ret_from_fork+0x10/0x20
[   33.962535] 
[   33.962633] Allocated by task 296:
[   33.962727]  kasan_save_stack+0x3c/0x68
[   33.962773]  kasan_save_track+0x20/0x40
[   33.962814]  kasan_save_alloc_info+0x40/0x58
[   33.962855]  __kasan_kmalloc+0xd4/0xd8
[   33.962895]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.962979]  kasan_atomics+0xb8/0x2e0
[   33.963052]  kunit_try_run_case+0x170/0x3f0
[   33.963094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.963498]  kthread+0x328/0x630
[   33.963639]  ret_from_fork+0x10/0x20
[   33.964081] 
[   33.964106] The buggy address belongs to the object at fff00000c9a67800
[   33.964106]  which belongs to the cache kmalloc-64 of size 64
[   33.964419] The buggy address is located 0 bytes to the right of
[   33.964419]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.964891] 
[   33.964973] The buggy address belongs to the physical page:
[   33.965064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.965132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.965667] page_type: f5(slab)
[   33.965728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.965866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.965909] page dumped because: kasan: bad access detected
[   33.965950] 
[   33.965970] Memory state around the buggy address:
[   33.966005]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.966050]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.966119] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.966177]                                      ^
[   33.966223]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.966267]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.966307] ==================================================================
[   33.903591] ==================================================================
[   33.903844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.903946] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.904055] 
[   33.904287] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.904624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.904657] Hardware name: linux,dummy-virt (DT)
[   33.904691] Call trace:
[   33.904716]  show_stack+0x20/0x38 (C)
[   33.904768]  dump_stack_lvl+0x8c/0xd0
[   33.904817]  print_report+0x118/0x5d0
[   33.904866]  kasan_report+0xdc/0x128
[   33.904913]  kasan_check_range+0x100/0x1a8
[   33.904962]  __kasan_check_write+0x20/0x30
[   33.905140]  kasan_atomics_helper+0xd3c/0x4858
[   33.905225]  kasan_atomics+0x198/0x2e0
[   33.905719]  kunit_try_run_case+0x170/0x3f0
[   33.905796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.906400]  kthread+0x328/0x630
[   33.906694]  ret_from_fork+0x10/0x20
[   33.906870] 
[   33.907277] Allocated by task 296:
[   33.907438]  kasan_save_stack+0x3c/0x68
[   33.907487]  kasan_save_track+0x20/0x40
[   33.907867]  kasan_save_alloc_info+0x40/0x58
[   33.908109]  __kasan_kmalloc+0xd4/0xd8
[   33.908160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.908549]  kasan_atomics+0xb8/0x2e0
[   33.908912]  kunit_try_run_case+0x170/0x3f0
[   33.909005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.909298]  kthread+0x328/0x630
[   33.909548]  ret_from_fork+0x10/0x20
[   33.909705] 
[   33.909729] The buggy address belongs to the object at fff00000c9a67800
[   33.909729]  which belongs to the cache kmalloc-64 of size 64
[   33.909944] The buggy address is located 0 bytes to the right of
[   33.909944]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.910030] 
[   33.910216] The buggy address belongs to the physical page:
[   33.910350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.910404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.910455] page_type: f5(slab)
[   33.910494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.910915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.910971] page dumped because: kasan: bad access detected
[   33.911477] 
[   33.911569] Memory state around the buggy address:
[   33.911809]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.911975]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.912021] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.912060]                                      ^
[   33.912096]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.912140]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.912179] ==================================================================
[   34.032455] ==================================================================
[   34.032880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   34.032947] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.033154] 
[   34.033186] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.033332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.033404] Hardware name: linux,dummy-virt (DT)
[   34.033437] Call trace:
[   34.033461]  show_stack+0x20/0x38 (C)
[   34.033536]  dump_stack_lvl+0x8c/0xd0
[   34.033584]  print_report+0x118/0x5d0
[   34.033635]  kasan_report+0xdc/0x128
[   34.033682]  __asan_report_load8_noabort+0x20/0x30
[   34.034009]  kasan_atomics_helper+0x3f04/0x4858
[   34.034220]  kasan_atomics+0x198/0x2e0
[   34.034272]  kunit_try_run_case+0x170/0x3f0
[   34.034323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.034646]  kthread+0x328/0x630
[   34.034693]  ret_from_fork+0x10/0x20
[   34.034800] 
[   34.034851] Allocated by task 296:
[   34.034900]  kasan_save_stack+0x3c/0x68
[   34.034945]  kasan_save_track+0x20/0x40
[   34.034992]  kasan_save_alloc_info+0x40/0x58
[   34.035157]  __kasan_kmalloc+0xd4/0xd8
[   34.035263]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.035314]  kasan_atomics+0xb8/0x2e0
[   34.035464]  kunit_try_run_case+0x170/0x3f0
[   34.035533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.035583]  kthread+0x328/0x630
[   34.035643]  ret_from_fork+0x10/0x20
[   34.035681] 
[   34.035745] The buggy address belongs to the object at fff00000c9a67800
[   34.035745]  which belongs to the cache kmalloc-64 of size 64
[   34.035917] The buggy address is located 0 bytes to the right of
[   34.035917]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.035984] 
[   34.036005] The buggy address belongs to the physical page:
[   34.036037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.036092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.036139] page_type: f5(slab)
[   34.036205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.036266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.036308] page dumped because: kasan: bad access detected
[   34.036341] 
[   34.036418] Memory state around the buggy address:
[   34.036453]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.036498]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.037155] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.037203]                                      ^
[   34.037249]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.037295]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.037335] ==================================================================
[   33.848505] ==================================================================
[   33.848569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   33.848896] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.849091] 
[   33.849166] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.849654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.849720] Hardware name: linux,dummy-virt (DT)
[   33.849888] Call trace:
[   33.850036]  show_stack+0x20/0x38 (C)
[   33.850229]  dump_stack_lvl+0x8c/0xd0
[   33.850280]  print_report+0x118/0x5d0
[   33.850571]  kasan_report+0xdc/0x128
[   33.850664]  kasan_check_range+0x100/0x1a8
[   33.850893]  __kasan_check_write+0x20/0x30
[   33.851056]  kasan_atomics_helper+0xb70/0x4858
[   33.851136]  kasan_atomics+0x198/0x2e0
[   33.851448]  kunit_try_run_case+0x170/0x3f0
[   33.851587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.851645]  kthread+0x328/0x630
[   33.851688]  ret_from_fork+0x10/0x20
[   33.851747] 
[   33.851768] Allocated by task 296:
[   33.851799]  kasan_save_stack+0x3c/0x68
[   33.851852]  kasan_save_track+0x20/0x40
[   33.851892]  kasan_save_alloc_info+0x40/0x58
[   33.851933]  __kasan_kmalloc+0xd4/0xd8
[   33.851973]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.852049]  kasan_atomics+0xb8/0x2e0
[   33.852365]  kunit_try_run_case+0x170/0x3f0
[   33.852672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.852725]  kthread+0x328/0x630
[   33.852915]  ret_from_fork+0x10/0x20
[   33.852971] 
[   33.853047] The buggy address belongs to the object at fff00000c9a67800
[   33.853047]  which belongs to the cache kmalloc-64 of size 64
[   33.853187] The buggy address is located 0 bytes to the right of
[   33.853187]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.853322] 
[   33.853344] The buggy address belongs to the physical page:
[   33.853377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.853431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.853981] page_type: f5(slab)
[   33.854395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.854547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.854774] page dumped because: kasan: bad access detected
[   33.854812] 
[   33.855083] Memory state around the buggy address:
[   33.855313]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.855624]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.855732] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.856285]                                      ^
[   33.856338]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.856385]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.856426] ==================================================================
[   34.038536] ==================================================================
[   34.038622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   34.038674] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.038724] 
[   34.038788] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.038937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.038966] Hardware name: linux,dummy-virt (DT)
[   34.038998] Call trace:
[   34.039022]  show_stack+0x20/0x38 (C)
[   34.039070]  dump_stack_lvl+0x8c/0xd0
[   34.039568]  print_report+0x118/0x5d0
[   34.039944]  kasan_report+0xdc/0x128
[   34.040000]  kasan_check_range+0x100/0x1a8
[   34.040097]  __kasan_check_write+0x20/0x30
[   34.040230]  kasan_atomics_helper+0x1414/0x4858
[   34.040302]  kasan_atomics+0x198/0x2e0
[   34.040366]  kunit_try_run_case+0x170/0x3f0
[   34.040418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.040474]  kthread+0x328/0x630
[   34.040525]  ret_from_fork+0x10/0x20
[   34.040633] 
[   34.040653] Allocated by task 296:
[   34.040684]  kasan_save_stack+0x3c/0x68
[   34.041218]  kasan_save_track+0x20/0x40
[   34.041356]  kasan_save_alloc_info+0x40/0x58
[   34.041422]  __kasan_kmalloc+0xd4/0xd8
[   34.041464]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.041505]  kasan_atomics+0xb8/0x2e0
[   34.041544]  kunit_try_run_case+0x170/0x3f0
[   34.041586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.041634]  kthread+0x328/0x630
[   34.041890]  ret_from_fork+0x10/0x20
[   34.041961] 
[   34.042035] The buggy address belongs to the object at fff00000c9a67800
[   34.042035]  which belongs to the cache kmalloc-64 of size 64
[   34.042096] The buggy address is located 0 bytes to the right of
[   34.042096]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.042195] 
[   34.042272] The buggy address belongs to the physical page:
[   34.042305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.042357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.042412] page_type: f5(slab)
[   34.042579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.042820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.042899] page dumped because: kasan: bad access detected
[   34.043573] 
[   34.043702] Memory state around the buggy address:
[   34.043737]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.044232]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.044451] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.044957]                                      ^
[   34.045422]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.045799]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.046402] ==================================================================
[   34.092202] ==================================================================
[   34.093494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   34.094381] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.094798] 
[   34.095022] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.095828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.096021] Hardware name: linux,dummy-virt (DT)
[   34.096394] Call trace:
[   34.096839]  show_stack+0x20/0x38 (C)
[   34.096934]  dump_stack_lvl+0x8c/0xd0
[   34.096983]  print_report+0x118/0x5d0
[   34.097816]  kasan_report+0xdc/0x128
[   34.098094]  kasan_check_range+0x100/0x1a8
[   34.098143]  __kasan_check_write+0x20/0x30
[   34.098827]  kasan_atomics_helper+0x154c/0x4858
[   34.099125]  kasan_atomics+0x198/0x2e0
[   34.099183]  kunit_try_run_case+0x170/0x3f0
[   34.099245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.099302]  kthread+0x328/0x630
[   34.100346]  ret_from_fork+0x10/0x20
[   34.100412] 
[   34.100434] Allocated by task 296:
[   34.100466]  kasan_save_stack+0x3c/0x68
[   34.100512]  kasan_save_track+0x20/0x40
[   34.100561]  kasan_save_alloc_info+0x40/0x58
[   34.102137]  __kasan_kmalloc+0xd4/0xd8
[   34.102934]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.103120]  kasan_atomics+0xb8/0x2e0
[   34.103161]  kunit_try_run_case+0x170/0x3f0
[   34.103204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.104579]  kthread+0x328/0x630
[   34.104723]  ret_from_fork+0x10/0x20
[   34.104928] 
[   34.104955] The buggy address belongs to the object at fff00000c9a67800
[   34.104955]  which belongs to the cache kmalloc-64 of size 64
[   34.105024] The buggy address is located 0 bytes to the right of
[   34.105024]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.105090] 
[   34.105738] The buggy address belongs to the physical page:
[   34.105839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.106128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.106793] page_type: f5(slab)
[   34.106882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.106935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.106978] page dumped because: kasan: bad access detected
[   34.107010] 
[   34.108066] Memory state around the buggy address:
[   34.108278]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.108986]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.109316] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.109976]                                      ^
[   34.110107]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.110531]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.110864] ==================================================================
[   33.742587] ==================================================================
[   33.742654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   33.742707] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.742765] 
[   33.742955] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.743078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.743117] Hardware name: linux,dummy-virt (DT)
[   33.743151] Call trace:
[   33.743178]  show_stack+0x20/0x38 (C)
[   33.743374]  dump_stack_lvl+0x8c/0xd0
[   33.743518]  print_report+0x118/0x5d0
[   33.743575]  kasan_report+0xdc/0x128
[   33.743623]  kasan_check_range+0x100/0x1a8
[   33.743678]  __kasan_check_write+0x20/0x30
[   33.743727]  kasan_atomics_helper+0x3ac/0x4858
[   33.743779]  kasan_atomics+0x198/0x2e0
[   33.743827]  kunit_try_run_case+0x170/0x3f0
[   33.744005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.744106]  kthread+0x328/0x630
[   33.744189]  ret_from_fork+0x10/0x20
[   33.744272] 
[   33.744309] Allocated by task 296:
[   33.744558]  kasan_save_stack+0x3c/0x68
[   33.744687]  kasan_save_track+0x20/0x40
[   33.744763]  kasan_save_alloc_info+0x40/0x58
[   33.744831]  __kasan_kmalloc+0xd4/0xd8
[   33.744945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.744988]  kasan_atomics+0xb8/0x2e0
[   33.745051]  kunit_try_run_case+0x170/0x3f0
[   33.745236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.745469]  ret_from_fork+0x10/0x20
[   33.745597] 
[   33.745647] The buggy address belongs to the object at fff00000c9a67800
[   33.745647]  which belongs to the cache kmalloc-64 of size 64
[   33.745727] The buggy address is located 0 bytes to the right of
[   33.745727]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.746315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.746402] page_type: f5(slab)
[   33.746792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.747361]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.747493] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.747563]                                      ^
[   33.747618]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.747985] ==================================================================
[   33.997780] ==================================================================
[   33.997829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.998121] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.998321] 
[   33.998355] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.998686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.998720] Hardware name: linux,dummy-virt (DT)
[   33.998948] Call trace:
[   33.998981]  show_stack+0x20/0x38 (C)
[   33.999032]  dump_stack_lvl+0x8c/0xd0
[   33.999092]  print_report+0x118/0x5d0
[   33.999158]  kasan_report+0xdc/0x128
[   33.999217]  kasan_check_range+0x100/0x1a8
[   33.999264]  __kasan_check_write+0x20/0x30
[   33.999313]  kasan_atomics_helper+0x1128/0x4858
[   33.999707]  kasan_atomics+0x198/0x2e0
[   33.999762]  kunit_try_run_case+0x170/0x3f0
[   33.999982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.000123]  kthread+0x328/0x630
[   34.000170]  ret_from_fork+0x10/0x20
[   34.000231] 
[   34.000251] Allocated by task 296:
[   34.000282]  kasan_save_stack+0x3c/0x68
[   34.000328]  kasan_save_track+0x20/0x40
[   34.000370]  kasan_save_alloc_info+0x40/0x58
[   34.000410]  __kasan_kmalloc+0xd4/0xd8
[   34.000450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.000492]  kasan_atomics+0xb8/0x2e0
[   34.000581]  kunit_try_run_case+0x170/0x3f0
[   34.001105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.001561]  kthread+0x328/0x630
[   34.001652]  ret_from_fork+0x10/0x20
[   34.001706] 
[   34.001730] The buggy address belongs to the object at fff00000c9a67800
[   34.001730]  which belongs to the cache kmalloc-64 of size 64
[   34.001790] The buggy address is located 0 bytes to the right of
[   34.001790]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.001856] 
[   34.002172] The buggy address belongs to the physical page:
[   34.002225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.002316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.002366] page_type: f5(slab)
[   34.002406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.002457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.002691] page dumped because: kasan: bad access detected
[   34.002882] 
[   34.002905] Memory state around the buggy address:
[   34.002938]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.003276]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.003380] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.003462]                                      ^
[   34.003601]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.003664]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.003705] ==================================================================
[   33.978315] ==================================================================
[   33.978363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.978424] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.978575] 
[   33.978604] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.978740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.978770] Hardware name: linux,dummy-virt (DT)
[   33.978815] Call trace:
[   33.978840]  show_stack+0x20/0x38 (C)
[   33.978888]  dump_stack_lvl+0x8c/0xd0
[   33.979012]  print_report+0x118/0x5d0
[   33.979070]  kasan_report+0xdc/0x128
[   33.979118]  kasan_check_range+0x100/0x1a8
[   33.979172]  __kasan_check_write+0x20/0x30
[   33.979381]  kasan_atomics_helper+0xff0/0x4858
[   33.979547]  kasan_atomics+0x198/0x2e0
[   33.979596]  kunit_try_run_case+0x170/0x3f0
[   33.979704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.979759]  kthread+0x328/0x630
[   33.979804]  ret_from_fork+0x10/0x20
[   33.979851] 
[   33.979872] Allocated by task 296:
[   33.979903]  kasan_save_stack+0x3c/0x68
[   33.979947]  kasan_save_track+0x20/0x40
[   33.979988]  kasan_save_alloc_info+0x40/0x58
[   33.980027]  __kasan_kmalloc+0xd4/0xd8
[   33.980068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.980111]  kasan_atomics+0xb8/0x2e0
[   33.980157]  kunit_try_run_case+0x170/0x3f0
[   33.980529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.980978]  kthread+0x328/0x630
[   33.981669]  ret_from_fork+0x10/0x20
[   33.981925] 
[   33.981949] The buggy address belongs to the object at fff00000c9a67800
[   33.981949]  which belongs to the cache kmalloc-64 of size 64
[   33.982029] The buggy address is located 0 bytes to the right of
[   33.982029]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.982096] 
[   33.982119] The buggy address belongs to the physical page:
[   33.982149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.982203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.982778] page_type: f5(slab)
[   33.982866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.983173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.983519] page dumped because: kasan: bad access detected
[   33.983558] 
[   33.983578] Memory state around the buggy address:
[   33.983614]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.983660]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.983704] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.983744]                                      ^
[   33.983794]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.983838]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.984171] ==================================================================
[   34.159106] ==================================================================
[   34.159154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   34.159203] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.159274] 
[   34.159304] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.159389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.159418] Hardware name: linux,dummy-virt (DT)
[   34.159452] Call trace:
[   34.159544]  show_stack+0x20/0x38 (C)
[   34.159638]  dump_stack_lvl+0x8c/0xd0
[   34.159688]  print_report+0x118/0x5d0
[   34.159735]  kasan_report+0xdc/0x128
[   34.159783]  kasan_check_range+0x100/0x1a8
[   34.159829]  __kasan_check_write+0x20/0x30
[   34.159888]  kasan_atomics_helper+0x175c/0x4858
[   34.160048]  kasan_atomics+0x198/0x2e0
[   34.160163]  kunit_try_run_case+0x170/0x3f0
[   34.160225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.160281]  kthread+0x328/0x630
[   34.160444]  ret_from_fork+0x10/0x20
[   34.160519] 
[   34.160638] Allocated by task 296:
[   34.160670]  kasan_save_stack+0x3c/0x68
[   34.160716]  kasan_save_track+0x20/0x40
[   34.160757]  kasan_save_alloc_info+0x40/0x58
[   34.160797]  __kasan_kmalloc+0xd4/0xd8
[   34.160847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.160952]  kasan_atomics+0xb8/0x2e0
[   34.161010]  kunit_try_run_case+0x170/0x3f0
[   34.161052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.161099]  kthread+0x328/0x630
[   34.161179]  ret_from_fork+0x10/0x20
[   34.161251] 
[   34.161275] The buggy address belongs to the object at fff00000c9a67800
[   34.161275]  which belongs to the cache kmalloc-64 of size 64
[   34.161335] The buggy address is located 0 bytes to the right of
[   34.161335]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.161418] 
[   34.161439] The buggy address belongs to the physical page:
[   34.161472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.161636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.161727] page_type: f5(slab)
[   34.162032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.162083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.162123] page dumped because: kasan: bad access detected
[   34.162158] 
[   34.162177] Memory state around the buggy address:
[   34.162220]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.162271]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.162420] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.162461]                                      ^
[   34.162496]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.162593]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.162760] ==================================================================
[   34.129520] ==================================================================
[   34.129571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   34.130127] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.130564] 
[   34.130697] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.130890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.131094] Hardware name: linux,dummy-virt (DT)
[   34.131586] Call trace:
[   34.131617]  show_stack+0x20/0x38 (C)
[   34.131793]  dump_stack_lvl+0x8c/0xd0
[   34.131843]  print_report+0x118/0x5d0
[   34.131895]  kasan_report+0xdc/0x128
[   34.131943]  __asan_report_load8_noabort+0x20/0x30
[   34.131992]  kasan_atomics_helper+0x3db0/0x4858
[   34.132088]  kasan_atomics+0x198/0x2e0
[   34.132719]  kunit_try_run_case+0x170/0x3f0
[   34.132775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.133733]  kthread+0x328/0x630
[   34.133864]  ret_from_fork+0x10/0x20
[   34.134267] 
[   34.134346] Allocated by task 296:
[   34.134380]  kasan_save_stack+0x3c/0x68
[   34.134735]  kasan_save_track+0x20/0x40
[   34.135032]  kasan_save_alloc_info+0x40/0x58
[   34.135255]  __kasan_kmalloc+0xd4/0xd8
[   34.135712]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.135824]  kasan_atomics+0xb8/0x2e0
[   34.136160]  kunit_try_run_case+0x170/0x3f0
[   34.136222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.136502]  kthread+0x328/0x630
[   34.136927]  ret_from_fork+0x10/0x20
[   34.137101] 
[   34.137127] The buggy address belongs to the object at fff00000c9a67800
[   34.137127]  which belongs to the cache kmalloc-64 of size 64
[   34.137189] The buggy address is located 0 bytes to the right of
[   34.137189]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.137266] 
[   34.137288] The buggy address belongs to the physical page:
[   34.137321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.137378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.138062] page_type: f5(slab)
[   34.138127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.138178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.138534] page dumped because: kasan: bad access detected
[   34.138571] 
[   34.138591] Memory state around the buggy address:
[   34.138625]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.138670]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.138715] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.138756]                                      ^
[   34.138791]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.138836]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.138876] ==================================================================
[   33.837349] ==================================================================
[   33.837405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.837457] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.837509] 
[   33.837543] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.837927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.837989] Hardware name: linux,dummy-virt (DT)
[   33.838027] Call trace:
[   33.838053]  show_stack+0x20/0x38 (C)
[   33.838287]  dump_stack_lvl+0x8c/0xd0
[   33.838389]  print_report+0x118/0x5d0
[   33.838459]  kasan_report+0xdc/0x128
[   33.838520]  kasan_check_range+0x100/0x1a8
[   33.838633]  __kasan_check_write+0x20/0x30
[   33.838685]  kasan_atomics_helper+0xad4/0x4858
[   33.838737]  kasan_atomics+0x198/0x2e0
[   33.838791]  kunit_try_run_case+0x170/0x3f0
[   33.839000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.839078]  kthread+0x328/0x630
[   33.839134]  ret_from_fork+0x10/0x20
[   33.839347] 
[   33.839432] Allocated by task 296:
[   33.839484]  kasan_save_stack+0x3c/0x68
[   33.839530]  kasan_save_track+0x20/0x40
[   33.839584]  kasan_save_alloc_info+0x40/0x58
[   33.839633]  __kasan_kmalloc+0xd4/0xd8
[   33.839737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.839787]  kasan_atomics+0xb8/0x2e0
[   33.839844]  kunit_try_run_case+0x170/0x3f0
[   33.839903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.840037]  kthread+0x328/0x630
[   33.840084]  ret_from_fork+0x10/0x20
[   33.840133] 
[   33.840162] The buggy address belongs to the object at fff00000c9a67800
[   33.840162]  which belongs to the cache kmalloc-64 of size 64
[   33.840476] The buggy address is located 0 bytes to the right of
[   33.840476]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.840590] 
[   33.840689] The buggy address belongs to the physical page:
[   33.840750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.840852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.840902] page_type: f5(slab)
[   33.840942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.840993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.841036] page dumped because: kasan: bad access detected
[   33.841258] 
[   33.841286] Memory state around the buggy address:
[   33.841329]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.841459]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.841528] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.841578]                                      ^
[   33.841796]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.841932]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.842002] ==================================================================
[   33.812291] ==================================================================
[   33.812516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   33.812711] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.812848] 
[   33.812907] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.813024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.813267] Hardware name: linux,dummy-virt (DT)
[   33.813340] Call trace:
[   33.813386]  show_stack+0x20/0x38 (C)
[   33.813516]  dump_stack_lvl+0x8c/0xd0
[   33.813595]  print_report+0x118/0x5d0
[   33.813722]  kasan_report+0xdc/0x128
[   33.813803]  kasan_check_range+0x100/0x1a8
[   33.813929]  __kasan_check_write+0x20/0x30
[   33.813982]  kasan_atomics_helper+0x934/0x4858
[   33.814036]  kasan_atomics+0x198/0x2e0
[   33.814392]  kunit_try_run_case+0x170/0x3f0
[   33.814456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.814539]  kthread+0x328/0x630
[   33.814702]  ret_from_fork+0x10/0x20
[   33.814969] 
[   33.815091]  kasan_save_stack+0x3c/0x68
[   33.815198]  kasan_save_track+0x20/0x40
[   33.815270]  kasan_save_alloc_info+0x40/0x58
[   33.815321]  __kasan_kmalloc+0xd4/0xd8
[   33.815566]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.815646]  kasan_atomics+0xb8/0x2e0
[   33.815713]  kunit_try_run_case+0x170/0x3f0
[   33.815842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.815920]  kthread+0x328/0x630
[   33.816051]  ret_from_fork+0x10/0x20
[   33.816119] 
[   33.816166] The buggy address belongs to the object at fff00000c9a67800
[   33.816166]  which belongs to the cache kmalloc-64 of size 64
[   33.816282] The buggy address is located 0 bytes to the right of
[   33.816282]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.816360] 
[   33.816384] The buggy address belongs to the physical page:
[   33.816422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.816507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.816781] page_type: f5(slab)
[   33.816913] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.816992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.817074] page dumped because: kasan: bad access detected
[   33.817159] 
[   33.817223] Memory state around the buggy address:
[   33.817260]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.817559]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.817643] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.817711]                                      ^
[   33.817801]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.817888]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.817935] ==================================================================
[   33.991384] ==================================================================
[   33.991471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.991522] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.991857] 
[   33.992029] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.992133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.992163] Hardware name: linux,dummy-virt (DT)
[   33.992195] Call trace:
[   33.992233]  show_stack+0x20/0x38 (C)
[   33.992283]  dump_stack_lvl+0x8c/0xd0
[   33.992342]  print_report+0x118/0x5d0
[   33.992393]  kasan_report+0xdc/0x128
[   33.992780]  kasan_check_range+0x100/0x1a8
[   33.992839]  __kasan_check_write+0x20/0x30
[   33.993077]  kasan_atomics_helper+0x10c0/0x4858
[   33.993232]  kasan_atomics+0x198/0x2e0
[   33.993639]  kunit_try_run_case+0x170/0x3f0
[   33.993784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.993924]  kthread+0x328/0x630
[   33.994090]  ret_from_fork+0x10/0x20
[   33.994170] 
[   33.994270] Allocated by task 296:
[   33.994319]  kasan_save_stack+0x3c/0x68
[   33.994364]  kasan_save_track+0x20/0x40
[   33.994405]  kasan_save_alloc_info+0x40/0x58
[   33.994445]  __kasan_kmalloc+0xd4/0xd8
[   33.994491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.994632]  kasan_atomics+0xb8/0x2e0
[   33.994700]  kunit_try_run_case+0x170/0x3f0
[   33.994779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.994886]  kthread+0x328/0x630
[   33.994922]  ret_from_fork+0x10/0x20
[   33.994960] 
[   33.994981] The buggy address belongs to the object at fff00000c9a67800
[   33.994981]  which belongs to the cache kmalloc-64 of size 64
[   33.995040] The buggy address is located 0 bytes to the right of
[   33.995040]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.995106] 
[   33.995128] The buggy address belongs to the physical page:
[   33.995168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.995259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.995308] page_type: f5(slab)
[   33.995381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.995434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.995475] page dumped because: kasan: bad access detected
[   33.995508] 
[   33.995842] Memory state around the buggy address:
[   33.996191]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.996253]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.996298] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.997231]                                      ^
[   33.997345]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.997513]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.997554] ==================================================================
[   34.170308] ==================================================================
[   34.170611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   34.170748] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.170962] 
[   34.170995] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.171082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.171109] Hardware name: linux,dummy-virt (DT)
[   34.171143] Call trace:
[   34.171167]  show_stack+0x20/0x38 (C)
[   34.171229]  dump_stack_lvl+0x8c/0xd0
[   34.171979]  print_report+0x118/0x5d0
[   34.172383]  kasan_report+0xdc/0x128
[   34.172507]  kasan_check_range+0x100/0x1a8
[   34.172898]  __kasan_check_write+0x20/0x30
[   34.173231]  kasan_atomics_helper+0x17ec/0x4858
[   34.173307]  kasan_atomics+0x198/0x2e0
[   34.173700]  kunit_try_run_case+0x170/0x3f0
[   34.173957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.174017]  kthread+0x328/0x630
[   34.174485]  ret_from_fork+0x10/0x20
[   34.174821] 
[   34.174844] Allocated by task 296:
[   34.175081]  kasan_save_stack+0x3c/0x68
[   34.175218]  kasan_save_track+0x20/0x40
[   34.175261]  kasan_save_alloc_info+0x40/0x58
[   34.175302]  __kasan_kmalloc+0xd4/0xd8
[   34.175342]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.175385]  kasan_atomics+0xb8/0x2e0
[   34.175963]  kunit_try_run_case+0x170/0x3f0
[   34.176056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.176107]  kthread+0x328/0x630
[   34.176144]  ret_from_fork+0x10/0x20
[   34.176183] 
[   34.176319] The buggy address belongs to the object at fff00000c9a67800
[   34.176319]  which belongs to the cache kmalloc-64 of size 64
[   34.176384] The buggy address is located 0 bytes to the right of
[   34.176384]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.176554] 
[   34.176820] The buggy address belongs to the physical page:
[   34.177118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.177192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.177254] page_type: f5(slab)
[   34.177296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.177911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.178392] page dumped because: kasan: bad access detected
[   34.178563] 
[   34.178586] Memory state around the buggy address:
[   34.178967]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.179015]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.179060] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.179101]                                      ^
[   34.179137]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.179754]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.180075] ==================================================================
[   33.831637] ==================================================================
[   33.831746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.831816] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.831930] 
[   33.831997] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.832094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.832124] Hardware name: linux,dummy-virt (DT)
[   33.832299] Call trace:
[   33.832391]  show_stack+0x20/0x38 (C)
[   33.832463]  dump_stack_lvl+0x8c/0xd0
[   33.832601]  print_report+0x118/0x5d0
[   33.832697]  kasan_report+0xdc/0x128
[   33.832752]  kasan_check_range+0x100/0x1a8
[   33.832835]  __kasan_check_write+0x20/0x30
[   33.832900]  kasan_atomics_helper+0xa6c/0x4858
[   33.832955]  kasan_atomics+0x198/0x2e0
[   33.833016]  kunit_try_run_case+0x170/0x3f0
[   33.833065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.833121]  kthread+0x328/0x630
[   33.833173]  ret_from_fork+0x10/0x20
[   33.833240] 
[   33.833262] Allocated by task 296:
[   33.833302]  kasan_save_stack+0x3c/0x68
[   33.833346]  kasan_save_track+0x20/0x40
[   33.833402]  kasan_save_alloc_info+0x40/0x58
[   33.833443]  __kasan_kmalloc+0xd4/0xd8
[   33.833482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.833529]  kasan_atomics+0xb8/0x2e0
[   33.833569]  kunit_try_run_case+0x170/0x3f0
[   33.833609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.833656]  kthread+0x328/0x630
[   33.833903]  ret_from_fork+0x10/0x20
[   33.834124] 
[   33.834165] The buggy address belongs to the object at fff00000c9a67800
[   33.834165]  which belongs to the cache kmalloc-64 of size 64
[   33.834400] The buggy address is located 0 bytes to the right of
[   33.834400]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.834620] 
[   33.834661] The buggy address belongs to the physical page:
[   33.834719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.834848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.834929] page_type: f5(slab)
[   33.835006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.835363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.835458] page dumped because: kasan: bad access detected
[   33.835610] 
[   33.835661] Memory state around the buggy address:
[   33.835718]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.836031]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.836100] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.836169]                                      ^
[   33.836227]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.836272]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.836314] ==================================================================
[   33.967826] ==================================================================
[   33.968265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.968389] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.968443] 
[   33.968474] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.968569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.968603] Hardware name: linux,dummy-virt (DT)
[   33.968634] Call trace:
[   33.968658]  show_stack+0x20/0x38 (C)
[   33.968708]  dump_stack_lvl+0x8c/0xd0
[   33.968758]  print_report+0x118/0x5d0
[   33.968808]  kasan_report+0xdc/0x128
[   33.968856]  kasan_check_range+0x100/0x1a8
[   33.969490]  __kasan_check_write+0x20/0x30
[   33.969594]  kasan_atomics_helper+0xf20/0x4858
[   33.969773]  kasan_atomics+0x198/0x2e0
[   33.969831]  kunit_try_run_case+0x170/0x3f0
[   33.969927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.970068]  kthread+0x328/0x630
[   33.970580]  ret_from_fork+0x10/0x20
[   33.970752] 
[   33.970773] Allocated by task 296:
[   33.970883]  kasan_save_stack+0x3c/0x68
[   33.971062]  kasan_save_track+0x20/0x40
[   33.971236]  kasan_save_alloc_info+0x40/0x58
[   33.971347]  __kasan_kmalloc+0xd4/0xd8
[   33.971443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.971532]  kasan_atomics+0xb8/0x2e0
[   33.971571]  kunit_try_run_case+0x170/0x3f0
[   33.971619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.971778]  kthread+0x328/0x630
[   33.971814]  ret_from_fork+0x10/0x20
[   33.971854] 
[   33.971875] The buggy address belongs to the object at fff00000c9a67800
[   33.971875]  which belongs to the cache kmalloc-64 of size 64
[   33.971936] The buggy address is located 0 bytes to the right of
[   33.971936]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.972022] 
[   33.972101] The buggy address belongs to the physical page:
[   33.972134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.972225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.972275] page_type: f5(slab)
[   33.972346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.972399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.972441] page dumped because: kasan: bad access detected
[   33.972600] 
[   33.972624] Memory state around the buggy address:
[   33.972728]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.973080]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.973137] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.973200]                                      ^
[   33.973243]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.973286]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.973326] ==================================================================
[   33.974084] ==================================================================
[   33.974380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.974493] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.974545] 
[   33.974585] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.974780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.974851] Hardware name: linux,dummy-virt (DT)
[   33.974952] Call trace:
[   33.974989]  show_stack+0x20/0x38 (C)
[   33.975037]  dump_stack_lvl+0x8c/0xd0
[   33.975086]  print_report+0x118/0x5d0
[   33.975268]  kasan_report+0xdc/0x128
[   33.975326]  kasan_check_range+0x100/0x1a8
[   33.975425]  __kasan_check_write+0x20/0x30
[   33.975473]  kasan_atomics_helper+0xf88/0x4858
[   33.975564]  kasan_atomics+0x198/0x2e0
[   33.975613]  kunit_try_run_case+0x170/0x3f0
[   33.975735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.975938]  kthread+0x328/0x630
[   33.976007]  ret_from_fork+0x10/0x20
[   33.976055] 
[   33.976077] Allocated by task 296:
[   33.976107]  kasan_save_stack+0x3c/0x68
[   33.976150]  kasan_save_track+0x20/0x40
[   33.976191]  kasan_save_alloc_info+0x40/0x58
[   33.976241]  __kasan_kmalloc+0xd4/0xd8
[   33.976282]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.976325]  kasan_atomics+0xb8/0x2e0
[   33.976364]  kunit_try_run_case+0x170/0x3f0
[   33.976406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.976454]  kthread+0x328/0x630
[   33.976487]  ret_from_fork+0x10/0x20
[   33.976526] 
[   33.976843] The buggy address belongs to the object at fff00000c9a67800
[   33.976843]  which belongs to the cache kmalloc-64 of size 64
[   33.976929] The buggy address is located 0 bytes to the right of
[   33.976929]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.977041] 
[   33.977062] The buggy address belongs to the physical page:
[   33.977095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.977146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.977195] page_type: f5(slab)
[   33.977244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.977295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.977368] page dumped because: kasan: bad access detected
[   33.977405] 
[   33.977425] Memory state around the buggy address:
[   33.977458]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.977657]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.977702] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.977742]                                      ^
[   33.977777]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.977898]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.977973] ==================================================================
[   33.944415] ==================================================================
[   33.944741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.944795] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.944847] 
[   33.944879] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.944966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.944996] Hardware name: linux,dummy-virt (DT)
[   33.945030] Call trace:
[   33.945056]  show_stack+0x20/0x38 (C)
[   33.945463]  dump_stack_lvl+0x8c/0xd0
[   33.945554]  print_report+0x118/0x5d0
[   33.945605]  kasan_report+0xdc/0x128
[   33.945897]  kasan_check_range+0x100/0x1a8
[   33.946002]  __kasan_check_write+0x20/0x30
[   33.946051]  kasan_atomics_helper+0xe44/0x4858
[   33.946320]  kasan_atomics+0x198/0x2e0
[   33.946378]  kunit_try_run_case+0x170/0x3f0
[   33.946429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.946485]  kthread+0x328/0x630
[   33.946532]  ret_from_fork+0x10/0x20
[   33.946581] 
[   33.946623] Allocated by task 296:
[   33.946761]  kasan_save_stack+0x3c/0x68
[   33.946807]  kasan_save_track+0x20/0x40
[   33.946855]  kasan_save_alloc_info+0x40/0x58
[   33.946895]  __kasan_kmalloc+0xd4/0xd8
[   33.946970]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.947130]  kasan_atomics+0xb8/0x2e0
[   33.947171]  kunit_try_run_case+0x170/0x3f0
[   33.947545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.947612]  kthread+0x328/0x630
[   33.947819]  ret_from_fork+0x10/0x20
[   33.947863] 
[   33.948183] The buggy address belongs to the object at fff00000c9a67800
[   33.948183]  which belongs to the cache kmalloc-64 of size 64
[   33.948424] The buggy address is located 0 bytes to the right of
[   33.948424]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.948972] 
[   33.949140] The buggy address belongs to the physical page:
[   33.949223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.949373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.949423] page_type: f5(slab)
[   33.949462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.949521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.949669] page dumped because: kasan: bad access detected
[   33.949706] 
[   33.949729] Memory state around the buggy address:
[   33.949767]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.949823]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.949868] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.949908]                                      ^
[   33.949974]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.950017]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.950057] ==================================================================
[   33.893760] ==================================================================
[   33.893815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.893937] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.893998] 
[   33.894230] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.894533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.894700] Hardware name: linux,dummy-virt (DT)
[   33.894848] Call trace:
[   33.895048]  show_stack+0x20/0x38 (C)
[   33.895127]  dump_stack_lvl+0x8c/0xd0
[   33.895603]  print_report+0x118/0x5d0
[   33.895800]  kasan_report+0xdc/0x128
[   33.896108]  __asan_report_load4_noabort+0x20/0x30
[   33.896237]  kasan_atomics_helper+0x3dd8/0x4858
[   33.896404]  kasan_atomics+0x198/0x2e0
[   33.896461]  kunit_try_run_case+0x170/0x3f0
[   33.896657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.897014]  kthread+0x328/0x630
[   33.897100]  ret_from_fork+0x10/0x20
[   33.897386] 
[   33.897409] Allocated by task 296:
[   33.897489]  kasan_save_stack+0x3c/0x68
[   33.897536]  kasan_save_track+0x20/0x40
[   33.897760]  kasan_save_alloc_info+0x40/0x58
[   33.897817]  __kasan_kmalloc+0xd4/0xd8
[   33.898097]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.898275]  kasan_atomics+0xb8/0x2e0
[   33.898339]  kunit_try_run_case+0x170/0x3f0
[   33.898478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.898528]  kthread+0x328/0x630
[   33.898565]  ret_from_fork+0x10/0x20
[   33.898604] 
[   33.898628] The buggy address belongs to the object at fff00000c9a67800
[   33.898628]  which belongs to the cache kmalloc-64 of size 64
[   33.899284] The buggy address is located 0 bytes to the right of
[   33.899284]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.899602] 
[   33.899626] The buggy address belongs to the physical page:
[   33.899660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.900268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.900476] page_type: f5(slab)
[   33.900631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.900930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.900977] page dumped because: kasan: bad access detected
[   33.901011] 
[   33.901031] Memory state around the buggy address:
[   33.901065]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.901109]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.901155] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.901195]                                      ^
[   33.901656]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.901723]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.901778] ==================================================================
[   34.151067] ==================================================================
[   34.151119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   34.151171] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.151239] 
[   34.151271] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.151358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.151386] Hardware name: linux,dummy-virt (DT)
[   34.151419] Call trace:
[   34.151444]  show_stack+0x20/0x38 (C)
[   34.151493]  dump_stack_lvl+0x8c/0xd0
[   34.151540]  print_report+0x118/0x5d0
[   34.151588]  kasan_report+0xdc/0x128
[   34.151720]  kasan_check_range+0x100/0x1a8
[   34.151793]  __kasan_check_write+0x20/0x30
[   34.151839]  kasan_atomics_helper+0x16d0/0x4858
[   34.151889]  kasan_atomics+0x198/0x2e0
[   34.151937]  kunit_try_run_case+0x170/0x3f0
[   34.152031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.152195]  kthread+0x328/0x630
[   34.152264]  ret_from_fork+0x10/0x20
[   34.152352] 
[   34.152372] Allocated by task 296:
[   34.152402]  kasan_save_stack+0x3c/0x68
[   34.152524]  kasan_save_track+0x20/0x40
[   34.152758]  kasan_save_alloc_info+0x40/0x58
[   34.152811]  __kasan_kmalloc+0xd4/0xd8
[   34.152954]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.153010]  kasan_atomics+0xb8/0x2e0
[   34.153117]  kunit_try_run_case+0x170/0x3f0
[   34.153189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.153315]  kthread+0x328/0x630
[   34.153351]  ret_from_fork+0x10/0x20
[   34.153390] 
[   34.153413] The buggy address belongs to the object at fff00000c9a67800
[   34.153413]  which belongs to the cache kmalloc-64 of size 64
[   34.153520] The buggy address is located 0 bytes to the right of
[   34.153520]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.153657] 
[   34.153681] The buggy address belongs to the physical page:
[   34.153713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.153768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.153817] page_type: f5(slab)
[   34.153855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.153935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.153977] page dumped because: kasan: bad access detected
[   34.154031] 
[   34.154127] Memory state around the buggy address:
[   34.154300]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.154473]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.154524] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.154670]                                      ^
[   34.154760]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.154850]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.154892] ==================================================================
[   33.842478] ==================================================================
[   33.842549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.842604] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.842655] 
[   33.842688] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.843075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.843111] Hardware name: linux,dummy-virt (DT)
[   33.843163] Call trace:
[   33.843189]  show_stack+0x20/0x38 (C)
[   33.843257]  dump_stack_lvl+0x8c/0xd0
[   33.843448]  print_report+0x118/0x5d0
[   33.843526]  kasan_report+0xdc/0x128
[   33.843674]  __asan_report_load4_noabort+0x20/0x30
[   33.843733]  kasan_atomics_helper+0x3dcc/0x4858
[   33.843785]  kasan_atomics+0x198/0x2e0
[   33.844025]  kunit_try_run_case+0x170/0x3f0
[   33.844164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.844235]  kthread+0x328/0x630
[   33.844279]  ret_from_fork+0x10/0x20
[   33.844337] 
[   33.844359] Allocated by task 296:
[   33.844388]  kasan_save_stack+0x3c/0x68
[   33.844431]  kasan_save_track+0x20/0x40
[   33.844472]  kasan_save_alloc_info+0x40/0x58
[   33.844512]  __kasan_kmalloc+0xd4/0xd8
[   33.844561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.844608]  kasan_atomics+0xb8/0x2e0
[   33.844656]  kunit_try_run_case+0x170/0x3f0
[   33.845063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.845190]  kthread+0x328/0x630
[   33.845280]  ret_from_fork+0x10/0x20
[   33.845348] 
[   33.845410] The buggy address belongs to the object at fff00000c9a67800
[   33.845410]  which belongs to the cache kmalloc-64 of size 64
[   33.845607] The buggy address is located 0 bytes to the right of
[   33.845607]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.845696] 
[   33.845993] The buggy address belongs to the physical page:
[   33.846052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.846127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.846276] page_type: f5(slab)
[   33.846344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.846440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.846743] page dumped because: kasan: bad access detected
[   33.846878] 
[   33.846922] Memory state around the buggy address:
[   33.846971]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.847043]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.847174] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.847257]                                      ^
[   33.847293]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.847338]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.847639] ==================================================================
[   34.155067] ==================================================================
[   34.155263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   34.155329] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.155381] 
[   34.155419] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.155629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.155707] Hardware name: linux,dummy-virt (DT)
[   34.155740] Call trace:
[   34.155763]  show_stack+0x20/0x38 (C)
[   34.155813]  dump_stack_lvl+0x8c/0xd0
[   34.155861]  print_report+0x118/0x5d0
[   34.155959]  kasan_report+0xdc/0x128
[   34.156071]  __asan_report_load8_noabort+0x20/0x30
[   34.156124]  kasan_atomics_helper+0x3e10/0x4858
[   34.156174]  kasan_atomics+0x198/0x2e0
[   34.156231]  kunit_try_run_case+0x170/0x3f0
[   34.156282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.156339]  kthread+0x328/0x630
[   34.156392]  ret_from_fork+0x10/0x20
[   34.156442] 
[   34.156462] Allocated by task 296:
[   34.156627]  kasan_save_stack+0x3c/0x68
[   34.156726]  kasan_save_track+0x20/0x40
[   34.156770]  kasan_save_alloc_info+0x40/0x58
[   34.156845]  __kasan_kmalloc+0xd4/0xd8
[   34.156969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.157078]  kasan_atomics+0xb8/0x2e0
[   34.157189]  kunit_try_run_case+0x170/0x3f0
[   34.157260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.157307]  kthread+0x328/0x630
[   34.157365]  ret_from_fork+0x10/0x20
[   34.157404] 
[   34.157427] The buggy address belongs to the object at fff00000c9a67800
[   34.157427]  which belongs to the cache kmalloc-64 of size 64
[   34.157519] The buggy address is located 0 bytes to the right of
[   34.157519]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.157587] 
[   34.157672] The buggy address belongs to the physical page:
[   34.157750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.157806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.157858] page_type: f5(slab)
[   34.157903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.158055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.158121] page dumped because: kasan: bad access detected
[   34.158155] 
[   34.158174] Memory state around the buggy address:
[   34.158216]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.158267]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.158416] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.158458]                                      ^
[   34.158545]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.158717]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.158843] ==================================================================
[   33.824350] ==================================================================
[   33.824413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.824526] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.824715] 
[   33.824875] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.824997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.825108] Hardware name: linux,dummy-virt (DT)
[   33.825169] Call trace:
[   33.825449]  show_stack+0x20/0x38 (C)
[   33.825525]  dump_stack_lvl+0x8c/0xd0
[   33.825605]  print_report+0x118/0x5d0
[   33.825894]  kasan_report+0xdc/0x128
[   33.825989]  kasan_check_range+0x100/0x1a8
[   33.826165]  __kasan_check_write+0x20/0x30
[   33.826257]  kasan_atomics_helper+0xa04/0x4858
[   33.826354]  kasan_atomics+0x198/0x2e0
[   33.826477]  kunit_try_run_case+0x170/0x3f0
[   33.826567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.826661]  kthread+0x328/0x630
[   33.826790]  ret_from_fork+0x10/0x20
[   33.826879] 
[   33.826983] Allocated by task 296:
[   33.827035]  kasan_save_stack+0x3c/0x68
[   33.827081]  kasan_save_track+0x20/0x40
[   33.827121]  kasan_save_alloc_info+0x40/0x58
[   33.827186]  __kasan_kmalloc+0xd4/0xd8
[   33.827480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.827557]  kasan_atomics+0xb8/0x2e0
[   33.827856]  kunit_try_run_case+0x170/0x3f0
[   33.827931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.828064]  kthread+0x328/0x630
[   33.828148]  ret_from_fork+0x10/0x20
[   33.828283] 
[   33.828333] The buggy address belongs to the object at fff00000c9a67800
[   33.828333]  which belongs to the cache kmalloc-64 of size 64
[   33.828447] The buggy address is located 0 bytes to the right of
[   33.828447]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.828669] 
[   33.828697] The buggy address belongs to the physical page:
[   33.828731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.828925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.829005] page_type: f5(slab)
[   33.829128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.829257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.829338] page dumped because: kasan: bad access detected
[   33.829527] 
[   33.829548] Memory state around the buggy address:
[   33.829631]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.829695]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.829817] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.829901]                                      ^
[   33.829939]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.829984]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.830262] ==================================================================
[   34.139108] ==================================================================
[   34.139157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   34.139223] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.140420] 
[   34.140534] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.140657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.140751] Hardware name: linux,dummy-virt (DT)
[   34.140785] Call trace:
[   34.140809]  show_stack+0x20/0x38 (C)
[   34.140861]  dump_stack_lvl+0x8c/0xd0
[   34.140910]  print_report+0x118/0x5d0
[   34.140958]  kasan_report+0xdc/0x128
[   34.141010]  kasan_check_range+0x100/0x1a8
[   34.141057]  __kasan_check_write+0x20/0x30
[   34.141104]  kasan_atomics_helper+0x1644/0x4858
[   34.141155]  kasan_atomics+0x198/0x2e0
[   34.141204]  kunit_try_run_case+0x170/0x3f0
[   34.141274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.141330]  kthread+0x328/0x630
[   34.141374]  ret_from_fork+0x10/0x20
[   34.141423] 
[   34.141444] Allocated by task 296:
[   34.141474]  kasan_save_stack+0x3c/0x68
[   34.141518]  kasan_save_track+0x20/0x40
[   34.141559]  kasan_save_alloc_info+0x40/0x58
[   34.141599]  __kasan_kmalloc+0xd4/0xd8
[   34.141639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.141682]  kasan_atomics+0xb8/0x2e0
[   34.141720]  kunit_try_run_case+0x170/0x3f0
[   34.141763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.141811]  kthread+0x328/0x630
[   34.141845]  ret_from_fork+0x10/0x20
[   34.141883] 
[   34.141905] The buggy address belongs to the object at fff00000c9a67800
[   34.141905]  which belongs to the cache kmalloc-64 of size 64
[   34.141964] The buggy address is located 0 bytes to the right of
[   34.141964]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.142030] 
[   34.142051] The buggy address belongs to the physical page:
[   34.142084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.142138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.143437] page_type: f5(slab)
[   34.143525] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.143577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.143621] page dumped because: kasan: bad access detected
[   34.143874] 
[   34.143901] Memory state around the buggy address:
[   34.144060]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.145534]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.145594] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.145635]                                      ^
[   34.145672]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.145717]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.145757] ==================================================================
[   34.163011] ==================================================================
[   34.163109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   34.163171] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.163232] 
[   34.163262] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.163484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.163515] Hardware name: linux,dummy-virt (DT)
[   34.163548] Call trace:
[   34.163578]  show_stack+0x20/0x38 (C)
[   34.163640]  dump_stack_lvl+0x8c/0xd0
[   34.163689]  print_report+0x118/0x5d0
[   34.163737]  kasan_report+0xdc/0x128
[   34.163787]  __asan_report_load8_noabort+0x20/0x30
[   34.164017]  kasan_atomics_helper+0x3e20/0x4858
[   34.164129]  kasan_atomics+0x198/0x2e0
[   34.164287]  kunit_try_run_case+0x170/0x3f0
[   34.164337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.164504]  kthread+0x328/0x630
[   34.164609]  ret_from_fork+0x10/0x20
[   34.164689] 
[   34.164710] Allocated by task 296:
[   34.164872]  kasan_save_stack+0x3c/0x68
[   34.164919]  kasan_save_track+0x20/0x40
[   34.164999]  kasan_save_alloc_info+0x40/0x58
[   34.165041]  __kasan_kmalloc+0xd4/0xd8
[   34.165082]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.165124]  kasan_atomics+0xb8/0x2e0
[   34.165256]  kunit_try_run_case+0x170/0x3f0
[   34.165298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.165345]  kthread+0x328/0x630
[   34.165381]  ret_from_fork+0x10/0x20
[   34.165459] 
[   34.165551] The buggy address belongs to the object at fff00000c9a67800
[   34.165551]  which belongs to the cache kmalloc-64 of size 64
[   34.165728] The buggy address is located 0 bytes to the right of
[   34.165728]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.165823] 
[   34.165921] The buggy address belongs to the physical page:
[   34.166255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.166402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.166623] page_type: f5(slab)
[   34.166766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.167097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.167144] page dumped because: kasan: bad access detected
[   34.167184] 
[   34.167480] Memory state around the buggy address:
[   34.167693]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.168172]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.168850] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.168901]                                      ^
[   34.168939]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.168982]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.169419] ==================================================================
[   33.805753] ==================================================================
[   33.805894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.805952] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.806023] 
[   33.806282] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.806427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.806456] Hardware name: linux,dummy-virt (DT)
[   33.806489] Call trace:
[   33.806530]  show_stack+0x20/0x38 (C)
[   33.806584]  dump_stack_lvl+0x8c/0xd0
[   33.806641]  print_report+0x118/0x5d0
[   33.806925]  kasan_report+0xdc/0x128
[   33.807049]  __asan_report_load4_noabort+0x20/0x30
[   33.807104]  kasan_atomics_helper+0x42d8/0x4858
[   33.807156]  kasan_atomics+0x198/0x2e0
[   33.807425]  kunit_try_run_case+0x170/0x3f0
[   33.807537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.807629]  kthread+0x328/0x630
[   33.807677]  ret_from_fork+0x10/0x20
[   33.807746] 
[   33.807991] Allocated by task 296:
[   33.808052]  kasan_save_stack+0x3c/0x68
[   33.808113]  kasan_save_track+0x20/0x40
[   33.808203]  kasan_save_alloc_info+0x40/0x58
[   33.808275]  __kasan_kmalloc+0xd4/0xd8
[   33.808383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.808441]  kasan_atomics+0xb8/0x2e0
[   33.808490]  kunit_try_run_case+0x170/0x3f0
[   33.808552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.808691]  kthread+0x328/0x630
[   33.808726]  ret_from_fork+0x10/0x20
[   33.809043] 
[   33.809105] The buggy address belongs to the object at fff00000c9a67800
[   33.809105]  which belongs to the cache kmalloc-64 of size 64
[   33.809263] The buggy address is located 0 bytes to the right of
[   33.809263]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.809416] 
[   33.809439] The buggy address belongs to the physical page:
[   33.809578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.809726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.809850] page_type: f5(slab)
[   33.809918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.810045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.810089] page dumped because: kasan: bad access detected
[   33.810330] 
[   33.810424] Memory state around the buggy address:
[   33.810459]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.810717]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.810841] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.810902]                                      ^
[   33.810973]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.811083]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.811143] ==================================================================
[   34.069856] ==================================================================
[   34.069909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   34.069962] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.071565] 
[   34.071692] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.071785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.071813] Hardware name: linux,dummy-virt (DT)
[   34.072956] Call trace:
[   34.073077]  show_stack+0x20/0x38 (C)
[   34.074116]  dump_stack_lvl+0x8c/0xd0
[   34.074339]  print_report+0x118/0x5d0
[   34.074866]  kasan_report+0xdc/0x128
[   34.075013]  kasan_check_range+0x100/0x1a8
[   34.075199]  __kasan_check_write+0x20/0x30
[   34.075519]  kasan_atomics_helper+0x14e4/0x4858
[   34.075577]  kasan_atomics+0x198/0x2e0
[   34.076204]  kunit_try_run_case+0x170/0x3f0
[   34.076276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.076334]  kthread+0x328/0x630
[   34.076379]  ret_from_fork+0x10/0x20
[   34.077246] 
[   34.077875] Allocated by task 296:
[   34.077928]  kasan_save_stack+0x3c/0x68
[   34.078414]  kasan_save_track+0x20/0x40
[   34.079204]  kasan_save_alloc_info+0x40/0x58
[   34.079347]  __kasan_kmalloc+0xd4/0xd8
[   34.079700]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.079805]  kasan_atomics+0xb8/0x2e0
[   34.080034]  kunit_try_run_case+0x170/0x3f0
[   34.080078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.080126]  kthread+0x328/0x630
[   34.080899]  ret_from_fork+0x10/0x20
[   34.081314] 
[   34.081781] The buggy address belongs to the object at fff00000c9a67800
[   34.081781]  which belongs to the cache kmalloc-64 of size 64
[   34.082634] The buggy address is located 0 bytes to the right of
[   34.082634]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.083570] 
[   34.083757] The buggy address belongs to the physical page:
[   34.083848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.084044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.084605] page_type: f5(slab)
[   34.085074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.085404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.085481] page dumped because: kasan: bad access detected
[   34.085515] 
[   34.085938] Memory state around the buggy address:
[   34.086218]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.086888]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.086939] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.086980]                                      ^
[   34.087017]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.087712]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.088251] ==================================================================
[   33.748379] ==================================================================
[   33.748431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   33.748647] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.748851] 
[   33.748907] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.749075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.749134] Hardware name: linux,dummy-virt (DT)
[   33.749190] Call trace:
[   33.749330]  show_stack+0x20/0x38 (C)
[   33.749390]  dump_stack_lvl+0x8c/0xd0
[   33.749524]  print_report+0x118/0x5d0
[   33.749580]  kasan_report+0xdc/0x128
[   33.749687]  kasan_check_range+0x100/0x1a8
[   33.749769]  __kasan_check_write+0x20/0x30
[   33.749970]  kasan_atomics_helper+0x414/0x4858
[   33.750116]  kasan_atomics+0x198/0x2e0
[   33.750186]  kunit_try_run_case+0x170/0x3f0
[   33.750314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.750404]  kthread+0x328/0x630
[   33.750456]  ret_from_fork+0x10/0x20
[   33.750700] 
[   33.750754] Allocated by task 296:
[   33.750785]  kasan_save_stack+0x3c/0x68
[   33.750929]  kasan_save_track+0x20/0x40
[   33.751013]  kasan_save_alloc_info+0x40/0x58
[   33.751063]  __kasan_kmalloc+0xd4/0xd8
[   33.751104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.751194]  kunit_try_run_case+0x170/0x3f0
[   33.751246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.751293]  kthread+0x328/0x630
[   33.751344]  ret_from_fork+0x10/0x20
[   33.751390] 
[   33.751480] The buggy address is located 0 bytes to the right of
[   33.751480]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.751716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.751765] page_type: f5(slab)
[   33.751806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.752087]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.752163] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.752205]                                      ^
[   33.752252]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.752294]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.752724] ==================================================================
[   34.048498] ==================================================================
[   34.048621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   34.048937] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.049524] 
[   34.050160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.050295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.051170] Hardware name: linux,dummy-virt (DT)
[   34.051502] Call trace:
[   34.051696]  show_stack+0x20/0x38 (C)
[   34.051784]  dump_stack_lvl+0x8c/0xd0
[   34.051834]  print_report+0x118/0x5d0
[   34.052725]  kasan_report+0xdc/0x128
[   34.053288]  kasan_check_range+0x100/0x1a8
[   34.053823]  __kasan_check_write+0x20/0x30
[   34.054187]  kasan_atomics_helper+0x147c/0x4858
[   34.054822]  kasan_atomics+0x198/0x2e0
[   34.055335]  kunit_try_run_case+0x170/0x3f0
[   34.055878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.056753]  kthread+0x328/0x630
[   34.056820]  ret_from_fork+0x10/0x20
[   34.057930] 
[   34.058044] Allocated by task 296:
[   34.058123]  kasan_save_stack+0x3c/0x68
[   34.058303]  kasan_save_track+0x20/0x40
[   34.058348]  kasan_save_alloc_info+0x40/0x58
[   34.058695]  __kasan_kmalloc+0xd4/0xd8
[   34.059131]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.059407]  kasan_atomics+0xb8/0x2e0
[   34.059848]  kunit_try_run_case+0x170/0x3f0
[   34.060873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.060975]  kthread+0x328/0x630
[   34.061010]  ret_from_fork+0x10/0x20
[   34.061050] 
[   34.061587] The buggy address belongs to the object at fff00000c9a67800
[   34.061587]  which belongs to the cache kmalloc-64 of size 64
[   34.062106] The buggy address is located 0 bytes to the right of
[   34.062106]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.062181] 
[   34.062877] The buggy address belongs to the physical page:
[   34.063656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.064109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.064361] page_type: f5(slab)
[   34.064884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.065204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.065261] page dumped because: kasan: bad access detected
[   34.065294] 
[   34.066054] Memory state around the buggy address:
[   34.066114]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.066394]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.067022] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.067131]                                      ^
[   34.067170]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.068039]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.068504] ==================================================================
[   33.759253] ==================================================================
[   33.759322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   33.759376] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.759446] 
[   33.759690] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.759796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.759824] Hardware name: linux,dummy-virt (DT)
[   33.759867] Call trace:
[   33.759936]  show_stack+0x20/0x38 (C)
[   33.759992]  dump_stack_lvl+0x8c/0xd0
[   33.760042]  print_report+0x118/0x5d0
[   33.760153]  kasan_report+0xdc/0x128
[   33.760218]  kasan_check_range+0x100/0x1a8
[   33.760277]  __kasan_check_write+0x20/0x30
[   33.760345]  kasan_atomics_helper+0x4e4/0x4858
[   33.760414]  kasan_atomics+0x198/0x2e0
[   33.760619]  kunit_try_run_case+0x170/0x3f0
[   33.760808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.760898]  kthread+0x328/0x630
[   33.761041]  ret_from_fork+0x10/0x20
[   33.761121] 
[   33.761291] Allocated by task 296:
[   33.761558]  kasan_save_track+0x20/0x40
[   33.762041]  kunit_try_run_case+0x170/0x3f0
[   33.762443] 
[   33.762972] The buggy address belongs to the physical page:
[   33.763473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.763701] Memory state around the buggy address:
[   33.764165]                                      ^
[   33.764392]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.765563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   33.765970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.766063]  show_stack+0x20/0x38 (C)
[   33.766222]  print_report+0x118/0x5d0
[   33.766378]  __kasan_check_write+0x20/0x30
[   33.766479]  kasan_atomics+0x198/0x2e0
[   33.766638]  kthread+0x328/0x630
[   33.766793]  kasan_save_stack+0x3c/0x68
[   33.767137]  kthread+0x328/0x630
[   33.767440] The buggy address is located 0 bytes to the right of
[   33.767440]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.769327] ==================================================================
[   34.010112] ==================================================================
[   34.010164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   34.010230] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.010281] 
[   34.010310] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.010396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.010425] Hardware name: linux,dummy-virt (DT)
[   34.010458] Call trace:
[   34.010481]  show_stack+0x20/0x38 (C)
[   34.010528]  dump_stack_lvl+0x8c/0xd0
[   34.010577]  print_report+0x118/0x5d0
[   34.010624]  kasan_report+0xdc/0x128
[   34.010674]  kasan_check_range+0x100/0x1a8
[   34.010721]  __kasan_check_write+0x20/0x30
[   34.010786]  kasan_atomics_helper+0x11f8/0x4858
[   34.010838]  kasan_atomics+0x198/0x2e0
[   34.010892]  kunit_try_run_case+0x170/0x3f0
[   34.011053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.011109]  kthread+0x328/0x630
[   34.011245]  ret_from_fork+0x10/0x20
[   34.011301] 
[   34.011385] Allocated by task 296:
[   34.011488]  kasan_save_stack+0x3c/0x68
[   34.011533]  kasan_save_track+0x20/0x40
[   34.011580]  kasan_save_alloc_info+0x40/0x58
[   34.011665]  __kasan_kmalloc+0xd4/0xd8
[   34.011721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.011891]  kasan_atomics+0xb8/0x2e0
[   34.011930]  kunit_try_run_case+0x170/0x3f0
[   34.011972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.012020]  kthread+0x328/0x630
[   34.012060]  ret_from_fork+0x10/0x20
[   34.012579] 
[   34.012627] The buggy address belongs to the object at fff00000c9a67800
[   34.012627]  which belongs to the cache kmalloc-64 of size 64
[   34.012692] The buggy address is located 0 bytes to the right of
[   34.012692]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.012758] 
[   34.012780] The buggy address belongs to the physical page:
[   34.012814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.012868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.013828] page_type: f5(slab)
[   34.013947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.013997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.014050] page dumped because: kasan: bad access detected
[   34.014184] 
[   34.014642] Memory state around the buggy address:
[   34.014695]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.014742]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.014787] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.014838]                                      ^
[   34.014976]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.015133]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.015173] ==================================================================
[   33.753536] ==================================================================
[   33.753590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   33.753702] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.753760] 
[   33.753791] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.754055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.754098] Hardware name: linux,dummy-virt (DT)
[   33.754199] Call trace:
[   33.754239]  show_stack+0x20/0x38 (C)
[   33.754311]  dump_stack_lvl+0x8c/0xd0
[   33.754539]  print_report+0x118/0x5d0
[   33.754611]  kasan_report+0xdc/0x128
[   33.754696]  kasan_check_range+0x100/0x1a8
[   33.754755]  __kasan_check_write+0x20/0x30
[   33.754812]  kasan_atomics_helper+0x47c/0x4858
[   33.754916]  kasan_atomics+0x198/0x2e0
[   33.755186]  kunit_try_run_case+0x170/0x3f0
[   33.755302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.755382]  kthread+0x328/0x630
[   33.755428]  ret_from_fork+0x10/0x20
[   33.755483] 
[   33.755543] Allocated by task 296:
[   33.755583]  kasan_save_stack+0x3c/0x68
[   33.755629]  kasan_save_track+0x20/0x40
[   33.755678]  kasan_save_alloc_info+0x40/0x58
[   33.755773]  __kasan_kmalloc+0xd4/0xd8
[   33.755815]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.755857]  kasan_atomics+0xb8/0x2e0
[   33.756109]  kunit_try_run_case+0x170/0x3f0
[   33.756181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.756252]  kthread+0x328/0x630
[   33.756289]  ret_from_fork+0x10/0x20
[   33.756399] 
[   33.756424] The buggy address belongs to the object at fff00000c9a67800
[   33.756424]  which belongs to the cache kmalloc-64 of size 64
[   33.756485] The buggy address is located 0 bytes to the right of
[   33.756485]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.756821] The buggy address belongs to the physical page:
[   33.757081] page_type: f5(slab)
[   33.757121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.757174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.757548] 
[   33.757569] Memory state around the buggy address:
[   33.757969]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.758119]                                      ^
[   33.758263]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.758335]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.758443] ==================================================================
[   34.020815] ==================================================================
[   34.021031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   34.021149] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.021324] 
[   34.021390] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.021477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.021512] Hardware name: linux,dummy-virt (DT)
[   34.021648] Call trace:
[   34.021672]  show_stack+0x20/0x38 (C)
[   34.021740]  dump_stack_lvl+0x8c/0xd0
[   34.021790]  print_report+0x118/0x5d0
[   34.021843]  kasan_report+0xdc/0x128
[   34.022053]  kasan_check_range+0x100/0x1a8
[   34.022152]  __kasan_check_write+0x20/0x30
[   34.022197]  kasan_atomics_helper+0x12d8/0x4858
[   34.022261]  kasan_atomics+0x198/0x2e0
[   34.022310]  kunit_try_run_case+0x170/0x3f0
[   34.022361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.022423]  kthread+0x328/0x630
[   34.022496]  ret_from_fork+0x10/0x20
[   34.022586] 
[   34.022607] Allocated by task 296:
[   34.022639]  kasan_save_stack+0x3c/0x68
[   34.022684]  kasan_save_track+0x20/0x40
[   34.022725]  kasan_save_alloc_info+0x40/0x58
[   34.022765]  __kasan_kmalloc+0xd4/0xd8
[   34.022811]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.022978]  kasan_atomics+0xb8/0x2e0
[   34.023045]  kunit_try_run_case+0x170/0x3f0
[   34.023118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.023804]  kthread+0x328/0x630
[   34.024074]  ret_from_fork+0x10/0x20
[   34.024139] 
[   34.024163] The buggy address belongs to the object at fff00000c9a67800
[   34.024163]  which belongs to the cache kmalloc-64 of size 64
[   34.024234] The buggy address is located 0 bytes to the right of
[   34.024234]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.024300] 
[   34.024322] The buggy address belongs to the physical page:
[   34.024355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.024409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.024805] page_type: f5(slab)
[   34.025176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.025237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.025279] page dumped because: kasan: bad access detected
[   34.025314] 
[   34.025451] Memory state around the buggy address:
[   34.025489]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.025534]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.025748] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.025888]                                      ^
[   34.026325]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.026422]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.026462] ==================================================================
[   33.926375] ==================================================================
[   33.926430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.926983] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.927522] 
[   33.927561] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.927786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.928343] Hardware name: linux,dummy-virt (DT)
[   33.928466] Call trace:
[   33.928667]  show_stack+0x20/0x38 (C)
[   33.929001]  dump_stack_lvl+0x8c/0xd0
[   33.929252]  print_report+0x118/0x5d0
[   33.929469]  kasan_report+0xdc/0x128
[   33.929652]  kasan_check_range+0x100/0x1a8
[   33.929754]  __kasan_check_read+0x20/0x30
[   33.930098]  kasan_atomics_helper+0xdd4/0x4858
[   33.930234]  kasan_atomics+0x198/0x2e0
[   33.930559]  kunit_try_run_case+0x170/0x3f0
[   33.930612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.930669]  kthread+0x328/0x630
[   33.931306]  ret_from_fork+0x10/0x20
[   33.931463] 
[   33.931487] Allocated by task 296:
[   33.931519]  kasan_save_stack+0x3c/0x68
[   33.931712]  kasan_save_track+0x20/0x40
[   33.931758]  kasan_save_alloc_info+0x40/0x58
[   33.931805]  __kasan_kmalloc+0xd4/0xd8
[   33.931845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.932291]  kasan_atomics+0xb8/0x2e0
[   33.932570]  kunit_try_run_case+0x170/0x3f0
[   33.933034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.933255]  kthread+0x328/0x630
[   33.933304]  ret_from_fork+0x10/0x20
[   33.933390] 
[   33.933436] The buggy address belongs to the object at fff00000c9a67800
[   33.933436]  which belongs to the cache kmalloc-64 of size 64
[   33.933763] The buggy address is located 0 bytes to the right of
[   33.933763]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.934236] 
[   33.934265] The buggy address belongs to the physical page:
[   33.934562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.934621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.934985] page_type: f5(slab)
[   33.935363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.935658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.935775] page dumped because: kasan: bad access detected
[   33.935816] 
[   33.936002] Memory state around the buggy address:
[   33.936314]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.936507]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.936629] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.936816]                                      ^
[   33.936955]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.937033]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.937075] ==================================================================
[   34.026886] ==================================================================
[   34.026936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   34.026987] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   34.027038] 
[   34.027070] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.027155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.027184] Hardware name: linux,dummy-virt (DT)
[   34.027241] Call trace:
[   34.027266]  show_stack+0x20/0x38 (C)
[   34.027315]  dump_stack_lvl+0x8c/0xd0
[   34.027364]  print_report+0x118/0x5d0
[   34.027824]  kasan_report+0xdc/0x128
[   34.027946]  kasan_check_range+0x100/0x1a8
[   34.027992]  __kasan_check_write+0x20/0x30
[   34.028038]  kasan_atomics_helper+0x1384/0x4858
[   34.028089]  kasan_atomics+0x198/0x2e0
[   34.028521]  kunit_try_run_case+0x170/0x3f0
[   34.028702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.028759]  kthread+0x328/0x630
[   34.029159]  ret_from_fork+0x10/0x20
[   34.029247] 
[   34.029268] Allocated by task 296:
[   34.029299]  kasan_save_stack+0x3c/0x68
[   34.029344]  kasan_save_track+0x20/0x40
[   34.029453]  kasan_save_alloc_info+0x40/0x58
[   34.029607]  __kasan_kmalloc+0xd4/0xd8
[   34.029648]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.029690]  kasan_atomics+0xb8/0x2e0
[   34.029731]  kunit_try_run_case+0x170/0x3f0
[   34.029777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.029827]  kthread+0x328/0x630
[   34.029861]  ret_from_fork+0x10/0x20
[   34.029901] 
[   34.029925] The buggy address belongs to the object at fff00000c9a67800
[   34.029925]  which belongs to the cache kmalloc-64 of size 64
[   34.029984] The buggy address is located 0 bytes to the right of
[   34.029984]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   34.030090] 
[   34.030159] The buggy address belongs to the physical page:
[   34.030191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   34.030254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.030303] page_type: f5(slab)
[   34.030341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.030678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.030972] page dumped because: kasan: bad access detected
[   34.031011] 
[   34.031034] Memory state around the buggy address:
[   34.031066]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.031169]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.031463] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.031566]                                      ^
[   34.031882]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.031937]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.032099] ==================================================================
[   33.818849] ==================================================================
[   33.819200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.819339] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.819402] 
[   33.819484] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.819573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.819610] Hardware name: linux,dummy-virt (DT)
[   33.819644] Call trace:
[   33.819669]  show_stack+0x20/0x38 (C)
[   33.819719]  dump_stack_lvl+0x8c/0xd0
[   33.819768]  print_report+0x118/0x5d0
[   33.819816]  kasan_report+0xdc/0x128
[   33.819864]  kasan_check_range+0x100/0x1a8
[   33.819910]  __kasan_check_write+0x20/0x30
[   33.819957]  kasan_atomics_helper+0x99c/0x4858
[   33.820008]  kasan_atomics+0x198/0x2e0
[   33.820054]  kunit_try_run_case+0x170/0x3f0
[   33.820104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.820158]  kthread+0x328/0x630
[   33.820201]  ret_from_fork+0x10/0x20
[   33.820260] 
[   33.820283] Allocated by task 296:
[   33.820311]  kasan_save_stack+0x3c/0x68
[   33.820355]  kasan_save_track+0x20/0x40
[   33.820405]  kasan_save_alloc_info+0x40/0x58
[   33.820445]  __kasan_kmalloc+0xd4/0xd8
[   33.820490]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.820533]  kasan_atomics+0xb8/0x2e0
[   33.820973]  kunit_try_run_case+0x170/0x3f0
[   33.821019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.821096]  kthread+0x328/0x630
[   33.821133]  ret_from_fork+0x10/0x20
[   33.821429] 
[   33.821485] The buggy address belongs to the object at fff00000c9a67800
[   33.821485]  which belongs to the cache kmalloc-64 of size 64
[   33.821627] The buggy address is located 0 bytes to the right of
[   33.821627]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.821725] 
[   33.821969] The buggy address belongs to the physical page:
[   33.822031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.822107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.822262] page_type: f5(slab)
[   33.822317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.822370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.822657] page dumped because: kasan: bad access detected
[   33.822734] 
[   33.822782] Memory state around the buggy address:
[   33.822891]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.823129]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.823217] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.823330]                                      ^
[   33.823386]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.823441]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.823703] ==================================================================
[   33.985065] ==================================================================
[   33.985134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.985191] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.985406] 
[   33.985445] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.985604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.985713] Hardware name: linux,dummy-virt (DT)
[   33.985753] Call trace:
[   33.985806]  show_stack+0x20/0x38 (C)
[   33.985856]  dump_stack_lvl+0x8c/0xd0
[   33.985949]  print_report+0x118/0x5d0
[   33.986057]  kasan_report+0xdc/0x128
[   33.986165]  kasan_check_range+0x100/0x1a8
[   33.986228]  __kasan_check_write+0x20/0x30
[   33.986417]  kasan_atomics_helper+0x1058/0x4858
[   33.986522]  kasan_atomics+0x198/0x2e0
[   33.986647]  kunit_try_run_case+0x170/0x3f0
[   33.986703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.986906]  kthread+0x328/0x630
[   33.986957]  ret_from_fork+0x10/0x20
[   33.987005] 
[   33.987025] Allocated by task 296:
[   33.987054]  kasan_save_stack+0x3c/0x68
[   33.987103]  kasan_save_track+0x20/0x40
[   33.987229]  kasan_save_alloc_info+0x40/0x58
[   33.987269]  __kasan_kmalloc+0xd4/0xd8
[   33.987310]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.987376]  kasan_atomics+0xb8/0x2e0
[   33.987417]  kunit_try_run_case+0x170/0x3f0
[   33.987834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.988095]  kthread+0x328/0x630
[   33.988139]  ret_from_fork+0x10/0x20
[   33.988178] 
[   33.988200] The buggy address belongs to the object at fff00000c9a67800
[   33.988200]  which belongs to the cache kmalloc-64 of size 64
[   33.988712] The buggy address is located 0 bytes to the right of
[   33.988712]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.989217] 
[   33.989246] The buggy address belongs to the physical page:
[   33.989280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.989334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.989384] page_type: f5(slab)
[   33.989424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.989477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.989675] page dumped because: kasan: bad access detected
[   33.989835] 
[   33.989880] Memory state around the buggy address:
[   33.989916]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.989962]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.990160] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.990291]                                      ^
[   33.990501]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.990557]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.990631] ==================================================================
[   33.937967] ==================================================================
[   33.938019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.938082] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296
[   33.938337] 
[   33.938372] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   33.938462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.938492] Hardware name: linux,dummy-virt (DT)
[   33.938533] Call trace:
[   33.938632]  show_stack+0x20/0x38 (C)
[   33.938790]  dump_stack_lvl+0x8c/0xd0
[   33.938840]  print_report+0x118/0x5d0
[   33.939007]  kasan_report+0xdc/0x128
[   33.939056]  __asan_report_load8_noabort+0x20/0x30
[   33.939110]  kasan_atomics_helper+0x3f58/0x4858
[   33.939162]  kasan_atomics+0x198/0x2e0
[   33.939704]  kunit_try_run_case+0x170/0x3f0
[   33.939901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.939992]  kthread+0x328/0x630
[   33.940156]  ret_from_fork+0x10/0x20
[   33.940511] 
[   33.940537] Allocated by task 296:
[   33.940569]  kasan_save_stack+0x3c/0x68
[   33.940624]  kasan_save_track+0x20/0x40
[   33.941027]  kasan_save_alloc_info+0x40/0x58
[   33.941074]  __kasan_kmalloc+0xd4/0xd8
[   33.941113]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.941155]  kasan_atomics+0xb8/0x2e0
[   33.941493]  kunit_try_run_case+0x170/0x3f0
[   33.941811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.941891]  kthread+0x328/0x630
[   33.941928]  ret_from_fork+0x10/0x20
[   33.941966] 
[   33.941988] The buggy address belongs to the object at fff00000c9a67800
[   33.941988]  which belongs to the cache kmalloc-64 of size 64
[   33.942218] The buggy address is located 0 bytes to the right of
[   33.942218]  allocated 48-byte region [fff00000c9a67800, fff00000c9a67830)
[   33.942748] 
[   33.942776] The buggy address belongs to the physical page:
[   33.942843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67
[   33.942927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.942978] page_type: f5(slab)
[   33.943174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.943509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.943558] page dumped because: kasan: bad access detected
[   33.943605] 
[   33.943625] Memory state around the buggy address:
[   33.943688]  fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.943738]  fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.943783] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.943825]                                      ^
[   33.943860]  fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.943937]  fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.943995] ==================================================================

[   27.479957] ==================================================================
[   27.480210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   27.480566] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.480938] 
[   27.481056] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.481111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.481125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.481150] Call Trace:
[   27.481169]  <TASK>
[   27.481199]  dump_stack_lvl+0x73/0xb0
[   27.481230]  print_report+0xd1/0x610
[   27.481264]  ? __virt_addr_valid+0x1db/0x2d0
[   27.481290]  ? kasan_atomics_helper+0x224c/0x5450
[   27.481321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.481351]  ? kasan_atomics_helper+0x224c/0x5450
[   27.481381]  kasan_report+0x141/0x180
[   27.481406]  ? kasan_atomics_helper+0x224c/0x5450
[   27.481440]  kasan_check_range+0x10c/0x1c0
[   27.481467]  __kasan_check_write+0x18/0x20
[   27.481495]  kasan_atomics_helper+0x224c/0x5450
[   27.481526]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.481557]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.481585]  ? kasan_atomics+0x152/0x310
[   27.481614]  kasan_atomics+0x1dc/0x310
[   27.481641]  ? __pfx_kasan_atomics+0x10/0x10
[   27.481669]  ? __pfx_read_tsc+0x10/0x10
[   27.481695]  ? ktime_get_ts64+0x86/0x230
[   27.481723]  kunit_try_run_case+0x1a5/0x480
[   27.481747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.481770]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.481794]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.481825]  ? __kthread_parkme+0x82/0x180
[   27.481847]  ? preempt_count_sub+0x50/0x80
[   27.481873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.481897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.481936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.481964]  kthread+0x337/0x6f0
[   27.481987]  ? trace_preempt_on+0x20/0xc0
[   27.482014]  ? __pfx_kthread+0x10/0x10
[   27.482038]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.482068]  ? calculate_sigpending+0x7b/0xa0
[   27.482097]  ? __pfx_kthread+0x10/0x10
[   27.482122]  ret_from_fork+0x116/0x1d0
[   27.482144]  ? __pfx_kthread+0x10/0x10
[   27.482167]  ret_from_fork_asm+0x1a/0x30
[   27.482203]  </TASK>
[   27.482215] 
[   27.489234] Allocated by task 313:
[   27.489372]  kasan_save_stack+0x45/0x70
[   27.489510]  kasan_save_track+0x18/0x40
[   27.489686]  kasan_save_alloc_info+0x3b/0x50
[   27.489887]  __kasan_kmalloc+0xb7/0xc0
[   27.490065]  __kmalloc_cache_noprof+0x189/0x420
[   27.490292]  kasan_atomics+0x95/0x310
[   27.490466]  kunit_try_run_case+0x1a5/0x480
[   27.490609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.490785]  kthread+0x337/0x6f0
[   27.490902]  ret_from_fork+0x116/0x1d0
[   27.491097]  ret_from_fork_asm+0x1a/0x30
[   27.491299] 
[   27.491392] The buggy address belongs to the object at ffff8881059cb500
[   27.491392]  which belongs to the cache kmalloc-64 of size 64
[   27.492064] The buggy address is located 0 bytes to the right of
[   27.492064]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.492599] 
[   27.492667] The buggy address belongs to the physical page:
[   27.492874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.493230] flags: 0x200000000000000(node=0|zone=2)
[   27.493481] page_type: f5(slab)
[   27.493631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.493857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.494404] page dumped because: kasan: bad access detected
[   27.494643] 
[   27.494721] Memory state around the buggy address:
[   27.494914]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.495125]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.495348] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.495558]                                      ^
[   27.495949]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.496267]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.496573] ==================================================================
[   26.458946] ==================================================================
[   26.459264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   26.459536] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.459759] 
[   26.459987] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.460043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.460057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.460081] Call Trace:
[   26.460102]  <TASK>
[   26.460123]  dump_stack_lvl+0x73/0xb0
[   26.460155]  print_report+0xd1/0x610
[   26.460180]  ? __virt_addr_valid+0x1db/0x2d0
[   26.460207]  ? kasan_atomics_helper+0xe78/0x5450
[   26.460251]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.460282]  ? kasan_atomics_helper+0xe78/0x5450
[   26.460313]  kasan_report+0x141/0x180
[   26.460338]  ? kasan_atomics_helper+0xe78/0x5450
[   26.460373]  kasan_check_range+0x10c/0x1c0
[   26.460401]  __kasan_check_write+0x18/0x20
[   26.460429]  kasan_atomics_helper+0xe78/0x5450
[   26.460461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.460492]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.460520]  ? kasan_atomics+0x152/0x310
[   26.460551]  kasan_atomics+0x1dc/0x310
[   26.460577]  ? __pfx_kasan_atomics+0x10/0x10
[   26.460605]  ? __pfx_read_tsc+0x10/0x10
[   26.460633]  ? ktime_get_ts64+0x86/0x230
[   26.460662]  kunit_try_run_case+0x1a5/0x480
[   26.460686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.460708]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.460732]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.460776]  ? __kthread_parkme+0x82/0x180
[   26.460799]  ? preempt_count_sub+0x50/0x80
[   26.460864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.460892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.460921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.460950]  kthread+0x337/0x6f0
[   26.460974]  ? trace_preempt_on+0x20/0xc0
[   26.461001]  ? __pfx_kthread+0x10/0x10
[   26.461025]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.461054]  ? calculate_sigpending+0x7b/0xa0
[   26.461083]  ? __pfx_kthread+0x10/0x10
[   26.461108]  ret_from_fork+0x116/0x1d0
[   26.461129]  ? __pfx_kthread+0x10/0x10
[   26.461153]  ret_from_fork_asm+0x1a/0x30
[   26.461189]  </TASK>
[   26.461209] 
[   26.476023] Allocated by task 313:
[   26.476335]  kasan_save_stack+0x45/0x70
[   26.476493]  kasan_save_track+0x18/0x40
[   26.476626]  kasan_save_alloc_info+0x3b/0x50
[   26.476875]  __kasan_kmalloc+0xb7/0xc0
[   26.477267]  __kmalloc_cache_noprof+0x189/0x420
[   26.477863]  kasan_atomics+0x95/0x310
[   26.478218]  kunit_try_run_case+0x1a5/0x480
[   26.478607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.479189]  kthread+0x337/0x6f0
[   26.479523]  ret_from_fork+0x116/0x1d0
[   26.479934]  ret_from_fork_asm+0x1a/0x30
[   26.480079] 
[   26.480147] The buggy address belongs to the object at ffff8881059cb500
[   26.480147]  which belongs to the cache kmalloc-64 of size 64
[   26.480511] The buggy address is located 0 bytes to the right of
[   26.480511]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.480885] 
[   26.481028] The buggy address belongs to the physical page:
[   26.481351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.481659] flags: 0x200000000000000(node=0|zone=2)
[   26.481872] page_type: f5(slab)
[   26.481992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.482366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.482777] page dumped because: kasan: bad access detected
[   26.483031] 
[   26.483097] Memory state around the buggy address:
[   26.483379]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.484209]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.484624] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.485142]                                      ^
[   26.485477]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.485945]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.486279] ==================================================================
[   26.144753] ==================================================================
[   26.145042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   26.145350] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.145616] 
[   26.145710] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.145761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.145776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.145801] Call Trace:
[   26.145823]  <TASK>
[   26.145845]  dump_stack_lvl+0x73/0xb0
[   26.145877]  print_report+0xd1/0x610
[   26.145901]  ? __virt_addr_valid+0x1db/0x2d0
[   26.145926]  ? kasan_atomics_helper+0x697/0x5450
[   26.145955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.145984]  ? kasan_atomics_helper+0x697/0x5450
[   26.146019]  kasan_report+0x141/0x180
[   26.146044]  ? kasan_atomics_helper+0x697/0x5450
[   26.146078]  kasan_check_range+0x10c/0x1c0
[   26.146104]  __kasan_check_write+0x18/0x20
[   26.146131]  kasan_atomics_helper+0x697/0x5450
[   26.146161]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.146192]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.146219]  ? kasan_atomics+0x152/0x310
[   26.146376]  kasan_atomics+0x1dc/0x310
[   26.146411]  ? __pfx_kasan_atomics+0x10/0x10
[   26.146482]  ? __pfx_read_tsc+0x10/0x10
[   26.146513]  ? ktime_get_ts64+0x86/0x230
[   26.146542]  kunit_try_run_case+0x1a5/0x480
[   26.146565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.146587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.146612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.146642]  ? __kthread_parkme+0x82/0x180
[   26.146665]  ? preempt_count_sub+0x50/0x80
[   26.146692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.146715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.147629]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.147676]  kthread+0x337/0x6f0
[   26.147703]  ? trace_preempt_on+0x20/0xc0
[   26.147733]  ? __pfx_kthread+0x10/0x10
[   26.148304]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.148335]  ? calculate_sigpending+0x7b/0xa0
[   26.148365]  ? __pfx_kthread+0x10/0x10
[   26.148390]  ret_from_fork+0x116/0x1d0
[   26.148412]  ? __pfx_kthread+0x10/0x10
[   26.148437]  ret_from_fork_asm+0x1a/0x30
[   26.148474]  </TASK>
[   26.148487] 
[   26.163165] Allocated by task 313:
[   26.163590]  kasan_save_stack+0x45/0x70
[   26.163922]  kasan_save_track+0x18/0x40
[   26.164323]  kasan_save_alloc_info+0x3b/0x50
[   26.164575]  __kasan_kmalloc+0xb7/0xc0
[   26.165009]  __kmalloc_cache_noprof+0x189/0x420
[   26.165383]  kasan_atomics+0x95/0x310
[   26.165528]  kunit_try_run_case+0x1a5/0x480
[   26.165671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.166358]  kthread+0x337/0x6f0
[   26.166714]  ret_from_fork+0x116/0x1d0
[   26.167167]  ret_from_fork_asm+0x1a/0x30
[   26.167557] 
[   26.167714] The buggy address belongs to the object at ffff8881059cb500
[   26.167714]  which belongs to the cache kmalloc-64 of size 64
[   26.168647] The buggy address is located 0 bytes to the right of
[   26.168647]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.169595] 
[   26.169774] The buggy address belongs to the physical page:
[   26.170387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.171311] flags: 0x200000000000000(node=0|zone=2)
[   26.171672] page_type: f5(slab)
[   26.171933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.172703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.173432] page dumped because: kasan: bad access detected
[   26.173611] 
[   26.173680] Memory state around the buggy address:
[   26.174076]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.174703]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.175442] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.176070]                                      ^
[   26.176250]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.176464]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.176670] ==================================================================
[   26.588298] ==================================================================
[   26.589157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   26.589433] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.589655] 
[   26.589742] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.589797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.589837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.589861] Call Trace:
[   26.589882]  <TASK>
[   26.589905]  dump_stack_lvl+0x73/0xb0
[   26.589939]  print_report+0xd1/0x610
[   26.590094]  ? __virt_addr_valid+0x1db/0x2d0
[   26.590122]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.590153]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.590182]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.590212]  kasan_report+0x141/0x180
[   26.590246]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.590281]  __asan_report_load4_noabort+0x18/0x20
[   26.590309]  kasan_atomics_helper+0x4a1c/0x5450
[   26.590340]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.590371]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.590399]  ? kasan_atomics+0x152/0x310
[   26.590495]  kasan_atomics+0x1dc/0x310
[   26.590539]  ? __pfx_kasan_atomics+0x10/0x10
[   26.590566]  ? __pfx_read_tsc+0x10/0x10
[   26.590594]  ? ktime_get_ts64+0x86/0x230
[   26.590621]  kunit_try_run_case+0x1a5/0x480
[   26.590645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.590667]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.590691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.590722]  ? __kthread_parkme+0x82/0x180
[   26.590753]  ? preempt_count_sub+0x50/0x80
[   26.590780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.590805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.590834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.590863]  kthread+0x337/0x6f0
[   26.590886]  ? trace_preempt_on+0x20/0xc0
[   26.590913]  ? __pfx_kthread+0x10/0x10
[   26.590937]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.590966]  ? calculate_sigpending+0x7b/0xa0
[   26.590995]  ? __pfx_kthread+0x10/0x10
[   26.591019]  ret_from_fork+0x116/0x1d0
[   26.591040]  ? __pfx_kthread+0x10/0x10
[   26.591063]  ret_from_fork_asm+0x1a/0x30
[   26.591099]  </TASK>
[   26.591112] 
[   26.605943] Allocated by task 313:
[   26.606189]  kasan_save_stack+0x45/0x70
[   26.606602]  kasan_save_track+0x18/0x40
[   26.606932]  kasan_save_alloc_info+0x3b/0x50
[   26.607414]  __kasan_kmalloc+0xb7/0xc0
[   26.607581]  __kmalloc_cache_noprof+0x189/0x420
[   26.608187]  kasan_atomics+0x95/0x310
[   26.608486]  kunit_try_run_case+0x1a5/0x480
[   26.608825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.608999]  kthread+0x337/0x6f0
[   26.609118]  ret_from_fork+0x116/0x1d0
[   26.609258]  ret_from_fork_asm+0x1a/0x30
[   26.609397] 
[   26.609465] The buggy address belongs to the object at ffff8881059cb500
[   26.609465]  which belongs to the cache kmalloc-64 of size 64
[   26.609810] The buggy address is located 0 bytes to the right of
[   26.609810]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.610164] 
[   26.610232] The buggy address belongs to the physical page:
[   26.610747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.611507] flags: 0x200000000000000(node=0|zone=2)
[   26.612090] page_type: f5(slab)
[   26.612418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.613228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.614041] page dumped because: kasan: bad access detected
[   26.614533] 
[   26.614702] Memory state around the buggy address:
[   26.615252]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.615950]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.616575] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.617226]                                      ^
[   26.617662]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.618412]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.618844] ==================================================================
[   26.195718] ==================================================================
[   26.196180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   26.196604] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.197015] 
[   26.197157] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.197217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.197231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.197265] Call Trace:
[   26.197303]  <TASK>
[   26.197323]  dump_stack_lvl+0x73/0xb0
[   26.197370]  print_report+0xd1/0x610
[   26.197407]  ? __virt_addr_valid+0x1db/0x2d0
[   26.197447]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.197490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.197520]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.197551]  kasan_report+0x141/0x180
[   26.197576]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.197610]  kasan_check_range+0x10c/0x1c0
[   26.197637]  __kasan_check_write+0x18/0x20
[   26.197664]  kasan_atomics_helper+0x7c7/0x5450
[   26.197696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.197727]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.197755]  ? kasan_atomics+0x152/0x310
[   26.197784]  kasan_atomics+0x1dc/0x310
[   26.197811]  ? __pfx_kasan_atomics+0x10/0x10
[   26.197848]  ? __pfx_read_tsc+0x10/0x10
[   26.197874]  ? ktime_get_ts64+0x86/0x230
[   26.197902]  kunit_try_run_case+0x1a5/0x480
[   26.197926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.197948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.197972]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.198054]  ? __kthread_parkme+0x82/0x180
[   26.198080]  ? preempt_count_sub+0x50/0x80
[   26.198105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.198129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.198178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.198220]  kthread+0x337/0x6f0
[   26.198255]  ? trace_preempt_on+0x20/0xc0
[   26.198297]  ? __pfx_kthread+0x10/0x10
[   26.198335]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.198365]  ? calculate_sigpending+0x7b/0xa0
[   26.198407]  ? __pfx_kthread+0x10/0x10
[   26.198432]  ret_from_fork+0x116/0x1d0
[   26.198454]  ? __pfx_kthread+0x10/0x10
[   26.198479]  ret_from_fork_asm+0x1a/0x30
[   26.198516]  </TASK>
[   26.198530] 
[   26.207807] Allocated by task 313:
[   26.208024]  kasan_save_stack+0x45/0x70
[   26.208268]  kasan_save_track+0x18/0x40
[   26.208417]  kasan_save_alloc_info+0x3b/0x50
[   26.208560]  __kasan_kmalloc+0xb7/0xc0
[   26.208685]  __kmalloc_cache_noprof+0x189/0x420
[   26.208891]  kasan_atomics+0x95/0x310
[   26.209101]  kunit_try_run_case+0x1a5/0x480
[   26.209325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.209785]  kthread+0x337/0x6f0
[   26.209984]  ret_from_fork+0x116/0x1d0
[   26.210157]  ret_from_fork_asm+0x1a/0x30
[   26.210351] 
[   26.210471] The buggy address belongs to the object at ffff8881059cb500
[   26.210471]  which belongs to the cache kmalloc-64 of size 64
[   26.211174] The buggy address is located 0 bytes to the right of
[   26.211174]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.211610] 
[   26.211683] The buggy address belongs to the physical page:
[   26.211912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.212307] flags: 0x200000000000000(node=0|zone=2)
[   26.212695] page_type: f5(slab)
[   26.213116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.213370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.213590] page dumped because: kasan: bad access detected
[   26.213983] 
[   26.214079] Memory state around the buggy address:
[   26.214320]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.214671]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.214951] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.215273]                                      ^
[   26.215500]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.215906]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.216193] ==================================================================
[   26.046099] ==================================================================
[   26.046465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   26.046880] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.047360] 
[   26.047477] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.047530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.047544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.047568] Call Trace:
[   26.047591]  <TASK>
[   26.047612]  dump_stack_lvl+0x73/0xb0
[   26.047646]  print_report+0xd1/0x610
[   26.047670]  ? __virt_addr_valid+0x1db/0x2d0
[   26.047697]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.047728]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.047767]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.047798]  kasan_report+0x141/0x180
[   26.047823]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.047857]  __asan_report_store4_noabort+0x1b/0x30
[   26.047886]  kasan_atomics_helper+0x4b3a/0x5450
[   26.047917]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.047948]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.047977]  ? kasan_atomics+0x152/0x310
[   26.048007]  kasan_atomics+0x1dc/0x310
[   26.048033]  ? __pfx_kasan_atomics+0x10/0x10
[   26.048062]  ? __pfx_read_tsc+0x10/0x10
[   26.048087]  ? ktime_get_ts64+0x86/0x230
[   26.048116]  kunit_try_run_case+0x1a5/0x480
[   26.048140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.048165]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.048190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.048221]  ? __kthread_parkme+0x82/0x180
[   26.048255]  ? preempt_count_sub+0x50/0x80
[   26.048282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.048307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.048336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.048364]  kthread+0x337/0x6f0
[   26.048388]  ? trace_preempt_on+0x20/0xc0
[   26.048415]  ? __pfx_kthread+0x10/0x10
[   26.048440]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.048468]  ? calculate_sigpending+0x7b/0xa0
[   26.048505]  ? __pfx_kthread+0x10/0x10
[   26.048530]  ret_from_fork+0x116/0x1d0
[   26.048552]  ? __pfx_kthread+0x10/0x10
[   26.048576]  ret_from_fork_asm+0x1a/0x30
[   26.048616]  </TASK>
[   26.048630] 
[   26.062363] Allocated by task 313:
[   26.062510]  kasan_save_stack+0x45/0x70
[   26.062660]  kasan_save_track+0x18/0x40
[   26.062790]  kasan_save_alloc_info+0x3b/0x50
[   26.063425]  __kasan_kmalloc+0xb7/0xc0
[   26.063846]  __kmalloc_cache_noprof+0x189/0x420
[   26.064254]  kasan_atomics+0x95/0x310
[   26.065567]  kunit_try_run_case+0x1a5/0x480
[   26.065998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.066585]  kthread+0x337/0x6f0
[   26.066928]  ret_from_fork+0x116/0x1d0
[   26.067376]  ret_from_fork_asm+0x1a/0x30
[   26.067830] 
[   26.067991] The buggy address belongs to the object at ffff8881059cb500
[   26.067991]  which belongs to the cache kmalloc-64 of size 64
[   26.068360] The buggy address is located 0 bytes to the right of
[   26.068360]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.068724] 
[   26.069288] The buggy address belongs to the physical page:
[   26.069845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.070534] flags: 0x200000000000000(node=0|zone=2)
[   26.071078] page_type: f5(slab)
[   26.071282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.071906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.072305] page dumped because: kasan: bad access detected
[   26.072476] 
[   26.072542] Memory state around the buggy address:
[   26.072695]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.073391]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.074144] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.074748]                                      ^
[   26.075251]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.076446]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.077170] ==================================================================
[   26.301477] ==================================================================
[   26.301941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   26.302301] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.302638] 
[   26.302868] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.302960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.302975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.302999] Call Trace:
[   26.303018]  <TASK>
[   26.303039]  dump_stack_lvl+0x73/0xb0
[   26.303101]  print_report+0xd1/0x610
[   26.303126]  ? __virt_addr_valid+0x1db/0x2d0
[   26.303152]  ? kasan_atomics_helper+0xac7/0x5450
[   26.303181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.303252]  ? kasan_atomics_helper+0xac7/0x5450
[   26.303284]  kasan_report+0x141/0x180
[   26.303309]  ? kasan_atomics_helper+0xac7/0x5450
[   26.303344]  kasan_check_range+0x10c/0x1c0
[   26.303399]  __kasan_check_write+0x18/0x20
[   26.303428]  kasan_atomics_helper+0xac7/0x5450
[   26.303459]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.303490]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.303518]  ? kasan_atomics+0x152/0x310
[   26.303548]  kasan_atomics+0x1dc/0x310
[   26.303575]  ? __pfx_kasan_atomics+0x10/0x10
[   26.303603]  ? __pfx_read_tsc+0x10/0x10
[   26.303629]  ? ktime_get_ts64+0x86/0x230
[   26.303657]  kunit_try_run_case+0x1a5/0x480
[   26.303682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.303704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.303727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.303872]  ? __kthread_parkme+0x82/0x180
[   26.303895]  ? preempt_count_sub+0x50/0x80
[   26.303921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.303945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.303974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.304003]  kthread+0x337/0x6f0
[   26.304026]  ? trace_preempt_on+0x20/0xc0
[   26.304053]  ? __pfx_kthread+0x10/0x10
[   26.304077]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.304106]  ? calculate_sigpending+0x7b/0xa0
[   26.304134]  ? __pfx_kthread+0x10/0x10
[   26.304160]  ret_from_fork+0x116/0x1d0
[   26.304181]  ? __pfx_kthread+0x10/0x10
[   26.304206]  ret_from_fork_asm+0x1a/0x30
[   26.304252]  </TASK>
[   26.304264] 
[   26.313172] Allocated by task 313:
[   26.313384]  kasan_save_stack+0x45/0x70
[   26.313562]  kasan_save_track+0x18/0x40
[   26.313729]  kasan_save_alloc_info+0x3b/0x50
[   26.313883]  __kasan_kmalloc+0xb7/0xc0
[   26.314045]  __kmalloc_cache_noprof+0x189/0x420
[   26.314385]  kasan_atomics+0x95/0x310
[   26.314582]  kunit_try_run_case+0x1a5/0x480
[   26.314887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.315167]  kthread+0x337/0x6f0
[   26.315363]  ret_from_fork+0x116/0x1d0
[   26.315556]  ret_from_fork_asm+0x1a/0x30
[   26.315818] 
[   26.315900] The buggy address belongs to the object at ffff8881059cb500
[   26.315900]  which belongs to the cache kmalloc-64 of size 64
[   26.316321] The buggy address is located 0 bytes to the right of
[   26.316321]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.317205] 
[   26.317325] The buggy address belongs to the physical page:
[   26.317568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.318010] flags: 0x200000000000000(node=0|zone=2)
[   26.318294] page_type: f5(slab)
[   26.318484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.318941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.319234] page dumped because: kasan: bad access detected
[   26.319523] 
[   26.319598] Memory state around the buggy address:
[   26.319964]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.320207]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.320536] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.320866]                                      ^
[   26.321090]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.321402]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.321673] ==================================================================
[   26.364358] ==================================================================
[   26.364698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   26.365111] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.365474] 
[   26.365612] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.365666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.365680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.365704] Call Trace:
[   26.365724]  <TASK>
[   26.365871]  dump_stack_lvl+0x73/0xb0
[   26.365912]  print_report+0xd1/0x610
[   26.365936]  ? __virt_addr_valid+0x1db/0x2d0
[   26.365965]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.365995]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.366025]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.366055]  kasan_report+0x141/0x180
[   26.366112]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.366147]  __asan_report_load4_noabort+0x18/0x20
[   26.366176]  kasan_atomics_helper+0x4a84/0x5450
[   26.366207]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.366247]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.366277]  ? kasan_atomics+0x152/0x310
[   26.366306]  kasan_atomics+0x1dc/0x310
[   26.366361]  ? __pfx_kasan_atomics+0x10/0x10
[   26.366414]  ? __pfx_read_tsc+0x10/0x10
[   26.366441]  ? ktime_get_ts64+0x86/0x230
[   26.366470]  kunit_try_run_case+0x1a5/0x480
[   26.366494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.366517]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.366541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.366573]  ? __kthread_parkme+0x82/0x180
[   26.366595]  ? preempt_count_sub+0x50/0x80
[   26.366621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.366645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.366673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.366703]  kthread+0x337/0x6f0
[   26.366726]  ? trace_preempt_on+0x20/0xc0
[   26.366821]  ? __pfx_kthread+0x10/0x10
[   26.366861]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.366890]  ? calculate_sigpending+0x7b/0xa0
[   26.366919]  ? __pfx_kthread+0x10/0x10
[   26.366944]  ret_from_fork+0x116/0x1d0
[   26.366966]  ? __pfx_kthread+0x10/0x10
[   26.366991]  ret_from_fork_asm+0x1a/0x30
[   26.367027]  </TASK>
[   26.367040] 
[   26.379514] Allocated by task 313:
[   26.379668]  kasan_save_stack+0x45/0x70
[   26.379841]  kasan_save_track+0x18/0x40
[   26.380029]  kasan_save_alloc_info+0x3b/0x50
[   26.380234]  __kasan_kmalloc+0xb7/0xc0
[   26.380430]  __kmalloc_cache_noprof+0x189/0x420
[   26.381997]  kasan_atomics+0x95/0x310
[   26.382579]  kunit_try_run_case+0x1a5/0x480
[   26.383466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.384079]  kthread+0x337/0x6f0
[   26.384520]  ret_from_fork+0x116/0x1d0
[   26.385122]  ret_from_fork_asm+0x1a/0x30
[   26.385729] 
[   26.386016] The buggy address belongs to the object at ffff8881059cb500
[   26.386016]  which belongs to the cache kmalloc-64 of size 64
[   26.387066] The buggy address is located 0 bytes to the right of
[   26.387066]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.388340] 
[   26.388493] The buggy address belongs to the physical page:
[   26.388669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.388921] flags: 0x200000000000000(node=0|zone=2)
[   26.389500] page_type: f5(slab)
[   26.389889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.390727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.391448] page dumped because: kasan: bad access detected
[   26.391828] 
[   26.392056] Memory state around the buggy address:
[   26.392532]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.392748]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.393503] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.394208]                                      ^
[   26.394555]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.395205]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.395672] ==================================================================
[   25.920164] ==================================================================
[   25.920833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   25.921363] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   25.921596] 
[   25.921684] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.921737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.921802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.921827] Call Trace:
[   25.921844]  <TASK>
[   25.921864]  dump_stack_lvl+0x73/0xb0
[   25.921897]  print_report+0xd1/0x610
[   25.921921]  ? __virt_addr_valid+0x1db/0x2d0
[   25.921946]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.921990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.922020]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.922055]  kasan_report+0x141/0x180
[   25.922080]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.922116]  __asan_report_load4_noabort+0x18/0x20
[   25.922144]  kasan_atomics_helper+0x4b88/0x5450
[   25.922175]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.922207]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.922248]  ? kasan_atomics+0x152/0x310
[   25.922278]  kasan_atomics+0x1dc/0x310
[   25.922305]  ? __pfx_kasan_atomics+0x10/0x10
[   25.922333]  ? __pfx_read_tsc+0x10/0x10
[   25.922360]  ? ktime_get_ts64+0x86/0x230
[   25.922388]  kunit_try_run_case+0x1a5/0x480
[   25.922412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.922434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.922457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.922488]  ? __kthread_parkme+0x82/0x180
[   25.922511]  ? preempt_count_sub+0x50/0x80
[   25.922537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.922561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.922589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.922617]  kthread+0x337/0x6f0
[   25.922641]  ? trace_preempt_on+0x20/0xc0
[   25.922667]  ? __pfx_kthread+0x10/0x10
[   25.922691]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.922719]  ? calculate_sigpending+0x7b/0xa0
[   25.922748]  ? __pfx_kthread+0x10/0x10
[   25.922786]  ret_from_fork+0x116/0x1d0
[   25.922806]  ? __pfx_kthread+0x10/0x10
[   25.922865]  ret_from_fork_asm+0x1a/0x30
[   25.922902]  </TASK>
[   25.922916] 
[   25.936146] Allocated by task 313:
[   25.936655]  kasan_save_stack+0x45/0x70
[   25.937408]  kasan_save_track+0x18/0x40
[   25.937788]  kasan_save_alloc_info+0x3b/0x50
[   25.938258]  __kasan_kmalloc+0xb7/0xc0
[   25.938599]  __kmalloc_cache_noprof+0x189/0x420
[   25.939112]  kasan_atomics+0x95/0x310
[   25.939435]  kunit_try_run_case+0x1a5/0x480
[   25.939579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.939940]  kthread+0x337/0x6f0
[   25.940322]  ret_from_fork+0x116/0x1d0
[   25.940665]  ret_from_fork_asm+0x1a/0x30
[   25.941109] 
[   25.941283] The buggy address belongs to the object at ffff8881059cb500
[   25.941283]  which belongs to the cache kmalloc-64 of size 64
[   25.942488] The buggy address is located 0 bytes to the right of
[   25.942488]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   25.943419] 
[   25.943584] The buggy address belongs to the physical page:
[   25.944154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   25.944500] flags: 0x200000000000000(node=0|zone=2)
[   25.945000] page_type: f5(slab)
[   25.945359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.946118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.946359] page dumped because: kasan: bad access detected
[   25.946527] 
[   25.946593] Memory state around the buggy address:
[   25.946746]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.947436]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.948387] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.949137]                                      ^
[   25.949648]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.950383]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.951096] ==================================================================
[   26.726103] ==================================================================
[   26.726669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   26.727192] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.727601] 
[   26.727956] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.728013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.728027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.728052] Call Trace:
[   26.728072]  <TASK>
[   26.728094]  dump_stack_lvl+0x73/0xb0
[   26.728125]  print_report+0xd1/0x610
[   26.728149]  ? __virt_addr_valid+0x1db/0x2d0
[   26.728177]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.728207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.728249]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.728279]  kasan_report+0x141/0x180
[   26.728303]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.728338]  kasan_check_range+0x10c/0x1c0
[   26.728365]  __kasan_check_write+0x18/0x20
[   26.728393]  kasan_atomics_helper+0x12e6/0x5450
[   26.728427]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.728457]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.728485]  ? kasan_atomics+0x152/0x310
[   26.728514]  kasan_atomics+0x1dc/0x310
[   26.728540]  ? __pfx_kasan_atomics+0x10/0x10
[   26.728567]  ? __pfx_read_tsc+0x10/0x10
[   26.728594]  ? ktime_get_ts64+0x86/0x230
[   26.728621]  kunit_try_run_case+0x1a5/0x480
[   26.728646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.728700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.728725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.728824]  ? __kthread_parkme+0x82/0x180
[   26.728850]  ? preempt_count_sub+0x50/0x80
[   26.728876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.728900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.728930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.728959]  kthread+0x337/0x6f0
[   26.728982]  ? trace_preempt_on+0x20/0xc0
[   26.729009]  ? __pfx_kthread+0x10/0x10
[   26.729032]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.729061]  ? calculate_sigpending+0x7b/0xa0
[   26.729090]  ? __pfx_kthread+0x10/0x10
[   26.729115]  ret_from_fork+0x116/0x1d0
[   26.729137]  ? __pfx_kthread+0x10/0x10
[   26.729161]  ret_from_fork_asm+0x1a/0x30
[   26.729201]  </TASK>
[   26.729214] 
[   26.741150] Allocated by task 313:
[   26.741504]  kasan_save_stack+0x45/0x70
[   26.741699]  kasan_save_track+0x18/0x40
[   26.742279]  kasan_save_alloc_info+0x3b/0x50
[   26.742586]  __kasan_kmalloc+0xb7/0xc0
[   26.743059]  __kmalloc_cache_noprof+0x189/0x420
[   26.743293]  kasan_atomics+0x95/0x310
[   26.743463]  kunit_try_run_case+0x1a5/0x480
[   26.743650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.744316]  kthread+0x337/0x6f0
[   26.744653]  ret_from_fork+0x116/0x1d0
[   26.744979]  ret_from_fork_asm+0x1a/0x30
[   26.745168] 
[   26.745277] The buggy address belongs to the object at ffff8881059cb500
[   26.745277]  which belongs to the cache kmalloc-64 of size 64
[   26.746215] The buggy address is located 0 bytes to the right of
[   26.746215]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.746707] 
[   26.747273] The buggy address belongs to the physical page:
[   26.747726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.748313] flags: 0x200000000000000(node=0|zone=2)
[   26.748545] page_type: f5(slab)
[   26.748705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.749491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.750201] page dumped because: kasan: bad access detected
[   26.750669] 
[   26.750900] Memory state around the buggy address:
[   26.751374]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.752012]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.752779] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.753081]                                      ^
[   26.753305]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.753598]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.754131] ==================================================================
[   27.007708] ==================================================================
[   27.008095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   27.008943] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.009423] 
[   27.009654] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.009710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.009724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.009748] Call Trace:
[   27.009768]  <TASK>
[   27.009855]  dump_stack_lvl+0x73/0xb0
[   27.009891]  print_report+0xd1/0x610
[   27.009916]  ? __virt_addr_valid+0x1db/0x2d0
[   27.009944]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.009974]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.010005]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.010036]  kasan_report+0x141/0x180
[   27.010060]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.010094]  kasan_check_range+0x10c/0x1c0
[   27.010122]  __kasan_check_write+0x18/0x20
[   27.010150]  kasan_atomics_helper+0x18b1/0x5450
[   27.010184]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.010217]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.010259]  ? kasan_atomics+0x152/0x310
[   27.010290]  kasan_atomics+0x1dc/0x310
[   27.010316]  ? __pfx_kasan_atomics+0x10/0x10
[   27.010344]  ? __pfx_read_tsc+0x10/0x10
[   27.010369]  ? ktime_get_ts64+0x86/0x230
[   27.010397]  kunit_try_run_case+0x1a5/0x480
[   27.010421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.010443]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.010466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.010497]  ? __kthread_parkme+0x82/0x180
[   27.010520]  ? preempt_count_sub+0x50/0x80
[   27.010546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.010570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.010598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.010626]  kthread+0x337/0x6f0
[   27.010649]  ? trace_preempt_on+0x20/0xc0
[   27.010675]  ? __pfx_kthread+0x10/0x10
[   27.010699]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.010727]  ? calculate_sigpending+0x7b/0xa0
[   27.010772]  ? __pfx_kthread+0x10/0x10
[   27.010798]  ret_from_fork+0x116/0x1d0
[   27.010829]  ? __pfx_kthread+0x10/0x10
[   27.010854]  ret_from_fork_asm+0x1a/0x30
[   27.010889]  </TASK>
[   27.010903] 
[   27.021826] Allocated by task 313:
[   27.022081]  kasan_save_stack+0x45/0x70
[   27.022257]  kasan_save_track+0x18/0x40
[   27.022429]  kasan_save_alloc_info+0x3b/0x50
[   27.022619]  __kasan_kmalloc+0xb7/0xc0
[   27.022783]  __kmalloc_cache_noprof+0x189/0x420
[   27.023335]  kasan_atomics+0x95/0x310
[   27.023510]  kunit_try_run_case+0x1a5/0x480
[   27.023693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.024063]  kthread+0x337/0x6f0
[   27.024370]  ret_from_fork+0x116/0x1d0
[   27.024524]  ret_from_fork_asm+0x1a/0x30
[   27.024728] 
[   27.024822] The buggy address belongs to the object at ffff8881059cb500
[   27.024822]  which belongs to the cache kmalloc-64 of size 64
[   27.025603] The buggy address is located 0 bytes to the right of
[   27.025603]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.026409] 
[   27.026491] The buggy address belongs to the physical page:
[   27.026717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.027054] flags: 0x200000000000000(node=0|zone=2)
[   27.027533] page_type: f5(slab)
[   27.027753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.028104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.028442] page dumped because: kasan: bad access detected
[   27.028671] 
[   27.028749] Memory state around the buggy address:
[   27.029303]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.029576]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.030115] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.030605]                                      ^
[   27.030775]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.031374]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.031628] ==================================================================
[   27.056910] ==================================================================
[   27.057279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   27.057715] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.058024] 
[   27.058113] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.058164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.058178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.058407] Call Trace:
[   27.058438]  <TASK>
[   27.058471]  dump_stack_lvl+0x73/0xb0
[   27.058507]  print_report+0xd1/0x610
[   27.058533]  ? __virt_addr_valid+0x1db/0x2d0
[   27.058559]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.058589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.058619]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.058649]  kasan_report+0x141/0x180
[   27.058674]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.058709]  kasan_check_range+0x10c/0x1c0
[   27.058736]  __kasan_check_write+0x18/0x20
[   27.058994]  kasan_atomics_helper+0x19e3/0x5450
[   27.059043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.059076]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.059288]  ? kasan_atomics+0x152/0x310
[   27.059335]  kasan_atomics+0x1dc/0x310
[   27.059365]  ? __pfx_kasan_atomics+0x10/0x10
[   27.059395]  ? __pfx_read_tsc+0x10/0x10
[   27.059423]  ? ktime_get_ts64+0x86/0x230
[   27.059452]  kunit_try_run_case+0x1a5/0x480
[   27.059478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.059501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.059525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.059556]  ? __kthread_parkme+0x82/0x180
[   27.059578]  ? preempt_count_sub+0x50/0x80
[   27.059604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.059628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.059656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.059685]  kthread+0x337/0x6f0
[   27.059707]  ? trace_preempt_on+0x20/0xc0
[   27.059734]  ? __pfx_kthread+0x10/0x10
[   27.059829]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.059860]  ? calculate_sigpending+0x7b/0xa0
[   27.059891]  ? __pfx_kthread+0x10/0x10
[   27.059915]  ret_from_fork+0x116/0x1d0
[   27.059938]  ? __pfx_kthread+0x10/0x10
[   27.059962]  ret_from_fork_asm+0x1a/0x30
[   27.059998]  </TASK>
[   27.060011] 
[   27.071746] Allocated by task 313:
[   27.072526]  kasan_save_stack+0x45/0x70
[   27.072873]  kasan_save_track+0x18/0x40
[   27.073280]  kasan_save_alloc_info+0x3b/0x50
[   27.073616]  __kasan_kmalloc+0xb7/0xc0
[   27.074126]  __kmalloc_cache_noprof+0x189/0x420
[   27.074372]  kasan_atomics+0x95/0x310
[   27.074554]  kunit_try_run_case+0x1a5/0x480
[   27.074746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.075415]  kthread+0x337/0x6f0
[   27.075587]  ret_from_fork+0x116/0x1d0
[   27.075802]  ret_from_fork_asm+0x1a/0x30
[   27.076002] 
[   27.076093] The buggy address belongs to the object at ffff8881059cb500
[   27.076093]  which belongs to the cache kmalloc-64 of size 64
[   27.076577] The buggy address is located 0 bytes to the right of
[   27.076577]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.077627] 
[   27.077715] The buggy address belongs to the physical page:
[   27.078002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.078441] flags: 0x200000000000000(node=0|zone=2)
[   27.078657] page_type: f5(slab)
[   27.078888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.079247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.079550] page dumped because: kasan: bad access detected
[   27.079768] 
[   27.079834] Memory state around the buggy address:
[   27.080076]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.080496]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.081069] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.081394]                                      ^
[   27.081610]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.082289]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.082533] ==================================================================
[   25.974255] ==================================================================
[   25.974590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   25.975150] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   25.975651] 
[   25.975808] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.975872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.975886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.975910] Call Trace:
[   25.975931]  <TASK>
[   25.975952]  dump_stack_lvl+0x73/0xb0
[   25.975984]  print_report+0xd1/0x610
[   25.976008]  ? __virt_addr_valid+0x1db/0x2d0
[   25.976034]  ? kasan_atomics_helper+0x3df/0x5450
[   25.976064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.976095]  ? kasan_atomics_helper+0x3df/0x5450
[   25.976125]  kasan_report+0x141/0x180
[   25.976150]  ? kasan_atomics_helper+0x3df/0x5450
[   25.976185]  kasan_check_range+0x10c/0x1c0
[   25.976213]  __kasan_check_read+0x15/0x20
[   25.976255]  kasan_atomics_helper+0x3df/0x5450
[   25.976286]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.976317]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.976346]  ? kasan_atomics+0x152/0x310
[   25.976375]  kasan_atomics+0x1dc/0x310
[   25.976402]  ? __pfx_kasan_atomics+0x10/0x10
[   25.976429]  ? __pfx_read_tsc+0x10/0x10
[   25.976456]  ? ktime_get_ts64+0x86/0x230
[   25.976484]  kunit_try_run_case+0x1a5/0x480
[   25.976508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.976531]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.976556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.976587]  ? __kthread_parkme+0x82/0x180
[   25.976610]  ? preempt_count_sub+0x50/0x80
[   25.976637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.976661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.976689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.976718]  kthread+0x337/0x6f0
[   25.976741]  ? trace_preempt_on+0x20/0xc0
[   25.976807]  ? __pfx_kthread+0x10/0x10
[   25.976839]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.976868]  ? calculate_sigpending+0x7b/0xa0
[   25.976898]  ? __pfx_kthread+0x10/0x10
[   25.976924]  ret_from_fork+0x116/0x1d0
[   25.976945]  ? __pfx_kthread+0x10/0x10
[   25.976970]  ret_from_fork_asm+0x1a/0x30
[   25.977006]  </TASK>
[   25.977019] 
[   25.984620] Allocated by task 313:
[   25.984814]  kasan_save_stack+0x45/0x70
[   25.985060]  kasan_save_track+0x18/0x40
[   25.985247]  kasan_save_alloc_info+0x3b/0x50
[   25.985438]  __kasan_kmalloc+0xb7/0xc0
[   25.985618]  __kmalloc_cache_noprof+0x189/0x420
[   25.985802]  kasan_atomics+0x95/0x310
[   25.986050]  kunit_try_run_case+0x1a5/0x480
[   25.986227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.986430]  kthread+0x337/0x6f0
[   25.986600]  ret_from_fork+0x116/0x1d0
[   25.986777]  ret_from_fork_asm+0x1a/0x30
[   25.987032] 
[   25.987117] The buggy address belongs to the object at ffff8881059cb500
[   25.987117]  which belongs to the cache kmalloc-64 of size 64
[   25.987563] The buggy address is located 0 bytes to the right of
[   25.987563]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   25.988306] 
[   25.988407] The buggy address belongs to the physical page:
[   25.988656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   25.989086] flags: 0x200000000000000(node=0|zone=2)
[   25.989335] page_type: f5(slab)
[   25.989504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.989877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.990101] page dumped because: kasan: bad access detected
[   25.990615] 
[   25.990733] Memory state around the buggy address:
[   25.991249]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.991574]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.992634] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.993591]                                      ^
[   25.994067]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.994427]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.994727] ==================================================================
[   26.938865] ==================================================================
[   26.939091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   26.939455] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.939770] 
[   26.939908] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.940541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.940563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.940588] Call Trace:
[   26.940608]  <TASK>
[   26.940628]  dump_stack_lvl+0x73/0xb0
[   26.940660]  print_report+0xd1/0x610
[   26.940685]  ? __virt_addr_valid+0x1db/0x2d0
[   26.940711]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.940741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.941442]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.941477]  kasan_report+0x141/0x180
[   26.941504]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.941540]  kasan_check_range+0x10c/0x1c0
[   26.941567]  __kasan_check_write+0x18/0x20
[   26.941595]  kasan_atomics_helper+0x16e7/0x5450
[   26.941626]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.941658]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.941687]  ? kasan_atomics+0x152/0x310
[   26.941716]  kasan_atomics+0x1dc/0x310
[   26.941742]  ? __pfx_kasan_atomics+0x10/0x10
[   26.941786]  ? __pfx_read_tsc+0x10/0x10
[   26.941812]  ? ktime_get_ts64+0x86/0x230
[   26.941854]  kunit_try_run_case+0x1a5/0x480
[   26.941879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.941901]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.941925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.941956]  ? __kthread_parkme+0x82/0x180
[   26.941978]  ? preempt_count_sub+0x50/0x80
[   26.942004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.942028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.942057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.942085]  kthread+0x337/0x6f0
[   26.942109]  ? trace_preempt_on+0x20/0xc0
[   26.942135]  ? __pfx_kthread+0x10/0x10
[   26.942159]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.942188]  ? calculate_sigpending+0x7b/0xa0
[   26.942217]  ? __pfx_kthread+0x10/0x10
[   26.942253]  ret_from_fork+0x116/0x1d0
[   26.942275]  ? __pfx_kthread+0x10/0x10
[   26.942299]  ret_from_fork_asm+0x1a/0x30
[   26.942335]  </TASK>
[   26.942348] 
[   26.953498] Allocated by task 313:
[   26.954066]  kasan_save_stack+0x45/0x70
[   26.954367]  kasan_save_track+0x18/0x40
[   26.954567]  kasan_save_alloc_info+0x3b/0x50
[   26.954770]  __kasan_kmalloc+0xb7/0xc0
[   26.955210]  __kmalloc_cache_noprof+0x189/0x420
[   26.955407]  kasan_atomics+0x95/0x310
[   26.955746]  kunit_try_run_case+0x1a5/0x480
[   26.956106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.956361]  kthread+0x337/0x6f0
[   26.956651]  ret_from_fork+0x116/0x1d0
[   26.956994]  ret_from_fork_asm+0x1a/0x30
[   26.957330] 
[   26.957424] The buggy address belongs to the object at ffff8881059cb500
[   26.957424]  which belongs to the cache kmalloc-64 of size 64
[   26.958287] The buggy address is located 0 bytes to the right of
[   26.958287]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.959219] 
[   26.959329] The buggy address belongs to the physical page:
[   26.959769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.960292] flags: 0x200000000000000(node=0|zone=2)
[   26.960628] page_type: f5(slab)
[   26.961012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.961366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.961740] page dumped because: kasan: bad access detected
[   26.962258] 
[   26.962347] Memory state around the buggy address:
[   26.962697]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.963206]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.963650] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.964139]                                      ^
[   26.964381]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.964644]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.964939] ==================================================================
[   27.361825] ==================================================================
[   27.362456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   27.363011] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.363422] 
[   27.363602] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.363658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.363672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.363697] Call Trace:
[   27.363717]  <TASK>
[   27.363738]  dump_stack_lvl+0x73/0xb0
[   27.363771]  print_report+0xd1/0x610
[   27.363835]  ? __virt_addr_valid+0x1db/0x2d0
[   27.363862]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.363904]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.363935]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.364008]  kasan_report+0x141/0x180
[   27.364033]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.364080]  __asan_report_load8_noabort+0x18/0x20
[   27.364109]  kasan_atomics_helper+0x4f98/0x5450
[   27.364141]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.364173]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.364233]  ? kasan_atomics+0x152/0x310
[   27.364308]  kasan_atomics+0x1dc/0x310
[   27.364335]  ? __pfx_kasan_atomics+0x10/0x10
[   27.364363]  ? __pfx_read_tsc+0x10/0x10
[   27.364390]  ? ktime_get_ts64+0x86/0x230
[   27.364420]  kunit_try_run_case+0x1a5/0x480
[   27.364445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.364467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.364491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.364522]  ? __kthread_parkme+0x82/0x180
[   27.364545]  ? preempt_count_sub+0x50/0x80
[   27.364571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.364595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.364623]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.364652]  kthread+0x337/0x6f0
[   27.364674]  ? trace_preempt_on+0x20/0xc0
[   27.364701]  ? __pfx_kthread+0x10/0x10
[   27.364725]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.364754]  ? calculate_sigpending+0x7b/0xa0
[   27.364782]  ? __pfx_kthread+0x10/0x10
[   27.364807]  ret_from_fork+0x116/0x1d0
[   27.364837]  ? __pfx_kthread+0x10/0x10
[   27.364862]  ret_from_fork_asm+0x1a/0x30
[   27.364897]  </TASK>
[   27.364909] 
[   27.373313] Allocated by task 313:
[   27.373749]  kasan_save_stack+0x45/0x70
[   27.374038]  kasan_save_track+0x18/0x40
[   27.374249]  kasan_save_alloc_info+0x3b/0x50
[   27.374462]  __kasan_kmalloc+0xb7/0xc0
[   27.374596]  __kmalloc_cache_noprof+0x189/0x420
[   27.374748]  kasan_atomics+0x95/0x310
[   27.375046]  kunit_try_run_case+0x1a5/0x480
[   27.375405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.375646]  kthread+0x337/0x6f0
[   27.375782]  ret_from_fork+0x116/0x1d0
[   27.376121]  ret_from_fork_asm+0x1a/0x30
[   27.376350] 
[   27.376421] The buggy address belongs to the object at ffff8881059cb500
[   27.376421]  which belongs to the cache kmalloc-64 of size 64
[   27.376895] The buggy address is located 0 bytes to the right of
[   27.376895]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.377641] 
[   27.377783] The buggy address belongs to the physical page:
[   27.378018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.378316] flags: 0x200000000000000(node=0|zone=2)
[   27.378668] page_type: f5(slab)
[   27.378835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.379193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.379530] page dumped because: kasan: bad access detected
[   27.379764] 
[   27.379872] Memory state around the buggy address:
[   27.380175]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.380454]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.380813] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.381114]                                      ^
[   27.381345]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.381639]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.382041] ==================================================================
[   26.702152] ==================================================================
[   26.702482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   26.703011] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.703756] 
[   26.704018] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.704078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.704093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.704125] Call Trace:
[   26.704145]  <TASK>
[   26.704165]  dump_stack_lvl+0x73/0xb0
[   26.704200]  print_report+0xd1/0x610
[   26.704224]  ? __virt_addr_valid+0x1db/0x2d0
[   26.704260]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.704289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.704319]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.704350]  kasan_report+0x141/0x180
[   26.704374]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.704409]  __asan_report_load4_noabort+0x18/0x20
[   26.704437]  kasan_atomics_helper+0x49e8/0x5450
[   26.704468]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.704499]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.704527]  ? kasan_atomics+0x152/0x310
[   26.704557]  kasan_atomics+0x1dc/0x310
[   26.704584]  ? __pfx_kasan_atomics+0x10/0x10
[   26.704612]  ? __pfx_read_tsc+0x10/0x10
[   26.704638]  ? ktime_get_ts64+0x86/0x230
[   26.704667]  kunit_try_run_case+0x1a5/0x480
[   26.704691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.704713]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.704736]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.704813]  ? __kthread_parkme+0x82/0x180
[   26.704850]  ? preempt_count_sub+0x50/0x80
[   26.704876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.704900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.704929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.704957]  kthread+0x337/0x6f0
[   26.704980]  ? trace_preempt_on+0x20/0xc0
[   26.705008]  ? __pfx_kthread+0x10/0x10
[   26.705032]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.705061]  ? calculate_sigpending+0x7b/0xa0
[   26.705089]  ? __pfx_kthread+0x10/0x10
[   26.705114]  ret_from_fork+0x116/0x1d0
[   26.705135]  ? __pfx_kthread+0x10/0x10
[   26.705160]  ret_from_fork_asm+0x1a/0x30
[   26.705201]  </TASK>
[   26.705214] 
[   26.715265] Allocated by task 313:
[   26.715411]  kasan_save_stack+0x45/0x70
[   26.715558]  kasan_save_track+0x18/0x40
[   26.715954]  kasan_save_alloc_info+0x3b/0x50
[   26.716405]  __kasan_kmalloc+0xb7/0xc0
[   26.716569]  __kmalloc_cache_noprof+0x189/0x420
[   26.716766]  kasan_atomics+0x95/0x310
[   26.716895]  kunit_try_run_case+0x1a5/0x480
[   26.717030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.717412]  kthread+0x337/0x6f0
[   26.717583]  ret_from_fork+0x116/0x1d0
[   26.717769]  ret_from_fork_asm+0x1a/0x30
[   26.718075] 
[   26.718140] The buggy address belongs to the object at ffff8881059cb500
[   26.718140]  which belongs to the cache kmalloc-64 of size 64
[   26.718485] The buggy address is located 0 bytes to the right of
[   26.718485]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.719455] 
[   26.719581] The buggy address belongs to the physical page:
[   26.720270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.720611] flags: 0x200000000000000(node=0|zone=2)
[   26.720798] page_type: f5(slab)
[   26.720972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.721284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.721585] page dumped because: kasan: bad access detected
[   26.721803] 
[   26.721874] Memory state around the buggy address:
[   26.722074]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.723425]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.723776] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.724077]                                      ^
[   26.724376]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.724841]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.725383] ==================================================================
[   26.619306] ==================================================================
[   26.619627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   26.619914] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.620343] 
[   26.620586] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.620639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.620653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.620676] Call Trace:
[   26.620698]  <TASK>
[   26.620719]  dump_stack_lvl+0x73/0xb0
[   26.620759]  print_report+0xd1/0x610
[   26.620805]  ? __virt_addr_valid+0x1db/0x2d0
[   26.620854]  ? kasan_atomics_helper+0x1148/0x5450
[   26.620885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.620915]  ? kasan_atomics_helper+0x1148/0x5450
[   26.620945]  kasan_report+0x141/0x180
[   26.620969]  ? kasan_atomics_helper+0x1148/0x5450
[   26.621004]  kasan_check_range+0x10c/0x1c0
[   26.621031]  __kasan_check_write+0x18/0x20
[   26.621059]  kasan_atomics_helper+0x1148/0x5450
[   26.621090]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.621121]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.621148]  ? kasan_atomics+0x152/0x310
[   26.621178]  kasan_atomics+0x1dc/0x310
[   26.621209]  ? __pfx_kasan_atomics+0x10/0x10
[   26.621248]  ? __pfx_read_tsc+0x10/0x10
[   26.621284]  ? ktime_get_ts64+0x86/0x230
[   26.621313]  kunit_try_run_case+0x1a5/0x480
[   26.621336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.621369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.621393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.621423]  ? __kthread_parkme+0x82/0x180
[   26.621446]  ? preempt_count_sub+0x50/0x80
[   26.621471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.621495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.621523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.621551]  kthread+0x337/0x6f0
[   26.621574]  ? trace_preempt_on+0x20/0xc0
[   26.621610]  ? __pfx_kthread+0x10/0x10
[   26.621634]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.621662]  ? calculate_sigpending+0x7b/0xa0
[   26.621703]  ? __pfx_kthread+0x10/0x10
[   26.621728]  ret_from_fork+0x116/0x1d0
[   26.621761]  ? __pfx_kthread+0x10/0x10
[   26.621786]  ret_from_fork_asm+0x1a/0x30
[   26.621823]  </TASK>
[   26.621835] 
[   26.635465] Allocated by task 313:
[   26.635633]  kasan_save_stack+0x45/0x70
[   26.635799]  kasan_save_track+0x18/0x40
[   26.635932]  kasan_save_alloc_info+0x3b/0x50
[   26.636082]  __kasan_kmalloc+0xb7/0xc0
[   26.636215]  __kmalloc_cache_noprof+0x189/0x420
[   26.636382]  kasan_atomics+0x95/0x310
[   26.636513]  kunit_try_run_case+0x1a5/0x480
[   26.636653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.636827]  kthread+0x337/0x6f0
[   26.636948]  ret_from_fork+0x116/0x1d0
[   26.637076]  ret_from_fork_asm+0x1a/0x30
[   26.637224] 
[   26.639019] The buggy address belongs to the object at ffff8881059cb500
[   26.639019]  which belongs to the cache kmalloc-64 of size 64
[   26.641253] The buggy address is located 0 bytes to the right of
[   26.641253]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.642582] 
[   26.642929] The buggy address belongs to the physical page:
[   26.643192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.643547] flags: 0x200000000000000(node=0|zone=2)
[   26.643874] page_type: f5(slab)
[   26.644050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.644370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.644674] page dumped because: kasan: bad access detected
[   26.644993] 
[   26.645095] Memory state around the buggy address:
[   26.645337]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.645613]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.645988] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.646324]                                      ^
[   26.646521]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.647057]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.647403] ==================================================================
[   26.841107] ==================================================================
[   26.841459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   26.842076] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.842426] 
[   26.842541] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.842595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.842609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.842634] Call Trace:
[   26.842654]  <TASK>
[   26.842673]  dump_stack_lvl+0x73/0xb0
[   26.842705]  print_report+0xd1/0x610
[   26.842729]  ? __virt_addr_valid+0x1db/0x2d0
[   26.842860]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.842910]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.842941]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.842972]  kasan_report+0x141/0x180
[   26.842997]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.843032]  __asan_report_store8_noabort+0x1b/0x30
[   26.843062]  kasan_atomics_helper+0x50d4/0x5450
[   26.843093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.843126]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.843154]  ? kasan_atomics+0x152/0x310
[   26.843184]  kasan_atomics+0x1dc/0x310
[   26.843210]  ? __pfx_kasan_atomics+0x10/0x10
[   26.843246]  ? __pfx_read_tsc+0x10/0x10
[   26.843274]  ? ktime_get_ts64+0x86/0x230
[   26.843303]  kunit_try_run_case+0x1a5/0x480
[   26.843329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.843354]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.843379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.843410]  ? __kthread_parkme+0x82/0x180
[   26.843434]  ? preempt_count_sub+0x50/0x80
[   26.843459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.843483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.843511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.843540]  kthread+0x337/0x6f0
[   26.843563]  ? trace_preempt_on+0x20/0xc0
[   26.843590]  ? __pfx_kthread+0x10/0x10
[   26.843616]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.843644]  ? calculate_sigpending+0x7b/0xa0
[   26.843675]  ? __pfx_kthread+0x10/0x10
[   26.843701]  ret_from_fork+0x116/0x1d0
[   26.843723]  ? __pfx_kthread+0x10/0x10
[   26.843810]  ret_from_fork_asm+0x1a/0x30
[   26.843862]  </TASK>
[   26.843876] 
[   26.851855] Allocated by task 313:
[   26.852050]  kasan_save_stack+0x45/0x70
[   26.852201]  kasan_save_track+0x18/0x40
[   26.852424]  kasan_save_alloc_info+0x3b/0x50
[   26.852642]  __kasan_kmalloc+0xb7/0xc0
[   26.853139]  __kmalloc_cache_noprof+0x189/0x420
[   26.853393]  kasan_atomics+0x95/0x310
[   26.853562]  kunit_try_run_case+0x1a5/0x480
[   26.853717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.854028]  kthread+0x337/0x6f0
[   26.854202]  ret_from_fork+0x116/0x1d0
[   26.854396]  ret_from_fork_asm+0x1a/0x30
[   26.854595] 
[   26.854687] The buggy address belongs to the object at ffff8881059cb500
[   26.854687]  which belongs to the cache kmalloc-64 of size 64
[   26.855223] The buggy address is located 0 bytes to the right of
[   26.855223]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.855623] 
[   26.855715] The buggy address belongs to the physical page:
[   26.856032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.856396] flags: 0x200000000000000(node=0|zone=2)
[   26.856630] page_type: f5(slab)
[   26.856854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.857199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.857519] page dumped because: kasan: bad access detected
[   26.857725] 
[   26.858108] Memory state around the buggy address:
[   26.858339]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.858563]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.858964] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.859270]                                      ^
[   26.859475]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.859832]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.860115] ==================================================================
[   26.018721] ==================================================================
[   26.019212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   26.019578] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.020119] 
[   26.020213] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.020280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.020293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.020318] Call Trace:
[   26.020340]  <TASK>
[   26.020361]  dump_stack_lvl+0x73/0xb0
[   26.020394]  print_report+0xd1/0x610
[   26.020419]  ? __virt_addr_valid+0x1db/0x2d0
[   26.020445]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.020475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.020507]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.020538]  kasan_report+0x141/0x180
[   26.020562]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.020597]  kasan_check_range+0x10c/0x1c0
[   26.020624]  __kasan_check_write+0x18/0x20
[   26.020652]  kasan_atomics_helper+0x4a0/0x5450
[   26.020683]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.020739]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.020773]  ? kasan_atomics+0x152/0x310
[   26.020803]  kasan_atomics+0x1dc/0x310
[   26.020906]  ? __pfx_kasan_atomics+0x10/0x10
[   26.020942]  ? __pfx_read_tsc+0x10/0x10
[   26.020970]  ? ktime_get_ts64+0x86/0x230
[   26.021000]  kunit_try_run_case+0x1a5/0x480
[   26.021025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.021048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.021073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.021128]  ? __kthread_parkme+0x82/0x180
[   26.021153]  ? preempt_count_sub+0x50/0x80
[   26.021179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.021211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.021250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.021298]  kthread+0x337/0x6f0
[   26.021323]  ? trace_preempt_on+0x20/0xc0
[   26.021350]  ? __pfx_kthread+0x10/0x10
[   26.021376]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.021405]  ? calculate_sigpending+0x7b/0xa0
[   26.021434]  ? __pfx_kthread+0x10/0x10
[   26.021460]  ret_from_fork+0x116/0x1d0
[   26.021482]  ? __pfx_kthread+0x10/0x10
[   26.021506]  ret_from_fork_asm+0x1a/0x30
[   26.021542]  </TASK>
[   26.021557] 
[   26.031195] Allocated by task 313:
[   26.031378]  kasan_save_stack+0x45/0x70
[   26.031567]  kasan_save_track+0x18/0x40
[   26.031738]  kasan_save_alloc_info+0x3b/0x50
[   26.032051]  __kasan_kmalloc+0xb7/0xc0
[   26.032222]  __kmalloc_cache_noprof+0x189/0x420
[   26.032433]  kasan_atomics+0x95/0x310
[   26.032596]  kunit_try_run_case+0x1a5/0x480
[   26.032845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.033073]  kthread+0x337/0x6f0
[   26.033235]  ret_from_fork+0x116/0x1d0
[   26.033415]  ret_from_fork_asm+0x1a/0x30
[   26.033593] 
[   26.033676] The buggy address belongs to the object at ffff8881059cb500
[   26.033676]  which belongs to the cache kmalloc-64 of size 64
[   26.034654] The buggy address is located 0 bytes to the right of
[   26.034654]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.035777] 
[   26.035886] The buggy address belongs to the physical page:
[   26.036068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.036324] flags: 0x200000000000000(node=0|zone=2)
[   26.036492] page_type: f5(slab)
[   26.036735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.038449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.039577] page dumped because: kasan: bad access detected
[   26.040292] 
[   26.040629] Memory state around the buggy address:
[   26.041447]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.042390]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.042626] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.043470]                                      ^
[   26.044225]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.044657]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.045041] ==================================================================
[   26.259555] ==================================================================
[   26.260029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   26.260340] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.260592] 
[   26.260702] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.260774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.260788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.260826] Call Trace:
[   26.260861]  <TASK>
[   26.260882]  dump_stack_lvl+0x73/0xb0
[   26.260940]  print_report+0xd1/0x610
[   26.261015]  ? __virt_addr_valid+0x1db/0x2d0
[   26.261047]  ? kasan_atomics_helper+0x992/0x5450
[   26.261077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.261107]  ? kasan_atomics_helper+0x992/0x5450
[   26.261137]  kasan_report+0x141/0x180
[   26.261162]  ? kasan_atomics_helper+0x992/0x5450
[   26.261203]  kasan_check_range+0x10c/0x1c0
[   26.261231]  __kasan_check_write+0x18/0x20
[   26.261271]  kasan_atomics_helper+0x992/0x5450
[   26.261303]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.261334]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.261363]  ? kasan_atomics+0x152/0x310
[   26.261392]  kasan_atomics+0x1dc/0x310
[   26.261419]  ? __pfx_kasan_atomics+0x10/0x10
[   26.261446]  ? __pfx_read_tsc+0x10/0x10
[   26.261474]  ? ktime_get_ts64+0x86/0x230
[   26.261503]  kunit_try_run_case+0x1a5/0x480
[   26.261527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.261551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.261598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.261629]  ? __kthread_parkme+0x82/0x180
[   26.261652]  ? preempt_count_sub+0x50/0x80
[   26.261696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.261720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.261749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.261787]  kthread+0x337/0x6f0
[   26.261810]  ? trace_preempt_on+0x20/0xc0
[   26.261904]  ? __pfx_kthread+0x10/0x10
[   26.261929]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.261958]  ? calculate_sigpending+0x7b/0xa0
[   26.261988]  ? __pfx_kthread+0x10/0x10
[   26.262032]  ret_from_fork+0x116/0x1d0
[   26.262055]  ? __pfx_kthread+0x10/0x10
[   26.262079]  ret_from_fork_asm+0x1a/0x30
[   26.262115]  </TASK>
[   26.262128] 
[   26.270960] Allocated by task 313:
[   26.271508]  kasan_save_stack+0x45/0x70
[   26.271724]  kasan_save_track+0x18/0x40
[   26.272007]  kasan_save_alloc_info+0x3b/0x50
[   26.272160]  __kasan_kmalloc+0xb7/0xc0
[   26.272298]  __kmalloc_cache_noprof+0x189/0x420
[   26.272452]  kasan_atomics+0x95/0x310
[   26.272642]  kunit_try_run_case+0x1a5/0x480
[   26.272875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.273161]  kthread+0x337/0x6f0
[   26.273431]  ret_from_fork+0x116/0x1d0
[   26.273668]  ret_from_fork_asm+0x1a/0x30
[   26.274073] 
[   26.274170] The buggy address belongs to the object at ffff8881059cb500
[   26.274170]  which belongs to the cache kmalloc-64 of size 64
[   26.274671] The buggy address is located 0 bytes to the right of
[   26.274671]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.275609] 
[   26.275717] The buggy address belongs to the physical page:
[   26.275984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.276448] flags: 0x200000000000000(node=0|zone=2)
[   26.276611] page_type: f5(slab)
[   26.276725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.277062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.277572] page dumped because: kasan: bad access detected
[   26.277880] 
[   26.277968] Memory state around the buggy address:
[   26.278197]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.278525]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.278820] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.279017]                                      ^
[   26.279161]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.279487]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.279957] ==================================================================
[   27.289403] ==================================================================
[   27.289739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   27.290076] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.290414] 
[   27.290521] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.290568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.290581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.290604] Call Trace:
[   27.290621]  <TASK>
[   27.290639]  dump_stack_lvl+0x73/0xb0
[   27.290667]  print_report+0xd1/0x610
[   27.290690]  ? __virt_addr_valid+0x1db/0x2d0
[   27.290714]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.290744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.290773]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.290803]  kasan_report+0x141/0x180
[   27.290827]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.290861]  kasan_check_range+0x10c/0x1c0
[   27.290887]  __kasan_check_write+0x18/0x20
[   27.290915]  kasan_atomics_helper+0x1f43/0x5450
[   27.290945]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.290974]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.291001]  ? kasan_atomics+0x152/0x310
[   27.291029]  kasan_atomics+0x1dc/0x310
[   27.291054]  ? __pfx_kasan_atomics+0x10/0x10
[   27.291081]  ? __pfx_read_tsc+0x10/0x10
[   27.291106]  ? ktime_get_ts64+0x86/0x230
[   27.291133]  kunit_try_run_case+0x1a5/0x480
[   27.291155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.291176]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.291199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.291229]  ? __kthread_parkme+0x82/0x180
[   27.291260]  ? preempt_count_sub+0x50/0x80
[   27.291284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.291307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.291335]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.291363]  kthread+0x337/0x6f0
[   27.291401]  ? trace_preempt_on+0x20/0xc0
[   27.291429]  ? __pfx_kthread+0x10/0x10
[   27.291470]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.291499]  ? calculate_sigpending+0x7b/0xa0
[   27.291527]  ? __pfx_kthread+0x10/0x10
[   27.291552]  ret_from_fork+0x116/0x1d0
[   27.291573]  ? __pfx_kthread+0x10/0x10
[   27.291596]  ret_from_fork_asm+0x1a/0x30
[   27.291632]  </TASK>
[   27.291644] 
[   27.299962] Allocated by task 313:
[   27.300136]  kasan_save_stack+0x45/0x70
[   27.300321]  kasan_save_track+0x18/0x40
[   27.300526]  kasan_save_alloc_info+0x3b/0x50
[   27.300665]  __kasan_kmalloc+0xb7/0xc0
[   27.300786]  __kmalloc_cache_noprof+0x189/0x420
[   27.300933]  kasan_atomics+0x95/0x310
[   27.301059]  kunit_try_run_case+0x1a5/0x480
[   27.301189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.301367]  kthread+0x337/0x6f0
[   27.301479]  ret_from_fork+0x116/0x1d0
[   27.301599]  ret_from_fork_asm+0x1a/0x30
[   27.301893] 
[   27.302016] The buggy address belongs to the object at ffff8881059cb500
[   27.302016]  which belongs to the cache kmalloc-64 of size 64
[   27.302556] The buggy address is located 0 bytes to the right of
[   27.302556]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.303570] 
[   27.303648] The buggy address belongs to the physical page:
[   27.303810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.304258] flags: 0x200000000000000(node=0|zone=2)
[   27.304411] page_type: f5(slab)
[   27.304524] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.304741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.305382] page dumped because: kasan: bad access detected
[   27.305908] 
[   27.306009] Memory state around the buggy address:
[   27.306253]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.306612]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.307014] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.307224]                                      ^
[   27.307675]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.308047]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.308402] ==================================================================
[   26.822397] ==================================================================
[   26.822702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   26.823286] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.823568] 
[   26.823682] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.823734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.823821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.823861] Call Trace:
[   26.823882]  <TASK>
[   26.823901]  dump_stack_lvl+0x73/0xb0
[   26.823933]  print_report+0xd1/0x610
[   26.823958]  ? __virt_addr_valid+0x1db/0x2d0
[   26.823983]  ? kasan_atomics_helper+0x1467/0x5450
[   26.824013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.824044]  ? kasan_atomics_helper+0x1467/0x5450
[   26.824074]  kasan_report+0x141/0x180
[   26.824098]  ? kasan_atomics_helper+0x1467/0x5450
[   26.824133]  kasan_check_range+0x10c/0x1c0
[   26.824160]  __kasan_check_write+0x18/0x20
[   26.824189]  kasan_atomics_helper+0x1467/0x5450
[   26.824222]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.824263]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.824291]  ? kasan_atomics+0x152/0x310
[   26.824321]  kasan_atomics+0x1dc/0x310
[   26.824348]  ? __pfx_kasan_atomics+0x10/0x10
[   26.824376]  ? __pfx_read_tsc+0x10/0x10
[   26.824404]  ? ktime_get_ts64+0x86/0x230
[   26.824432]  kunit_try_run_case+0x1a5/0x480
[   26.824456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.824479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.824502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.824534]  ? __kthread_parkme+0x82/0x180
[   26.824555]  ? preempt_count_sub+0x50/0x80
[   26.824582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.824605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.824632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.824661]  kthread+0x337/0x6f0
[   26.824683]  ? trace_preempt_on+0x20/0xc0
[   26.824710]  ? __pfx_kthread+0x10/0x10
[   26.824733]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.824825]  ? calculate_sigpending+0x7b/0xa0
[   26.824871]  ? __pfx_kthread+0x10/0x10
[   26.824897]  ret_from_fork+0x116/0x1d0
[   26.824918]  ? __pfx_kthread+0x10/0x10
[   26.824942]  ret_from_fork_asm+0x1a/0x30
[   26.824978]  </TASK>
[   26.824991] 
[   26.832704] Allocated by task 313:
[   26.833088]  kasan_save_stack+0x45/0x70
[   26.833312]  kasan_save_track+0x18/0x40
[   26.833500]  kasan_save_alloc_info+0x3b/0x50
[   26.833705]  __kasan_kmalloc+0xb7/0xc0
[   26.833992]  __kmalloc_cache_noprof+0x189/0x420
[   26.834218]  kasan_atomics+0x95/0x310
[   26.834417]  kunit_try_run_case+0x1a5/0x480
[   26.834616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.834951]  kthread+0x337/0x6f0
[   26.835127]  ret_from_fork+0x116/0x1d0
[   26.835277]  ret_from_fork_asm+0x1a/0x30
[   26.835416] 
[   26.835484] The buggy address belongs to the object at ffff8881059cb500
[   26.835484]  which belongs to the cache kmalloc-64 of size 64
[   26.835840] The buggy address is located 0 bytes to the right of
[   26.835840]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.836387] 
[   26.836485] The buggy address belongs to the physical page:
[   26.836740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.837096] flags: 0x200000000000000(node=0|zone=2)
[   26.837409] page_type: f5(slab)
[   26.837538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.837854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.838190] page dumped because: kasan: bad access detected
[   26.838451] 
[   26.838540] Memory state around the buggy address:
[   26.838983]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.839335]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.839582] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.839973]                                      ^
[   26.840185]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.840448]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.840655] ==================================================================
[   26.344157] ==================================================================
[   26.344443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   26.344917] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.345222] 
[   26.345366] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.345420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.345434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.345491] Call Trace:
[   26.345513]  <TASK>
[   26.345536]  dump_stack_lvl+0x73/0xb0
[   26.345568]  print_report+0xd1/0x610
[   26.345593]  ? __virt_addr_valid+0x1db/0x2d0
[   26.345619]  ? kasan_atomics_helper+0xc70/0x5450
[   26.345681]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.345712]  ? kasan_atomics_helper+0xc70/0x5450
[   26.345838]  kasan_report+0x141/0x180
[   26.345886]  ? kasan_atomics_helper+0xc70/0x5450
[   26.345952]  kasan_check_range+0x10c/0x1c0
[   26.345980]  __kasan_check_write+0x18/0x20
[   26.346009]  kasan_atomics_helper+0xc70/0x5450
[   26.346040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.346070]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.346099]  ? kasan_atomics+0x152/0x310
[   26.346128]  kasan_atomics+0x1dc/0x310
[   26.346154]  ? __pfx_kasan_atomics+0x10/0x10
[   26.346182]  ? __pfx_read_tsc+0x10/0x10
[   26.346209]  ? ktime_get_ts64+0x86/0x230
[   26.346248]  kunit_try_run_case+0x1a5/0x480
[   26.346273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.346295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.346319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.346350]  ? __kthread_parkme+0x82/0x180
[   26.346373]  ? preempt_count_sub+0x50/0x80
[   26.346399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.346423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.346451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.346480]  kthread+0x337/0x6f0
[   26.346503]  ? trace_preempt_on+0x20/0xc0
[   26.346529]  ? __pfx_kthread+0x10/0x10
[   26.346554]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.346582]  ? calculate_sigpending+0x7b/0xa0
[   26.346611]  ? __pfx_kthread+0x10/0x10
[   26.346635]  ret_from_fork+0x116/0x1d0
[   26.346657]  ? __pfx_kthread+0x10/0x10
[   26.346682]  ret_from_fork_asm+0x1a/0x30
[   26.346718]  </TASK>
[   26.346732] 
[   26.354904] Allocated by task 313:
[   26.355115]  kasan_save_stack+0x45/0x70
[   26.355342]  kasan_save_track+0x18/0x40
[   26.355535]  kasan_save_alloc_info+0x3b/0x50
[   26.356010]  __kasan_kmalloc+0xb7/0xc0
[   26.356248]  __kmalloc_cache_noprof+0x189/0x420
[   26.356491]  kasan_atomics+0x95/0x310
[   26.356684]  kunit_try_run_case+0x1a5/0x480
[   26.357034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.357299]  kthread+0x337/0x6f0
[   26.357420]  ret_from_fork+0x116/0x1d0
[   26.357564]  ret_from_fork_asm+0x1a/0x30
[   26.357969] 
[   26.358101] The buggy address belongs to the object at ffff8881059cb500
[   26.358101]  which belongs to the cache kmalloc-64 of size 64
[   26.358608] The buggy address is located 0 bytes to the right of
[   26.358608]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.359267] 
[   26.359371] The buggy address belongs to the physical page:
[   26.359623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.360100] flags: 0x200000000000000(node=0|zone=2)
[   26.360350] page_type: f5(slab)
[   26.360512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.361114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.361435] page dumped because: kasan: bad access detected
[   26.361695] 
[   26.361794] Memory state around the buggy address:
[   26.361954]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.362292]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.362607] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.362920]                                      ^
[   26.363126]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.363520]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.363788] ==================================================================
[   27.107116] ==================================================================
[   27.107949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   27.108216] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.108462] 
[   27.108551] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.108621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.108638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.108674] Call Trace:
[   27.108696]  <TASK>
[   27.108721]  dump_stack_lvl+0x73/0xb0
[   27.108754]  print_report+0xd1/0x610
[   27.108790]  ? __virt_addr_valid+0x1db/0x2d0
[   27.108817]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.108851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.108885]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.108918]  kasan_report+0x141/0x180
[   27.108944]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.108981]  kasan_check_range+0x10c/0x1c0
[   27.109011]  __kasan_check_write+0x18/0x20
[   27.109040]  kasan_atomics_helper+0x1b22/0x5450
[   27.109074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.109107]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.109140]  ? kasan_atomics+0x152/0x310
[   27.109172]  kasan_atomics+0x1dc/0x310
[   27.109206]  ? __pfx_kasan_atomics+0x10/0x10
[   27.109246]  ? __pfx_read_tsc+0x10/0x10
[   27.109274]  ? ktime_get_ts64+0x86/0x230
[   27.109305]  kunit_try_run_case+0x1a5/0x480
[   27.109331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.109356]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.109383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.109417]  ? __kthread_parkme+0x82/0x180
[   27.109441]  ? preempt_count_sub+0x50/0x80
[   27.109469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.109497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.109529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.109564]  kthread+0x337/0x6f0
[   27.109587]  ? trace_preempt_on+0x20/0xc0
[   27.109616]  ? __pfx_kthread+0x10/0x10
[   27.109642]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.109672]  ? calculate_sigpending+0x7b/0xa0
[   27.109705]  ? __pfx_kthread+0x10/0x10
[   27.109732]  ret_from_fork+0x116/0x1d0
[   27.109755]  ? __pfx_kthread+0x10/0x10
[   27.109780]  ret_from_fork_asm+0x1a/0x30
[   27.109818]  </TASK>
[   27.109831] 
[   27.127648] Allocated by task 313:
[   27.127799]  kasan_save_stack+0x45/0x70
[   27.128256]  kasan_save_track+0x18/0x40
[   27.128629]  kasan_save_alloc_info+0x3b/0x50
[   27.129145]  __kasan_kmalloc+0xb7/0xc0
[   27.129549]  __kmalloc_cache_noprof+0x189/0x420
[   27.130054]  kasan_atomics+0x95/0x310
[   27.130489]  kunit_try_run_case+0x1a5/0x480
[   27.130889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.131488]  kthread+0x337/0x6f0
[   27.131728]  ret_from_fork+0x116/0x1d0
[   27.132051]  ret_from_fork_asm+0x1a/0x30
[   27.132523] 
[   27.132717] The buggy address belongs to the object at ffff8881059cb500
[   27.132717]  which belongs to the cache kmalloc-64 of size 64
[   27.133566] The buggy address is located 0 bytes to the right of
[   27.133566]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.134724] 
[   27.134911] The buggy address belongs to the physical page:
[   27.135328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.135573] flags: 0x200000000000000(node=0|zone=2)
[   27.135735] page_type: f5(slab)
[   27.136148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.136505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.137538] page dumped because: kasan: bad access detected
[   27.137920] 
[   27.138113] Memory state around the buggy address:
[   27.138290]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.139066]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.139784] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.140255]                                      ^
[   27.140408]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.140613]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.140961] ==================================================================
[   26.396227] ==================================================================
[   26.396868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   26.397666] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.398457] 
[   26.398628] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.398703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.398717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.398742] Call Trace:
[   26.398775]  <TASK>
[   26.398813]  dump_stack_lvl+0x73/0xb0
[   26.398854]  print_report+0xd1/0x610
[   26.398878]  ? __virt_addr_valid+0x1db/0x2d0
[   26.398905]  ? kasan_atomics_helper+0xd47/0x5450
[   26.398935]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.398965]  ? kasan_atomics_helper+0xd47/0x5450
[   26.398995]  kasan_report+0x141/0x180
[   26.399019]  ? kasan_atomics_helper+0xd47/0x5450
[   26.399054]  kasan_check_range+0x10c/0x1c0
[   26.399081]  __kasan_check_write+0x18/0x20
[   26.399109]  kasan_atomics_helper+0xd47/0x5450
[   26.399140]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.399171]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.399200]  ? kasan_atomics+0x152/0x310
[   26.399230]  kasan_atomics+0x1dc/0x310
[   26.399266]  ? __pfx_kasan_atomics+0x10/0x10
[   26.399293]  ? __pfx_read_tsc+0x10/0x10
[   26.399321]  ? ktime_get_ts64+0x86/0x230
[   26.399349]  kunit_try_run_case+0x1a5/0x480
[   26.399374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.399396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.399420]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.399450]  ? __kthread_parkme+0x82/0x180
[   26.399473]  ? preempt_count_sub+0x50/0x80
[   26.399499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.399522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.399551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.399579]  kthread+0x337/0x6f0
[   26.399602]  ? trace_preempt_on+0x20/0xc0
[   26.399628]  ? __pfx_kthread+0x10/0x10
[   26.399652]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.399680]  ? calculate_sigpending+0x7b/0xa0
[   26.399710]  ? __pfx_kthread+0x10/0x10
[   26.399735]  ret_from_fork+0x116/0x1d0
[   26.399756]  ? __pfx_kthread+0x10/0x10
[   26.399780]  ret_from_fork_asm+0x1a/0x30
[   26.399860]  </TASK>
[   26.399876] 
[   26.413274] Allocated by task 313:
[   26.413557]  kasan_save_stack+0x45/0x70
[   26.413710]  kasan_save_track+0x18/0x40
[   26.414064]  kasan_save_alloc_info+0x3b/0x50
[   26.414604]  __kasan_kmalloc+0xb7/0xc0
[   26.415058]  __kmalloc_cache_noprof+0x189/0x420
[   26.415510]  kasan_atomics+0x95/0x310
[   26.415913]  kunit_try_run_case+0x1a5/0x480
[   26.416101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.416291]  kthread+0x337/0x6f0
[   26.416411]  ret_from_fork+0x116/0x1d0
[   26.416540]  ret_from_fork_asm+0x1a/0x30
[   26.416678] 
[   26.416745] The buggy address belongs to the object at ffff8881059cb500
[   26.416745]  which belongs to the cache kmalloc-64 of size 64
[   26.417971] The buggy address is located 0 bytes to the right of
[   26.417971]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.419389] 
[   26.419579] The buggy address belongs to the physical page:
[   26.420112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.420801] flags: 0x200000000000000(node=0|zone=2)
[   26.421396] page_type: f5(slab)
[   26.421812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.422146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.422386] page dumped because: kasan: bad access detected
[   26.422554] 
[   26.422619] Memory state around the buggy address:
[   26.422838]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.423531]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.424360] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.425206]                                      ^
[   26.425636]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.426394]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.427127] ==================================================================
[   25.888698] ==================================================================
[   25.889635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   25.890574] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   25.891259] 
[   25.891437] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.891491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.891503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.891526] Call Trace:
[   25.891542]  <TASK>
[   25.891562]  dump_stack_lvl+0x73/0xb0
[   25.891594]  print_report+0xd1/0x610
[   25.891618]  ? __virt_addr_valid+0x1db/0x2d0
[   25.891643]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.891672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.891700]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.891729]  kasan_report+0x141/0x180
[   25.891763]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.891797]  __asan_report_store4_noabort+0x1b/0x30
[   25.891863]  kasan_atomics_helper+0x4ba2/0x5450
[   25.891909]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.891938]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.891966]  ? kasan_atomics+0x152/0x310
[   25.891994]  kasan_atomics+0x1dc/0x310
[   25.892019]  ? __pfx_kasan_atomics+0x10/0x10
[   25.892046]  ? __pfx_read_tsc+0x10/0x10
[   25.892072]  ? ktime_get_ts64+0x86/0x230
[   25.892099]  kunit_try_run_case+0x1a5/0x480
[   25.892122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.892143]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.892166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.892195]  ? __kthread_parkme+0x82/0x180
[   25.892217]  ? preempt_count_sub+0x50/0x80
[   25.892304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.892329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.892356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.892384]  kthread+0x337/0x6f0
[   25.892405]  ? trace_preempt_on+0x20/0xc0
[   25.892430]  ? __pfx_kthread+0x10/0x10
[   25.892453]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.892481]  ? calculate_sigpending+0x7b/0xa0
[   25.892509]  ? __pfx_kthread+0x10/0x10
[   25.892532]  ret_from_fork+0x116/0x1d0
[   25.892552]  ? __pfx_kthread+0x10/0x10
[   25.892575]  ret_from_fork_asm+0x1a/0x30
[   25.892610]  </TASK>
[   25.892621] 
[   25.905283] Allocated by task 313:
[   25.905443]  kasan_save_stack+0x45/0x70
[   25.906014]  kasan_save_track+0x18/0x40
[   25.906381]  kasan_save_alloc_info+0x3b/0x50
[   25.906751]  __kasan_kmalloc+0xb7/0xc0
[   25.907147]  __kmalloc_cache_noprof+0x189/0x420
[   25.907657]  kasan_atomics+0x95/0x310
[   25.907870]  kunit_try_run_case+0x1a5/0x480
[   25.908308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.908689]  kthread+0x337/0x6f0
[   25.908848]  ret_from_fork+0x116/0x1d0
[   25.909282]  ret_from_fork_asm+0x1a/0x30
[   25.909681] 
[   25.909843] The buggy address belongs to the object at ffff8881059cb500
[   25.909843]  which belongs to the cache kmalloc-64 of size 64
[   25.910991] The buggy address is located 0 bytes to the right of
[   25.910991]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   25.911562] 
[   25.911633] The buggy address belongs to the physical page:
[   25.911826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   25.912601] flags: 0x200000000000000(node=0|zone=2)
[   25.913097] page_type: f5(slab)
[   25.913459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.914381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.915281] page dumped because: kasan: bad access detected
[   25.915547] 
[   25.915612] Memory state around the buggy address:
[   25.915827]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.916449]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.917180] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.917953]                                      ^
[   25.918376]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.918630]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.919208] ==================================================================
[   27.336908] ==================================================================
[   27.337235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   27.337747] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.338281] 
[   27.338628] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.338795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.338811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.338848] Call Trace:
[   27.338869]  <TASK>
[   27.338892]  dump_stack_lvl+0x73/0xb0
[   27.338927]  print_report+0xd1/0x610
[   27.338951]  ? __virt_addr_valid+0x1db/0x2d0
[   27.338977]  ? kasan_atomics_helper+0x2006/0x5450
[   27.339007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.339036]  ? kasan_atomics_helper+0x2006/0x5450
[   27.339068]  kasan_report+0x141/0x180
[   27.339092]  ? kasan_atomics_helper+0x2006/0x5450
[   27.339128]  kasan_check_range+0x10c/0x1c0
[   27.339154]  __kasan_check_write+0x18/0x20
[   27.339182]  kasan_atomics_helper+0x2006/0x5450
[   27.339213]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.339255]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.339284]  ? kasan_atomics+0x152/0x310
[   27.339314]  kasan_atomics+0x1dc/0x310
[   27.339340]  ? __pfx_kasan_atomics+0x10/0x10
[   27.339367]  ? __pfx_read_tsc+0x10/0x10
[   27.339395]  ? ktime_get_ts64+0x86/0x230
[   27.339424]  kunit_try_run_case+0x1a5/0x480
[   27.339449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.339471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.339494]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.339525]  ? __kthread_parkme+0x82/0x180
[   27.339547]  ? preempt_count_sub+0x50/0x80
[   27.339572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.339596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.339624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.339651]  kthread+0x337/0x6f0
[   27.339674]  ? trace_preempt_on+0x20/0xc0
[   27.339700]  ? __pfx_kthread+0x10/0x10
[   27.339724]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.339753]  ? calculate_sigpending+0x7b/0xa0
[   27.339785]  ? __pfx_kthread+0x10/0x10
[   27.339810]  ret_from_fork+0x116/0x1d0
[   27.339843]  ? __pfx_kthread+0x10/0x10
[   27.339867]  ret_from_fork_asm+0x1a/0x30
[   27.339905]  </TASK>
[   27.339917] 
[   27.352317] Allocated by task 313:
[   27.352700]  kasan_save_stack+0x45/0x70
[   27.352898]  kasan_save_track+0x18/0x40
[   27.353326]  kasan_save_alloc_info+0x3b/0x50
[   27.353582]  __kasan_kmalloc+0xb7/0xc0
[   27.353712]  __kmalloc_cache_noprof+0x189/0x420
[   27.353894]  kasan_atomics+0x95/0x310
[   27.354288]  kunit_try_run_case+0x1a5/0x480
[   27.354688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.355232]  kthread+0x337/0x6f0
[   27.355589]  ret_from_fork+0x116/0x1d0
[   27.355952]  ret_from_fork_asm+0x1a/0x30
[   27.356088] 
[   27.356154] The buggy address belongs to the object at ffff8881059cb500
[   27.356154]  which belongs to the cache kmalloc-64 of size 64
[   27.356503] The buggy address is located 0 bytes to the right of
[   27.356503]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.356885] 
[   27.356964] The buggy address belongs to the physical page:
[   27.357210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.357510] flags: 0x200000000000000(node=0|zone=2)
[   27.357682] page_type: f5(slab)
[   27.357844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.358365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.358635] page dumped because: kasan: bad access detected
[   27.358797] 
[   27.358860] Memory state around the buggy address:
[   27.359006]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.359332]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.359755] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.360346]                                      ^
[   27.360561]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.360948]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.361163] ==================================================================
[   25.995619] ==================================================================
[   25.996307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   25.996861] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   25.997458] 
[   25.997697] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.997759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.997774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.997905] Call Trace:
[   25.997928]  <TASK>
[   25.997951]  dump_stack_lvl+0x73/0xb0
[   25.997985]  print_report+0xd1/0x610
[   25.998010]  ? __virt_addr_valid+0x1db/0x2d0
[   25.998037]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.998067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.998098]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.998129]  kasan_report+0x141/0x180
[   25.998154]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.998189]  __asan_report_load4_noabort+0x18/0x20
[   25.998217]  kasan_atomics_helper+0x4b54/0x5450
[   25.998318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.998351]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.998381]  ? kasan_atomics+0x152/0x310
[   25.998412]  kasan_atomics+0x1dc/0x310
[   25.998438]  ? __pfx_kasan_atomics+0x10/0x10
[   25.998466]  ? __pfx_read_tsc+0x10/0x10
[   25.998494]  ? ktime_get_ts64+0x86/0x230
[   25.998522]  kunit_try_run_case+0x1a5/0x480
[   25.998547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.998570]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.998595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.998627]  ? __kthread_parkme+0x82/0x180
[   25.998651]  ? preempt_count_sub+0x50/0x80
[   25.998677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.998701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.998730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.998797]  kthread+0x337/0x6f0
[   25.998823]  ? trace_preempt_on+0x20/0xc0
[   25.998851]  ? __pfx_kthread+0x10/0x10
[   25.998877]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.998906]  ? calculate_sigpending+0x7b/0xa0
[   25.998935]  ? __pfx_kthread+0x10/0x10
[   25.998960]  ret_from_fork+0x116/0x1d0
[   25.998982]  ? __pfx_kthread+0x10/0x10
[   25.999006]  ret_from_fork_asm+0x1a/0x30
[   25.999042]  </TASK>
[   25.999056] 
[   26.010297] Allocated by task 313:
[   26.010483]  kasan_save_stack+0x45/0x70
[   26.010651]  kasan_save_track+0x18/0x40
[   26.010839]  kasan_save_alloc_info+0x3b/0x50
[   26.011107]  __kasan_kmalloc+0xb7/0xc0
[   26.011265]  __kmalloc_cache_noprof+0x189/0x420
[   26.011492]  kasan_atomics+0x95/0x310
[   26.011673]  kunit_try_run_case+0x1a5/0x480
[   26.011854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.012320]  kthread+0x337/0x6f0
[   26.012459]  ret_from_fork+0x116/0x1d0
[   26.012646]  ret_from_fork_asm+0x1a/0x30
[   26.012992] 
[   26.013077] The buggy address belongs to the object at ffff8881059cb500
[   26.013077]  which belongs to the cache kmalloc-64 of size 64
[   26.013581] The buggy address is located 0 bytes to the right of
[   26.013581]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.014159] 
[   26.014292] The buggy address belongs to the physical page:
[   26.014505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.014902] flags: 0x200000000000000(node=0|zone=2)
[   26.015094] page_type: f5(slab)
[   26.015272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.015578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.015862] page dumped because: kasan: bad access detected
[   26.016028] 
[   26.016114] Memory state around the buggy address:
[   26.016429]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.016693]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.016904] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.017111]                                      ^
[   26.017437]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.017763]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.018078] ==================================================================
[   27.142067] ==================================================================
[   27.142852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   27.143588] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.144363] 
[   27.144606] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.144674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.144688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.144712] Call Trace:
[   27.144734]  <TASK>
[   27.144756]  dump_stack_lvl+0x73/0xb0
[   27.144808]  print_report+0xd1/0x610
[   27.144833]  ? __virt_addr_valid+0x1db/0x2d0
[   27.144870]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.144901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.144952]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.144983]  kasan_report+0x141/0x180
[   27.145006]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.145041]  kasan_check_range+0x10c/0x1c0
[   27.145068]  __kasan_check_write+0x18/0x20
[   27.145095]  kasan_atomics_helper+0x1c18/0x5450
[   27.145127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.145158]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.145186]  ? kasan_atomics+0x152/0x310
[   27.145222]  kasan_atomics+0x1dc/0x310
[   27.145258]  ? __pfx_kasan_atomics+0x10/0x10
[   27.145285]  ? __pfx_read_tsc+0x10/0x10
[   27.145311]  ? ktime_get_ts64+0x86/0x230
[   27.145340]  kunit_try_run_case+0x1a5/0x480
[   27.145363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.145385]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.145409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.145440]  ? __kthread_parkme+0x82/0x180
[   27.145462]  ? preempt_count_sub+0x50/0x80
[   27.145487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.145511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.145539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.145568]  kthread+0x337/0x6f0
[   27.145590]  ? trace_preempt_on+0x20/0xc0
[   27.145617]  ? __pfx_kthread+0x10/0x10
[   27.145640]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.145668]  ? calculate_sigpending+0x7b/0xa0
[   27.145698]  ? __pfx_kthread+0x10/0x10
[   27.145723]  ret_from_fork+0x116/0x1d0
[   27.145743]  ? __pfx_kthread+0x10/0x10
[   27.145792]  ret_from_fork_asm+0x1a/0x30
[   27.145839]  </TASK>
[   27.145852] 
[   27.163344] Allocated by task 313:
[   27.164081]  kasan_save_stack+0x45/0x70
[   27.164721]  kasan_save_track+0x18/0x40
[   27.165512]  kasan_save_alloc_info+0x3b/0x50
[   27.165979]  __kasan_kmalloc+0xb7/0xc0
[   27.166380]  __kmalloc_cache_noprof+0x189/0x420
[   27.166932]  kasan_atomics+0x95/0x310
[   27.167215]  kunit_try_run_case+0x1a5/0x480
[   27.167375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.167949]  kthread+0x337/0x6f0
[   27.168323]  ret_from_fork+0x116/0x1d0
[   27.168654]  ret_from_fork_asm+0x1a/0x30
[   27.168933] 
[   27.169163] The buggy address belongs to the object at ffff8881059cb500
[   27.169163]  which belongs to the cache kmalloc-64 of size 64
[   27.170083] The buggy address is located 0 bytes to the right of
[   27.170083]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.170998] 
[   27.171138] The buggy address belongs to the physical page:
[   27.171510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.172086] flags: 0x200000000000000(node=0|zone=2)
[   27.172354] page_type: f5(slab)
[   27.172684] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.173136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.173382] page dumped because: kasan: bad access detected
[   27.173554] 
[   27.173621] Memory state around the buggy address:
[   27.173957]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.174426]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.174860] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.175161]                                      ^
[   27.175332]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.175955]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.176533] ==================================================================
[   25.860419] ==================================================================
[   25.861022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   25.861378] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   25.861686] 
[   25.861799] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.861858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.861872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.861896] Call Trace:
[   25.861911]  <TASK>
[   25.861933]  dump_stack_lvl+0x73/0xb0
[   25.862174]  print_report+0xd1/0x610
[   25.862202]  ? __virt_addr_valid+0x1db/0x2d0
[   25.862230]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.862279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.862308]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.862337]  kasan_report+0x141/0x180
[   25.862360]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.862394]  __asan_report_load4_noabort+0x18/0x20
[   25.862421]  kasan_atomics_helper+0x4bbc/0x5450
[   25.862451]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.862480]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.862509]  ? kasan_atomics+0x152/0x310
[   25.862537]  kasan_atomics+0x1dc/0x310
[   25.862562]  ? __pfx_kasan_atomics+0x10/0x10
[   25.862589]  ? __pfx_read_tsc+0x10/0x10
[   25.862615]  ? ktime_get_ts64+0x86/0x230
[   25.862644]  kunit_try_run_case+0x1a5/0x480
[   25.862669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.862690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.862713]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.862743]  ? __kthread_parkme+0x82/0x180
[   25.862765]  ? preempt_count_sub+0x50/0x80
[   25.862790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.862812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.862903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.862936]  kthread+0x337/0x6f0
[   25.862958]  ? trace_preempt_on+0x20/0xc0
[   25.862986]  ? __pfx_kthread+0x10/0x10
[   25.863008]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.863035]  ? calculate_sigpending+0x7b/0xa0
[   25.863064]  ? __pfx_kthread+0x10/0x10
[   25.863088]  ret_from_fork+0x116/0x1d0
[   25.863109]  ? __pfx_kthread+0x10/0x10
[   25.863132]  ret_from_fork_asm+0x1a/0x30
[   25.863168]  </TASK>
[   25.863180] 
[   25.871642] Allocated by task 313:
[   25.871791]  kasan_save_stack+0x45/0x70
[   25.871943]  kasan_save_track+0x18/0x40
[   25.872073]  kasan_save_alloc_info+0x3b/0x50
[   25.872217]  __kasan_kmalloc+0xb7/0xc0
[   25.872704]  __kmalloc_cache_noprof+0x189/0x420
[   25.873366]  kasan_atomics+0x95/0x310
[   25.873693]  kunit_try_run_case+0x1a5/0x480
[   25.874041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.874789]  kthread+0x337/0x6f0
[   25.875205]  ret_from_fork+0x116/0x1d0
[   25.875661]  ret_from_fork_asm+0x1a/0x30
[   25.876220] 
[   25.876391] The buggy address belongs to the object at ffff8881059cb500
[   25.876391]  which belongs to the cache kmalloc-64 of size 64
[   25.877920] The buggy address is located 0 bytes to the right of
[   25.877920]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   25.879502] 
[   25.879665] The buggy address belongs to the physical page:
[   25.880315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   25.881341] flags: 0x200000000000000(node=0|zone=2)
[   25.881930] page_type: f5(slab)
[   25.882333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.883089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.883738] page dumped because: kasan: bad access detected
[   25.884208] 
[   25.884371] Memory state around the buggy address:
[   25.884559]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.884849]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.885470] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.886174]                                      ^
[   25.886604]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.886888]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.887590] ==================================================================
[   27.227333] ==================================================================
[   27.228075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   27.228771] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.229522] 
[   27.229745] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.229800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.229832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.229857] Call Trace:
[   27.229878]  <TASK>
[   27.229900]  dump_stack_lvl+0x73/0xb0
[   27.229932]  print_report+0xd1/0x610
[   27.229956]  ? __virt_addr_valid+0x1db/0x2d0
[   27.229981]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.230011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.230041]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.230071]  kasan_report+0x141/0x180
[   27.230095]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.230130]  kasan_check_range+0x10c/0x1c0
[   27.230157]  __kasan_check_write+0x18/0x20
[   27.230184]  kasan_atomics_helper+0x1d7a/0x5450
[   27.230216]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.230257]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.230286]  ? kasan_atomics+0x152/0x310
[   27.230315]  kasan_atomics+0x1dc/0x310
[   27.230342]  ? __pfx_kasan_atomics+0x10/0x10
[   27.230368]  ? __pfx_read_tsc+0x10/0x10
[   27.230395]  ? ktime_get_ts64+0x86/0x230
[   27.230447]  kunit_try_run_case+0x1a5/0x480
[   27.230493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.230516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.230539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.230570]  ? __kthread_parkme+0x82/0x180
[   27.230592]  ? preempt_count_sub+0x50/0x80
[   27.230617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.230641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.230669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.230697]  kthread+0x337/0x6f0
[   27.230719]  ? trace_preempt_on+0x20/0xc0
[   27.230762]  ? __pfx_kthread+0x10/0x10
[   27.230787]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.230830]  ? calculate_sigpending+0x7b/0xa0
[   27.230860]  ? __pfx_kthread+0x10/0x10
[   27.230885]  ret_from_fork+0x116/0x1d0
[   27.230907]  ? __pfx_kthread+0x10/0x10
[   27.230931]  ret_from_fork_asm+0x1a/0x30
[   27.230966]  </TASK>
[   27.230980] 
[   27.243999] Allocated by task 313:
[   27.244136]  kasan_save_stack+0x45/0x70
[   27.244301]  kasan_save_track+0x18/0x40
[   27.244480]  kasan_save_alloc_info+0x3b/0x50
[   27.244654]  __kasan_kmalloc+0xb7/0xc0
[   27.244833]  __kmalloc_cache_noprof+0x189/0x420
[   27.245027]  kasan_atomics+0x95/0x310
[   27.245200]  kunit_try_run_case+0x1a5/0x480
[   27.245375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.245552]  kthread+0x337/0x6f0
[   27.245685]  ret_from_fork+0x116/0x1d0
[   27.245887]  ret_from_fork_asm+0x1a/0x30
[   27.246135] 
[   27.246216] The buggy address belongs to the object at ffff8881059cb500
[   27.246216]  which belongs to the cache kmalloc-64 of size 64
[   27.246574] The buggy address is located 0 bytes to the right of
[   27.246574]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.247431] 
[   27.247626] The buggy address belongs to the physical page:
[   27.247914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.248255] flags: 0x200000000000000(node=0|zone=2)
[   27.248435] page_type: f5(slab)
[   27.248554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.248780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.249502] page dumped because: kasan: bad access detected
[   27.249982] 
[   27.250101] Memory state around the buggy address:
[   27.250295]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.250505]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.250734] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.251049]                                      ^
[   27.251287]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.251609]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.251886] ==================================================================
[   27.383349] ==================================================================
[   27.383663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   27.384364] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.384697] 
[   27.384844] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.384937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.384952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.384977] Call Trace:
[   27.385000]  <TASK>
[   27.385033]  dump_stack_lvl+0x73/0xb0
[   27.385066]  print_report+0xd1/0x610
[   27.385091]  ? __virt_addr_valid+0x1db/0x2d0
[   27.385117]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.385147]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.385177]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.385256]  kasan_report+0x141/0x180
[   27.385281]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.385316]  kasan_check_range+0x10c/0x1c0
[   27.385342]  __kasan_check_write+0x18/0x20
[   27.385370]  kasan_atomics_helper+0x20c8/0x5450
[   27.385401]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.385432]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.385462]  ? kasan_atomics+0x152/0x310
[   27.385492]  kasan_atomics+0x1dc/0x310
[   27.385518]  ? __pfx_kasan_atomics+0x10/0x10
[   27.385545]  ? __pfx_read_tsc+0x10/0x10
[   27.385572]  ? ktime_get_ts64+0x86/0x230
[   27.385601]  kunit_try_run_case+0x1a5/0x480
[   27.385626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.385648]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.385672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.385704]  ? __kthread_parkme+0x82/0x180
[   27.385727]  ? preempt_count_sub+0x50/0x80
[   27.385753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.385776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.385806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.385845]  kthread+0x337/0x6f0
[   27.385869]  ? trace_preempt_on+0x20/0xc0
[   27.385895]  ? __pfx_kthread+0x10/0x10
[   27.385919]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.385948]  ? calculate_sigpending+0x7b/0xa0
[   27.385977]  ? __pfx_kthread+0x10/0x10
[   27.386003]  ret_from_fork+0x116/0x1d0
[   27.386025]  ? __pfx_kthread+0x10/0x10
[   27.386048]  ret_from_fork_asm+0x1a/0x30
[   27.386083]  </TASK>
[   27.386096] 
[   27.393949] Allocated by task 313:
[   27.394085]  kasan_save_stack+0x45/0x70
[   27.394221]  kasan_save_track+0x18/0x40
[   27.394358]  kasan_save_alloc_info+0x3b/0x50
[   27.394496]  __kasan_kmalloc+0xb7/0xc0
[   27.394616]  __kmalloc_cache_noprof+0x189/0x420
[   27.394816]  kasan_atomics+0x95/0x310
[   27.395059]  kunit_try_run_case+0x1a5/0x480
[   27.395303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.395551]  kthread+0x337/0x6f0
[   27.395718]  ret_from_fork+0x116/0x1d0
[   27.395977]  ret_from_fork_asm+0x1a/0x30
[   27.396211] 
[   27.396312] The buggy address belongs to the object at ffff8881059cb500
[   27.396312]  which belongs to the cache kmalloc-64 of size 64
[   27.396862] The buggy address is located 0 bytes to the right of
[   27.396862]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.397466] 
[   27.397556] The buggy address belongs to the physical page:
[   27.397831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.398179] flags: 0x200000000000000(node=0|zone=2)
[   27.398453] page_type: f5(slab)
[   27.398660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.398986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.399629] page dumped because: kasan: bad access detected
[   27.399915] 
[   27.400004] Memory state around the buggy address:
[   27.400221]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.400546]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.400947] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.401344]                                      ^
[   27.401620]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.401935]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.402136] ==================================================================
[   27.083528] ==================================================================
[   27.084001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   27.084296] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.084627] 
[   27.084739] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.084804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.084819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.084844] Call Trace:
[   27.084864]  <TASK>
[   27.084886]  dump_stack_lvl+0x73/0xb0
[   27.084917]  print_report+0xd1/0x610
[   27.084942]  ? __virt_addr_valid+0x1db/0x2d0
[   27.084967]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.084997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.085072]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.085107]  kasan_report+0x141/0x180
[   27.085132]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.085167]  kasan_check_range+0x10c/0x1c0
[   27.085199]  __kasan_check_write+0x18/0x20
[   27.085227]  kasan_atomics_helper+0x1a7f/0x5450
[   27.085269]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.085299]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.085328]  ? kasan_atomics+0x152/0x310
[   27.085357]  kasan_atomics+0x1dc/0x310
[   27.085384]  ? __pfx_kasan_atomics+0x10/0x10
[   27.085411]  ? __pfx_read_tsc+0x10/0x10
[   27.085437]  ? ktime_get_ts64+0x86/0x230
[   27.085465]  kunit_try_run_case+0x1a5/0x480
[   27.085489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.085511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.085534]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.085566]  ? __kthread_parkme+0x82/0x180
[   27.085589]  ? preempt_count_sub+0x50/0x80
[   27.085614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.085638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.085667]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.085695]  kthread+0x337/0x6f0
[   27.085718]  ? trace_preempt_on+0x20/0xc0
[   27.085784]  ? __pfx_kthread+0x10/0x10
[   27.085812]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.085852]  ? calculate_sigpending+0x7b/0xa0
[   27.085881]  ? __pfx_kthread+0x10/0x10
[   27.085907]  ret_from_fork+0x116/0x1d0
[   27.085929]  ? __pfx_kthread+0x10/0x10
[   27.085953]  ret_from_fork_asm+0x1a/0x30
[   27.085989]  </TASK>
[   27.086001] 
[   27.094649] Allocated by task 313:
[   27.094800]  kasan_save_stack+0x45/0x70
[   27.094952]  kasan_save_track+0x18/0x40
[   27.095087]  kasan_save_alloc_info+0x3b/0x50
[   27.095274]  __kasan_kmalloc+0xb7/0xc0
[   27.095435]  __kmalloc_cache_noprof+0x189/0x420
[   27.095675]  kasan_atomics+0x95/0x310
[   27.095883]  kunit_try_run_case+0x1a5/0x480
[   27.096027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.096548]  kthread+0x337/0x6f0
[   27.096789]  ret_from_fork+0x116/0x1d0
[   27.097265]  ret_from_fork_asm+0x1a/0x30
[   27.097632] 
[   27.097837] The buggy address belongs to the object at ffff8881059cb500
[   27.097837]  which belongs to the cache kmalloc-64 of size 64
[   27.098272] The buggy address is located 0 bytes to the right of
[   27.098272]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.099308] 
[   27.099508] The buggy address belongs to the physical page:
[   27.100192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.100933] flags: 0x200000000000000(node=0|zone=2)
[   27.101490] page_type: f5(slab)
[   27.101829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.102461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.103022] page dumped because: kasan: bad access detected
[   27.103495] 
[   27.103562] Memory state around the buggy address:
[   27.103720]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.103942]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.104156] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.104765]                                      ^
[   27.105220]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.105611]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.106173] ==================================================================
[   26.778653] ==================================================================
[   26.779006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   26.779456] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.779981] 
[   26.780070] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.780121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.780135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.780171] Call Trace:
[   26.780193]  <TASK>
[   26.780212]  dump_stack_lvl+0x73/0xb0
[   26.780266]  print_report+0xd1/0x610
[   26.780290]  ? __virt_addr_valid+0x1db/0x2d0
[   26.780319]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.780358]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.780389]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.780419]  kasan_report+0x141/0x180
[   26.780453]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.780488]  kasan_check_range+0x10c/0x1c0
[   26.780524]  __kasan_check_read+0x15/0x20
[   26.780551]  kasan_atomics_helper+0x13b5/0x5450
[   26.780583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.780624]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.780653]  ? kasan_atomics+0x152/0x310
[   26.780691]  kasan_atomics+0x1dc/0x310
[   26.780717]  ? __pfx_kasan_atomics+0x10/0x10
[   26.780744]  ? __pfx_read_tsc+0x10/0x10
[   26.780798]  ? ktime_get_ts64+0x86/0x230
[   26.780826]  kunit_try_run_case+0x1a5/0x480
[   26.780860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.780882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.780907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.780938]  ? __kthread_parkme+0x82/0x180
[   26.780960]  ? preempt_count_sub+0x50/0x80
[   26.780986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.781010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.781038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.781067]  kthread+0x337/0x6f0
[   26.781090]  ? trace_preempt_on+0x20/0xc0
[   26.781116]  ? __pfx_kthread+0x10/0x10
[   26.781140]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.781168]  ? calculate_sigpending+0x7b/0xa0
[   26.781200]  ? __pfx_kthread+0x10/0x10
[   26.781226]  ret_from_fork+0x116/0x1d0
[   26.781256]  ? __pfx_kthread+0x10/0x10
[   26.781279]  ret_from_fork_asm+0x1a/0x30
[   26.781316]  </TASK>
[   26.781329] 
[   26.792616] Allocated by task 313:
[   26.792968]  kasan_save_stack+0x45/0x70
[   26.793581]  kasan_save_track+0x18/0x40
[   26.794001]  kasan_save_alloc_info+0x3b/0x50
[   26.794166]  __kasan_kmalloc+0xb7/0xc0
[   26.794308]  __kmalloc_cache_noprof+0x189/0x420
[   26.794463]  kasan_atomics+0x95/0x310
[   26.794594]  kunit_try_run_case+0x1a5/0x480
[   26.794734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.795235]  kthread+0x337/0x6f0
[   26.796002]  ret_from_fork+0x116/0x1d0
[   26.796407]  ret_from_fork_asm+0x1a/0x30
[   26.796777] 
[   26.796994] The buggy address belongs to the object at ffff8881059cb500
[   26.796994]  which belongs to the cache kmalloc-64 of size 64
[   26.798116] The buggy address is located 0 bytes to the right of
[   26.798116]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.799298] 
[   26.799458] The buggy address belongs to the physical page:
[   26.799980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.800517] flags: 0x200000000000000(node=0|zone=2)
[   26.801106] page_type: f5(slab)
[   26.801330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.801561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.801794] page dumped because: kasan: bad access detected
[   26.801960] 
[   26.802024] Memory state around the buggy address:
[   26.802174]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.802427]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.802710] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.802926]                                      ^
[   26.803120]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.803464]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.803738] ==================================================================
[   26.078028] ==================================================================
[   26.078647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   26.079268] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.079497] 
[   26.079585] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.079638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.079652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.079675] Call Trace:
[   26.079699]  <TASK>
[   26.079722]  dump_stack_lvl+0x73/0xb0
[   26.079799]  print_report+0xd1/0x610
[   26.079839]  ? __virt_addr_valid+0x1db/0x2d0
[   26.079866]  ? kasan_atomics_helper+0x565/0x5450
[   26.079896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.079926]  ? kasan_atomics_helper+0x565/0x5450
[   26.079957]  kasan_report+0x141/0x180
[   26.079981]  ? kasan_atomics_helper+0x565/0x5450
[   26.080015]  kasan_check_range+0x10c/0x1c0
[   26.080042]  __kasan_check_write+0x18/0x20
[   26.080071]  kasan_atomics_helper+0x565/0x5450
[   26.080101]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.080132]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.080162]  ? kasan_atomics+0x152/0x310
[   26.080191]  kasan_atomics+0x1dc/0x310
[   26.080217]  ? __pfx_kasan_atomics+0x10/0x10
[   26.080255]  ? __pfx_read_tsc+0x10/0x10
[   26.080281]  ? ktime_get_ts64+0x86/0x230
[   26.080310]  kunit_try_run_case+0x1a5/0x480
[   26.080334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.080357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.080381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.080412]  ? __kthread_parkme+0x82/0x180
[   26.080435]  ? preempt_count_sub+0x50/0x80
[   26.080461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.080485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.080514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.080543]  kthread+0x337/0x6f0
[   26.080565]  ? trace_preempt_on+0x20/0xc0
[   26.080592]  ? __pfx_kthread+0x10/0x10
[   26.080616]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.080645]  ? calculate_sigpending+0x7b/0xa0
[   26.080674]  ? __pfx_kthread+0x10/0x10
[   26.080699]  ret_from_fork+0x116/0x1d0
[   26.080720]  ? __pfx_kthread+0x10/0x10
[   26.080746]  ret_from_fork_asm+0x1a/0x30
[   26.080822]  </TASK>
[   26.080835] 
[   26.090689] Allocated by task 313:
[   26.090885]  kasan_save_stack+0x45/0x70
[   26.091256]  kasan_save_track+0x18/0x40
[   26.091598]  kasan_save_alloc_info+0x3b/0x50
[   26.091821]  __kasan_kmalloc+0xb7/0xc0
[   26.092515]  __kmalloc_cache_noprof+0x189/0x420
[   26.092721]  kasan_atomics+0x95/0x310
[   26.092906]  kunit_try_run_case+0x1a5/0x480
[   26.093086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.093578]  kthread+0x337/0x6f0
[   26.093742]  ret_from_fork+0x116/0x1d0
[   26.093873]  ret_from_fork_asm+0x1a/0x30
[   26.094009] 
[   26.094078] The buggy address belongs to the object at ffff8881059cb500
[   26.094078]  which belongs to the cache kmalloc-64 of size 64
[   26.095545] The buggy address is located 0 bytes to the right of
[   26.095545]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.097071] 
[   26.097174] The buggy address belongs to the physical page:
[   26.097380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.097633] flags: 0x200000000000000(node=0|zone=2)
[   26.097823] page_type: f5(slab)
[   26.097970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.098271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.098558] page dumped because: kasan: bad access detected
[   26.098772] 
[   26.098854] Memory state around the buggy address:
[   26.099059]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.100020]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.100258] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.101324]                                      ^
[   26.102043]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.103234]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.104546] ==================================================================
[   26.510202] ==================================================================
[   26.510675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   26.511086] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.511426] 
[   26.511642] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.511694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.511708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.511732] Call Trace:
[   26.511752]  <TASK>
[   26.511772]  dump_stack_lvl+0x73/0xb0
[   26.511803]  print_report+0xd1/0x610
[   26.511828]  ? __virt_addr_valid+0x1db/0x2d0
[   26.511853]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.511884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.511913]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.511944]  kasan_report+0x141/0x180
[   26.511969]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.512004]  kasan_check_range+0x10c/0x1c0
[   26.512031]  __kasan_check_write+0x18/0x20
[   26.512068]  kasan_atomics_helper+0xfa9/0x5450
[   26.512113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.512152]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.512192]  ? kasan_atomics+0x152/0x310
[   26.512221]  kasan_atomics+0x1dc/0x310
[   26.512256]  ? __pfx_kasan_atomics+0x10/0x10
[   26.512284]  ? __pfx_read_tsc+0x10/0x10
[   26.512310]  ? ktime_get_ts64+0x86/0x230
[   26.512339]  kunit_try_run_case+0x1a5/0x480
[   26.512363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.512386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.512410]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.512441]  ? __kthread_parkme+0x82/0x180
[   26.512465]  ? preempt_count_sub+0x50/0x80
[   26.512490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.512515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.512551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.512580]  kthread+0x337/0x6f0
[   26.512613]  ? trace_preempt_on+0x20/0xc0
[   26.512640]  ? __pfx_kthread+0x10/0x10
[   26.512664]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.512693]  ? calculate_sigpending+0x7b/0xa0
[   26.512722]  ? __pfx_kthread+0x10/0x10
[   26.512746]  ret_from_fork+0x116/0x1d0
[   26.512779]  ? __pfx_kthread+0x10/0x10
[   26.512803]  ret_from_fork_asm+0x1a/0x30
[   26.512849]  </TASK>
[   26.512862] 
[   26.521012] Allocated by task 313:
[   26.521142]  kasan_save_stack+0x45/0x70
[   26.521305]  kasan_save_track+0x18/0x40
[   26.521435]  kasan_save_alloc_info+0x3b/0x50
[   26.521579]  __kasan_kmalloc+0xb7/0xc0
[   26.521707]  __kmalloc_cache_noprof+0x189/0x420
[   26.521972]  kasan_atomics+0x95/0x310
[   26.522410]  kunit_try_run_case+0x1a5/0x480
[   26.522614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.522893]  kthread+0x337/0x6f0
[   26.523062]  ret_from_fork+0x116/0x1d0
[   26.523260]  ret_from_fork_asm+0x1a/0x30
[   26.523671] 
[   26.523819] The buggy address belongs to the object at ffff8881059cb500
[   26.523819]  which belongs to the cache kmalloc-64 of size 64
[   26.524400] The buggy address is located 0 bytes to the right of
[   26.524400]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.524769] 
[   26.524842] The buggy address belongs to the physical page:
[   26.525231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.527443] flags: 0x200000000000000(node=0|zone=2)
[   26.528141] page_type: f5(slab)
[   26.528598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.529570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.530386] page dumped because: kasan: bad access detected
[   26.531133] 
[   26.531448] Memory state around the buggy address:
[   26.531624]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.532277]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.533212] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.533915]                                      ^
[   26.534405]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.534624]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.534840] ==================================================================
[   27.497964] ==================================================================
[   27.498225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   27.498538] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.499017] 
[   27.499133] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.499184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.499198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.499224] Call Trace:
[   27.499255]  <TASK>
[   27.499275]  dump_stack_lvl+0x73/0xb0
[   27.499305]  print_report+0xd1/0x610
[   27.499330]  ? __virt_addr_valid+0x1db/0x2d0
[   27.499355]  ? kasan_atomics_helper+0x5115/0x5450
[   27.499385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.499416]  ? kasan_atomics_helper+0x5115/0x5450
[   27.499446]  kasan_report+0x141/0x180
[   27.499471]  ? kasan_atomics_helper+0x5115/0x5450
[   27.499506]  __asan_report_load8_noabort+0x18/0x20
[   27.499535]  kasan_atomics_helper+0x5115/0x5450
[   27.499566]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.499598]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.499626]  ? kasan_atomics+0x152/0x310
[   27.499656]  kasan_atomics+0x1dc/0x310
[   27.499682]  ? __pfx_kasan_atomics+0x10/0x10
[   27.499712]  ? __pfx_read_tsc+0x10/0x10
[   27.499740]  ? ktime_get_ts64+0x86/0x230
[   27.499768]  kunit_try_run_case+0x1a5/0x480
[   27.499792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.499815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.499847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.499878]  ? __kthread_parkme+0x82/0x180
[   27.499901]  ? preempt_count_sub+0x50/0x80
[   27.499927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.499951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.499980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.500010]  kthread+0x337/0x6f0
[   27.500034]  ? trace_preempt_on+0x20/0xc0
[   27.500070]  ? __pfx_kthread+0x10/0x10
[   27.500094]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.500123]  ? calculate_sigpending+0x7b/0xa0
[   27.500152]  ? __pfx_kthread+0x10/0x10
[   27.500177]  ret_from_fork+0x116/0x1d0
[   27.500199]  ? __pfx_kthread+0x10/0x10
[   27.500223]  ret_from_fork_asm+0x1a/0x30
[   27.500267]  </TASK>
[   27.500279] 
[   27.507291] Allocated by task 313:
[   27.507423]  kasan_save_stack+0x45/0x70
[   27.507564]  kasan_save_track+0x18/0x40
[   27.507697]  kasan_save_alloc_info+0x3b/0x50
[   27.507931]  __kasan_kmalloc+0xb7/0xc0
[   27.508116]  __kmalloc_cache_noprof+0x189/0x420
[   27.508348]  kasan_atomics+0x95/0x310
[   27.508528]  kunit_try_run_case+0x1a5/0x480
[   27.508730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.509210]  kthread+0x337/0x6f0
[   27.509387]  ret_from_fork+0x116/0x1d0
[   27.509542]  ret_from_fork_asm+0x1a/0x30
[   27.509678] 
[   27.509766] The buggy address belongs to the object at ffff8881059cb500
[   27.509766]  which belongs to the cache kmalloc-64 of size 64
[   27.510389] The buggy address is located 0 bytes to the right of
[   27.510389]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.510966] 
[   27.511056] The buggy address belongs to the physical page:
[   27.511290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.511593] flags: 0x200000000000000(node=0|zone=2)
[   27.511778] page_type: f5(slab)
[   27.512035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.512355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.512606] page dumped because: kasan: bad access detected
[   27.512772] 
[   27.512835] Memory state around the buggy address:
[   27.512988]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.513204]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.513524] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.513834]                                      ^
[   27.514064]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.514363]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.514573] ==================================================================
[   26.565076] ==================================================================
[   26.565361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   26.565673] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.565989] 
[   26.566075] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.566147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.566161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.566186] Call Trace:
[   26.566208]  <TASK>
[   26.566227]  dump_stack_lvl+0x73/0xb0
[   26.566269]  print_report+0xd1/0x610
[   26.566294]  ? __virt_addr_valid+0x1db/0x2d0
[   26.566320]  ? kasan_atomics_helper+0x1079/0x5450
[   26.566352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.566383]  ? kasan_atomics_helper+0x1079/0x5450
[   26.566413]  kasan_report+0x141/0x180
[   26.566438]  ? kasan_atomics_helper+0x1079/0x5450
[   26.566472]  kasan_check_range+0x10c/0x1c0
[   26.566499]  __kasan_check_write+0x18/0x20
[   26.566528]  kasan_atomics_helper+0x1079/0x5450
[   26.566560]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.566590]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.566619]  ? kasan_atomics+0x152/0x310
[   26.566649]  kasan_atomics+0x1dc/0x310
[   26.566676]  ? __pfx_kasan_atomics+0x10/0x10
[   26.566703]  ? __pfx_read_tsc+0x10/0x10
[   26.566729]  ? ktime_get_ts64+0x86/0x230
[   26.566757]  kunit_try_run_case+0x1a5/0x480
[   26.566781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.566803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.566882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.566917]  ? __kthread_parkme+0x82/0x180
[   26.566940]  ? preempt_count_sub+0x50/0x80
[   26.566965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.566989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.567018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.567046]  kthread+0x337/0x6f0
[   26.567069]  ? trace_preempt_on+0x20/0xc0
[   26.567096]  ? __pfx_kthread+0x10/0x10
[   26.567120]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.567149]  ? calculate_sigpending+0x7b/0xa0
[   26.567177]  ? __pfx_kthread+0x10/0x10
[   26.567203]  ret_from_fork+0x116/0x1d0
[   26.567225]  ? __pfx_kthread+0x10/0x10
[   26.567260]  ret_from_fork_asm+0x1a/0x30
[   26.567295]  </TASK>
[   26.567308] 
[   26.577720] Allocated by task 313:
[   26.578143]  kasan_save_stack+0x45/0x70
[   26.578324]  kasan_save_track+0x18/0x40
[   26.578514]  kasan_save_alloc_info+0x3b/0x50
[   26.578733]  __kasan_kmalloc+0xb7/0xc0
[   26.578882]  __kmalloc_cache_noprof+0x189/0x420
[   26.579121]  kasan_atomics+0x95/0x310
[   26.579291]  kunit_try_run_case+0x1a5/0x480
[   26.579478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.579692]  kthread+0x337/0x6f0
[   26.579857]  ret_from_fork+0x116/0x1d0
[   26.580098]  ret_from_fork_asm+0x1a/0x30
[   26.580254] 
[   26.580342] The buggy address belongs to the object at ffff8881059cb500
[   26.580342]  which belongs to the cache kmalloc-64 of size 64
[   26.580947] The buggy address is located 0 bytes to the right of
[   26.580947]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.581463] 
[   26.581550] The buggy address belongs to the physical page:
[   26.581780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.582641] flags: 0x200000000000000(node=0|zone=2)
[   26.582830] page_type: f5(slab)
[   26.582950] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.583168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.583474] page dumped because: kasan: bad access detected
[   26.583722] 
[   26.583811] Memory state around the buggy address:
[   26.584035]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.584784]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.585282] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.585733]                                      ^
[   26.586385]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.587108]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.587589] ==================================================================
[   26.755134] ==================================================================
[   26.755652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   26.756519] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.757043] 
[   26.757317] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.757393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.757407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.757432] Call Trace:
[   26.757456]  <TASK>
[   26.757478]  dump_stack_lvl+0x73/0xb0
[   26.757513]  print_report+0xd1/0x610
[   26.757537]  ? __virt_addr_valid+0x1db/0x2d0
[   26.757563]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.757594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.757625]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.757655]  kasan_report+0x141/0x180
[   26.757680]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.757714]  __asan_report_load4_noabort+0x18/0x20
[   26.757741]  kasan_atomics_helper+0x49ce/0x5450
[   26.757855]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.757887]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.757916]  ? kasan_atomics+0x152/0x310
[   26.757986]  kasan_atomics+0x1dc/0x310
[   26.758013]  ? __pfx_kasan_atomics+0x10/0x10
[   26.758040]  ? __pfx_read_tsc+0x10/0x10
[   26.758069]  ? ktime_get_ts64+0x86/0x230
[   26.758097]  kunit_try_run_case+0x1a5/0x480
[   26.758122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.758145]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.758169]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.758199]  ? __kthread_parkme+0x82/0x180
[   26.758222]  ? preempt_count_sub+0x50/0x80
[   26.758260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.758284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.758312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.758340]  kthread+0x337/0x6f0
[   26.758363]  ? trace_preempt_on+0x20/0xc0
[   26.758390]  ? __pfx_kthread+0x10/0x10
[   26.758413]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.758442]  ? calculate_sigpending+0x7b/0xa0
[   26.758471]  ? __pfx_kthread+0x10/0x10
[   26.758496]  ret_from_fork+0x116/0x1d0
[   26.758520]  ? __pfx_kthread+0x10/0x10
[   26.758545]  ret_from_fork_asm+0x1a/0x30
[   26.758583]  </TASK>
[   26.758596] 
[   26.769610] Allocated by task 313:
[   26.769826]  kasan_save_stack+0x45/0x70
[   26.770147]  kasan_save_track+0x18/0x40
[   26.770360]  kasan_save_alloc_info+0x3b/0x50
[   26.770532]  __kasan_kmalloc+0xb7/0xc0
[   26.770661]  __kmalloc_cache_noprof+0x189/0x420
[   26.770816]  kasan_atomics+0x95/0x310
[   26.771058]  kunit_try_run_case+0x1a5/0x480
[   26.771276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.771527]  kthread+0x337/0x6f0
[   26.771715]  ret_from_fork+0x116/0x1d0
[   26.771942]  ret_from_fork_asm+0x1a/0x30
[   26.772149] 
[   26.772225] The buggy address belongs to the object at ffff8881059cb500
[   26.772225]  which belongs to the cache kmalloc-64 of size 64
[   26.772626] The buggy address is located 0 bytes to the right of
[   26.772626]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.773507] 
[   26.773592] The buggy address belongs to the physical page:
[   26.773944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.774270] flags: 0x200000000000000(node=0|zone=2)
[   26.774575] page_type: f5(slab)
[   26.774722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.775125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.775531] page dumped because: kasan: bad access detected
[   26.775803] 
[   26.775901] Memory state around the buggy address:
[   26.776138]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.776532]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.776848] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.777229]                                      ^
[   26.777521]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.777821]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.778105] ==================================================================
[   26.804150] ==================================================================
[   26.804527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   26.804939] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.805253] 
[   26.805364] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.805418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.805433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.805458] Call Trace:
[   26.805482]  <TASK>
[   26.805506]  dump_stack_lvl+0x73/0xb0
[   26.805538]  print_report+0xd1/0x610
[   26.805563]  ? __virt_addr_valid+0x1db/0x2d0
[   26.805616]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.805647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.805677]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.805707]  kasan_report+0x141/0x180
[   26.805732]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.805774]  __asan_report_load8_noabort+0x18/0x20
[   26.805803]  kasan_atomics_helper+0x4eae/0x5450
[   26.805834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.805865]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.805893]  ? kasan_atomics+0x152/0x310
[   26.805923]  kasan_atomics+0x1dc/0x310
[   26.805949]  ? __pfx_kasan_atomics+0x10/0x10
[   26.805976]  ? __pfx_read_tsc+0x10/0x10
[   26.806002]  ? ktime_get_ts64+0x86/0x230
[   26.806031]  kunit_try_run_case+0x1a5/0x480
[   26.806056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.806078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.806103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.806136]  ? __kthread_parkme+0x82/0x180
[   26.806159]  ? preempt_count_sub+0x50/0x80
[   26.806184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.806208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.806246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.806275]  kthread+0x337/0x6f0
[   26.806298]  ? trace_preempt_on+0x20/0xc0
[   26.806326]  ? __pfx_kthread+0x10/0x10
[   26.806349]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.806378]  ? calculate_sigpending+0x7b/0xa0
[   26.806407]  ? __pfx_kthread+0x10/0x10
[   26.806432]  ret_from_fork+0x116/0x1d0
[   26.806453]  ? __pfx_kthread+0x10/0x10
[   26.806477]  ret_from_fork_asm+0x1a/0x30
[   26.806513]  </TASK>
[   26.806526] 
[   26.813736] Allocated by task 313:
[   26.813902]  kasan_save_stack+0x45/0x70
[   26.814100]  kasan_save_track+0x18/0x40
[   26.814292]  kasan_save_alloc_info+0x3b/0x50
[   26.814496]  __kasan_kmalloc+0xb7/0xc0
[   26.814672]  __kmalloc_cache_noprof+0x189/0x420
[   26.814847]  kasan_atomics+0x95/0x310
[   26.814978]  kunit_try_run_case+0x1a5/0x480
[   26.815116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.815421]  kthread+0x337/0x6f0
[   26.815719]  ret_from_fork+0x116/0x1d0
[   26.816066]  ret_from_fork_asm+0x1a/0x30
[   26.816295] 
[   26.816387] The buggy address belongs to the object at ffff8881059cb500
[   26.816387]  which belongs to the cache kmalloc-64 of size 64
[   26.817089] The buggy address is located 0 bytes to the right of
[   26.817089]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.817477] 
[   26.817548] The buggy address belongs to the physical page:
[   26.817718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.818081] flags: 0x200000000000000(node=0|zone=2)
[   26.818569] page_type: f5(slab)
[   26.818831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.819153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.819390] page dumped because: kasan: bad access detected
[   26.819572] 
[   26.819661] Memory state around the buggy address:
[   26.819964]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.820295]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.820614] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.821010]                                      ^
[   26.821181]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.821490]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.821895] ==================================================================
[   26.487057] ==================================================================
[   26.487320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   26.488117] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.488723] 
[   26.488906] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.488960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.488975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.488999] Call Trace:
[   26.489019]  <TASK>
[   26.489062]  dump_stack_lvl+0x73/0xb0
[   26.489106]  print_report+0xd1/0x610
[   26.489130]  ? __virt_addr_valid+0x1db/0x2d0
[   26.489167]  ? kasan_atomics_helper+0xf10/0x5450
[   26.489203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.489253]  ? kasan_atomics_helper+0xf10/0x5450
[   26.489284]  kasan_report+0x141/0x180
[   26.489320]  ? kasan_atomics_helper+0xf10/0x5450
[   26.489354]  kasan_check_range+0x10c/0x1c0
[   26.489382]  __kasan_check_write+0x18/0x20
[   26.489409]  kasan_atomics_helper+0xf10/0x5450
[   26.489441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.489471]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.489501]  ? kasan_atomics+0x152/0x310
[   26.489531]  kasan_atomics+0x1dc/0x310
[   26.489557]  ? __pfx_kasan_atomics+0x10/0x10
[   26.489587]  ? __pfx_read_tsc+0x10/0x10
[   26.489614]  ? ktime_get_ts64+0x86/0x230
[   26.489643]  kunit_try_run_case+0x1a5/0x480
[   26.489666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.489689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.489712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.489743]  ? __kthread_parkme+0x82/0x180
[   26.489792]  ? preempt_count_sub+0x50/0x80
[   26.489817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.489841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.489870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.489899]  kthread+0x337/0x6f0
[   26.489922]  ? trace_preempt_on+0x20/0xc0
[   26.489949]  ? __pfx_kthread+0x10/0x10
[   26.489973]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.490002]  ? calculate_sigpending+0x7b/0xa0
[   26.490031]  ? __pfx_kthread+0x10/0x10
[   26.490055]  ret_from_fork+0x116/0x1d0
[   26.490077]  ? __pfx_kthread+0x10/0x10
[   26.490101]  ret_from_fork_asm+0x1a/0x30
[   26.490137]  </TASK>
[   26.490149] 
[   26.499990] Allocated by task 313:
[   26.500176]  kasan_save_stack+0x45/0x70
[   26.500397]  kasan_save_track+0x18/0x40
[   26.500572]  kasan_save_alloc_info+0x3b/0x50
[   26.500784]  __kasan_kmalloc+0xb7/0xc0
[   26.501345]  __kmalloc_cache_noprof+0x189/0x420
[   26.501542]  kasan_atomics+0x95/0x310
[   26.501961]  kunit_try_run_case+0x1a5/0x480
[   26.502183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.502625]  kthread+0x337/0x6f0
[   26.502786]  ret_from_fork+0x116/0x1d0
[   26.503059]  ret_from_fork_asm+0x1a/0x30
[   26.503411] 
[   26.503517] The buggy address belongs to the object at ffff8881059cb500
[   26.503517]  which belongs to the cache kmalloc-64 of size 64
[   26.504295] The buggy address is located 0 bytes to the right of
[   26.504295]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.504951] 
[   26.505028] The buggy address belongs to the physical page:
[   26.505341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.505641] flags: 0x200000000000000(node=0|zone=2)
[   26.505915] page_type: f5(slab)
[   26.506067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.506542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.506903] page dumped because: kasan: bad access detected
[   26.507193] 
[   26.507351] Memory state around the buggy address:
[   26.507608]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.507892]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.508362] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.508636]                                      ^
[   26.508853]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.509152]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.509586] ==================================================================
[   26.986259] ==================================================================
[   26.986598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   26.987198] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.987471] 
[   26.987560] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.987613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.987627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.987651] Call Trace:
[   26.987672]  <TASK>
[   26.987693]  dump_stack_lvl+0x73/0xb0
[   26.987745]  print_report+0xd1/0x610
[   26.987769]  ? __virt_addr_valid+0x1db/0x2d0
[   26.987806]  ? kasan_atomics_helper+0x1818/0x5450
[   26.987837]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.987866]  ? kasan_atomics_helper+0x1818/0x5450
[   26.987897]  kasan_report+0x141/0x180
[   26.987921]  ? kasan_atomics_helper+0x1818/0x5450
[   26.987956]  kasan_check_range+0x10c/0x1c0
[   26.987985]  __kasan_check_write+0x18/0x20
[   26.988014]  kasan_atomics_helper+0x1818/0x5450
[   26.988045]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.988076]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.988166]  ? kasan_atomics+0x152/0x310
[   26.988198]  kasan_atomics+0x1dc/0x310
[   26.988233]  ? __pfx_kasan_atomics+0x10/0x10
[   26.988271]  ? __pfx_read_tsc+0x10/0x10
[   26.988310]  ? ktime_get_ts64+0x86/0x230
[   26.988347]  kunit_try_run_case+0x1a5/0x480
[   26.988371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.988394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.988428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.988460]  ? __kthread_parkme+0x82/0x180
[   26.988482]  ? preempt_count_sub+0x50/0x80
[   26.988507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.988531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.988560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.988589]  kthread+0x337/0x6f0
[   26.988612]  ? trace_preempt_on+0x20/0xc0
[   26.988648]  ? __pfx_kthread+0x10/0x10
[   26.988673]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.988711]  ? calculate_sigpending+0x7b/0xa0
[   26.988741]  ? __pfx_kthread+0x10/0x10
[   26.988812]  ret_from_fork+0x116/0x1d0
[   26.988853]  ? __pfx_kthread+0x10/0x10
[   26.988879]  ret_from_fork_asm+0x1a/0x30
[   26.988926]  </TASK>
[   26.988939] 
[   26.997286] Allocated by task 313:
[   26.997478]  kasan_save_stack+0x45/0x70
[   26.997708]  kasan_save_track+0x18/0x40
[   26.998104]  kasan_save_alloc_info+0x3b/0x50
[   26.998454]  __kasan_kmalloc+0xb7/0xc0
[   26.998620]  __kmalloc_cache_noprof+0x189/0x420
[   26.998774]  kasan_atomics+0x95/0x310
[   26.999092]  kunit_try_run_case+0x1a5/0x480
[   26.999317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.999595]  kthread+0x337/0x6f0
[   26.999805]  ret_from_fork+0x116/0x1d0
[   26.999955]  ret_from_fork_asm+0x1a/0x30
[   27.000095] 
[   27.000164] The buggy address belongs to the object at ffff8881059cb500
[   27.000164]  which belongs to the cache kmalloc-64 of size 64
[   27.000658] The buggy address is located 0 bytes to the right of
[   27.000658]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.001266] 
[   27.001346] The buggy address belongs to the physical page:
[   27.001518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.001756] flags: 0x200000000000000(node=0|zone=2)
[   27.001959] page_type: f5(slab)
[   27.002125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.002473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.002818] page dumped because: kasan: bad access detected
[   27.003069] 
[   27.003163] Memory state around the buggy address:
[   27.004379]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.005001]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.005331] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.005744]                                      ^
[   27.005939]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.006595]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.006994] ==================================================================
[   27.032328] ==================================================================
[   27.032755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   27.033186] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.033531] 
[   27.033629] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.033682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.033696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.033721] Call Trace:
[   27.033743]  <TASK>
[   27.033963]  dump_stack_lvl+0x73/0xb0
[   27.034000]  print_report+0xd1/0x610
[   27.034088]  ? __virt_addr_valid+0x1db/0x2d0
[   27.034119]  ? kasan_atomics_helper+0x194a/0x5450
[   27.034149]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.034181]  ? kasan_atomics_helper+0x194a/0x5450
[   27.034332]  kasan_report+0x141/0x180
[   27.034358]  ? kasan_atomics_helper+0x194a/0x5450
[   27.034394]  kasan_check_range+0x10c/0x1c0
[   27.034422]  __kasan_check_write+0x18/0x20
[   27.034449]  kasan_atomics_helper+0x194a/0x5450
[   27.034481]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.034604]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.034633]  ? kasan_atomics+0x152/0x310
[   27.034662]  kasan_atomics+0x1dc/0x310
[   27.034689]  ? __pfx_kasan_atomics+0x10/0x10
[   27.034717]  ? __pfx_read_tsc+0x10/0x10
[   27.034745]  ? ktime_get_ts64+0x86/0x230
[   27.034804]  kunit_try_run_case+0x1a5/0x480
[   27.034836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.034858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.034882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.034913]  ? __kthread_parkme+0x82/0x180
[   27.034936]  ? preempt_count_sub+0x50/0x80
[   27.034962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.034985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.035014]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.035042]  kthread+0x337/0x6f0
[   27.035065]  ? trace_preempt_on+0x20/0xc0
[   27.035091]  ? __pfx_kthread+0x10/0x10
[   27.035115]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.035144]  ? calculate_sigpending+0x7b/0xa0
[   27.035172]  ? __pfx_kthread+0x10/0x10
[   27.035197]  ret_from_fork+0x116/0x1d0
[   27.035218]  ? __pfx_kthread+0x10/0x10
[   27.035253]  ret_from_fork_asm+0x1a/0x30
[   27.035289]  </TASK>
[   27.035303] 
[   27.045834] Allocated by task 313:
[   27.046250]  kasan_save_stack+0x45/0x70
[   27.046425]  kasan_save_track+0x18/0x40
[   27.046622]  kasan_save_alloc_info+0x3b/0x50
[   27.047014]  __kasan_kmalloc+0xb7/0xc0
[   27.047310]  __kmalloc_cache_noprof+0x189/0x420
[   27.047659]  kasan_atomics+0x95/0x310
[   27.047846]  kunit_try_run_case+0x1a5/0x480
[   27.048046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.048458]  kthread+0x337/0x6f0
[   27.048732]  ret_from_fork+0x116/0x1d0
[   27.048946]  ret_from_fork_asm+0x1a/0x30
[   27.049327] 
[   27.049425] The buggy address belongs to the object at ffff8881059cb500
[   27.049425]  which belongs to the cache kmalloc-64 of size 64
[   27.049831] The buggy address is located 0 bytes to the right of
[   27.049831]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.050515] 
[   27.050983] The buggy address belongs to the physical page:
[   27.051218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.051549] flags: 0x200000000000000(node=0|zone=2)
[   27.051910] page_type: f5(slab)
[   27.052188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.052601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.053071] page dumped because: kasan: bad access detected
[   27.053376] 
[   27.053593] Memory state around the buggy address:
[   27.054144]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.054423]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.054727] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.055074]                                      ^
[   27.055415]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.056042]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.056379] ==================================================================
[   26.322180] ==================================================================
[   26.322835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   26.323104] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.323514] 
[   26.323662] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.323716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.323730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.323831] Call Trace:
[   26.323853]  <TASK>
[   26.323875]  dump_stack_lvl+0x73/0xb0
[   26.323947]  print_report+0xd1/0x610
[   26.323971]  ? __virt_addr_valid+0x1db/0x2d0
[   26.323999]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.324061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.324094]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.324125]  kasan_report+0x141/0x180
[   26.324149]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.324185]  kasan_check_range+0x10c/0x1c0
[   26.324252]  __kasan_check_write+0x18/0x20
[   26.324281]  kasan_atomics_helper+0xb6a/0x5450
[   26.324313]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.324343]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.324404]  ? kasan_atomics+0x152/0x310
[   26.324434]  kasan_atomics+0x1dc/0x310
[   26.324461]  ? __pfx_kasan_atomics+0x10/0x10
[   26.324488]  ? __pfx_read_tsc+0x10/0x10
[   26.324516]  ? ktime_get_ts64+0x86/0x230
[   26.324544]  kunit_try_run_case+0x1a5/0x480
[   26.324568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.324590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.324643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.324698]  ? __kthread_parkme+0x82/0x180
[   26.324721]  ? preempt_count_sub+0x50/0x80
[   26.324822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.324849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.324878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.324907]  kthread+0x337/0x6f0
[   26.324930]  ? trace_preempt_on+0x20/0xc0
[   26.324958]  ? __pfx_kthread+0x10/0x10
[   26.324982]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.325010]  ? calculate_sigpending+0x7b/0xa0
[   26.325040]  ? __pfx_kthread+0x10/0x10
[   26.325066]  ret_from_fork+0x116/0x1d0
[   26.325088]  ? __pfx_kthread+0x10/0x10
[   26.325112]  ret_from_fork_asm+0x1a/0x30
[   26.325149]  </TASK>
[   26.325162] 
[   26.334338] Allocated by task 313:
[   26.334554]  kasan_save_stack+0x45/0x70
[   26.334888]  kasan_save_track+0x18/0x40
[   26.335164]  kasan_save_alloc_info+0x3b/0x50
[   26.335472]  __kasan_kmalloc+0xb7/0xc0
[   26.335656]  __kmalloc_cache_noprof+0x189/0x420
[   26.335934]  kasan_atomics+0x95/0x310
[   26.336114]  kunit_try_run_case+0x1a5/0x480
[   26.336285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.336537]  kthread+0x337/0x6f0
[   26.336678]  ret_from_fork+0x116/0x1d0
[   26.336807]  ret_from_fork_asm+0x1a/0x30
[   26.336969] 
[   26.337063] The buggy address belongs to the object at ffff8881059cb500
[   26.337063]  which belongs to the cache kmalloc-64 of size 64
[   26.337945] The buggy address is located 0 bytes to the right of
[   26.337945]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.338513] 
[   26.338592] The buggy address belongs to the physical page:
[   26.338907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.339316] flags: 0x200000000000000(node=0|zone=2)
[   26.339579] page_type: f5(slab)
[   26.339727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.340164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.340549] page dumped because: kasan: bad access detected
[   26.340903] 
[   26.341000] Memory state around the buggy address:
[   26.341224]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.341554]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.342117] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.342440]                                      ^
[   26.342707]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.343121]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.343420] ==================================================================
[   27.455867] ==================================================================
[   27.456161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   27.456656] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.456900] 
[   27.457052] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.457105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.457119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.457143] Call Trace:
[   27.457162]  <TASK>
[   27.457181]  dump_stack_lvl+0x73/0xb0
[   27.457218]  print_report+0xd1/0x610
[   27.457254]  ? __virt_addr_valid+0x1db/0x2d0
[   27.457281]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.457311]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.457341]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.457372]  kasan_report+0x141/0x180
[   27.457396]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.457432]  __asan_report_load8_noabort+0x18/0x20
[   27.457460]  kasan_atomics_helper+0x4fa5/0x5450
[   27.457492]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.457522]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.457551]  ? kasan_atomics+0x152/0x310
[   27.457580]  kasan_atomics+0x1dc/0x310
[   27.457606]  ? __pfx_kasan_atomics+0x10/0x10
[   27.457635]  ? __pfx_read_tsc+0x10/0x10
[   27.457660]  ? ktime_get_ts64+0x86/0x230
[   27.457689]  kunit_try_run_case+0x1a5/0x480
[   27.457715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.457738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.457761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.457793]  ? __kthread_parkme+0x82/0x180
[   27.457815]  ? preempt_count_sub+0x50/0x80
[   27.457853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.457877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.457905]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.457934]  kthread+0x337/0x6f0
[   27.457957]  ? trace_preempt_on+0x20/0xc0
[   27.457983]  ? __pfx_kthread+0x10/0x10
[   27.458008]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.458038]  ? calculate_sigpending+0x7b/0xa0
[   27.458066]  ? __pfx_kthread+0x10/0x10
[   27.458092]  ret_from_fork+0x116/0x1d0
[   27.458113]  ? __pfx_kthread+0x10/0x10
[   27.458138]  ret_from_fork_asm+0x1a/0x30
[   27.458174]  </TASK>
[   27.458186] 
[   27.467636] Allocated by task 313:
[   27.468050]  kasan_save_stack+0x45/0x70
[   27.468366]  kasan_save_track+0x18/0x40
[   27.468565]  kasan_save_alloc_info+0x3b/0x50
[   27.468764]  __kasan_kmalloc+0xb7/0xc0
[   27.469123]  __kmalloc_cache_noprof+0x189/0x420
[   27.469538]  kasan_atomics+0x95/0x310
[   27.469723]  kunit_try_run_case+0x1a5/0x480
[   27.470191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.470495]  kthread+0x337/0x6f0
[   27.470755]  ret_from_fork+0x116/0x1d0
[   27.471079]  ret_from_fork_asm+0x1a/0x30
[   27.471276] 
[   27.471366] The buggy address belongs to the object at ffff8881059cb500
[   27.471366]  which belongs to the cache kmalloc-64 of size 64
[   27.472066] The buggy address is located 0 bytes to the right of
[   27.472066]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.472865] 
[   27.473094] The buggy address belongs to the physical page:
[   27.473501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.473998] flags: 0x200000000000000(node=0|zone=2)
[   27.474295] page_type: f5(slab)
[   27.474568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.475036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.475356] page dumped because: kasan: bad access detected
[   27.475580] 
[   27.475662] Memory state around the buggy address:
[   27.476192]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.476666]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.477209] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.477703]                                      ^
[   27.478090]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.478525]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.478980] ==================================================================
[   26.280976] ==================================================================
[   26.281283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   26.281563] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.281877] 
[   26.281984] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.282035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.282049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.282073] Call Trace:
[   26.282092]  <TASK>
[   26.282114]  dump_stack_lvl+0x73/0xb0
[   26.282144]  print_report+0xd1/0x610
[   26.282167]  ? __virt_addr_valid+0x1db/0x2d0
[   26.282193]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.282222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.282362]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.282394]  kasan_report+0x141/0x180
[   26.282420]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.282455]  kasan_check_range+0x10c/0x1c0
[   26.282482]  __kasan_check_write+0x18/0x20
[   26.282509]  kasan_atomics_helper+0xa2b/0x5450
[   26.282541]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.282573]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.282601]  ? kasan_atomics+0x152/0x310
[   26.282631]  kasan_atomics+0x1dc/0x310
[   26.282657]  ? __pfx_kasan_atomics+0x10/0x10
[   26.282685]  ? __pfx_read_tsc+0x10/0x10
[   26.282712]  ? ktime_get_ts64+0x86/0x230
[   26.282742]  kunit_try_run_case+0x1a5/0x480
[   26.282809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.282834]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.282881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.282913]  ? __kthread_parkme+0x82/0x180
[   26.282936]  ? preempt_count_sub+0x50/0x80
[   26.282979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.283003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.283039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.283068]  kthread+0x337/0x6f0
[   26.283091]  ? trace_preempt_on+0x20/0xc0
[   26.283118]  ? __pfx_kthread+0x10/0x10
[   26.283143]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.283172]  ? calculate_sigpending+0x7b/0xa0
[   26.283201]  ? __pfx_kthread+0x10/0x10
[   26.283227]  ret_from_fork+0x116/0x1d0
[   26.283261]  ? __pfx_kthread+0x10/0x10
[   26.283286]  ret_from_fork_asm+0x1a/0x30
[   26.283322]  </TASK>
[   26.283335] 
[   26.291820] Allocated by task 313:
[   26.292037]  kasan_save_stack+0x45/0x70
[   26.292276]  kasan_save_track+0x18/0x40
[   26.292468]  kasan_save_alloc_info+0x3b/0x50
[   26.292703]  __kasan_kmalloc+0xb7/0xc0
[   26.293160]  __kmalloc_cache_noprof+0x189/0x420
[   26.293392]  kasan_atomics+0x95/0x310
[   26.293580]  kunit_try_run_case+0x1a5/0x480
[   26.293913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.294174]  kthread+0x337/0x6f0
[   26.294357]  ret_from_fork+0x116/0x1d0
[   26.294542]  ret_from_fork_asm+0x1a/0x30
[   26.294857] 
[   26.295000] The buggy address belongs to the object at ffff8881059cb500
[   26.295000]  which belongs to the cache kmalloc-64 of size 64
[   26.295491] The buggy address is located 0 bytes to the right of
[   26.295491]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.296105] 
[   26.296235] The buggy address belongs to the physical page:
[   26.296506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.296966] flags: 0x200000000000000(node=0|zone=2)
[   26.297167] page_type: f5(slab)
[   26.297380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.298085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.298364] page dumped because: kasan: bad access detected
[   26.298591] 
[   26.298682] Memory state around the buggy address:
[   26.298993]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.299327]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.299594] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.300004]                                      ^
[   26.300166]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.300494]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.300952] ==================================================================
[   26.647929] ==================================================================
[   26.648261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   26.648601] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.648986] 
[   26.649109] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.649164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.649178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.649208] Call Trace:
[   26.649231]  <TASK>
[   26.649263]  dump_stack_lvl+0x73/0xb0
[   26.649298]  print_report+0xd1/0x610
[   26.649322]  ? __virt_addr_valid+0x1db/0x2d0
[   26.649349]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.649379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.649410]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.649441]  kasan_report+0x141/0x180
[   26.649466]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.649526]  __asan_report_load4_noabort+0x18/0x20
[   26.649554]  kasan_atomics_helper+0x4a02/0x5450
[   26.649586]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.649617]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.649646]  ? kasan_atomics+0x152/0x310
[   26.649693]  kasan_atomics+0x1dc/0x310
[   26.649720]  ? __pfx_kasan_atomics+0x10/0x10
[   26.649815]  ? __pfx_read_tsc+0x10/0x10
[   26.649860]  ? ktime_get_ts64+0x86/0x230
[   26.649889]  kunit_try_run_case+0x1a5/0x480
[   26.649914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.649959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.649984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.650031]  ? __kthread_parkme+0x82/0x180
[   26.650054]  ? preempt_count_sub+0x50/0x80
[   26.650081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.650104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.650133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.650162]  kthread+0x337/0x6f0
[   26.650185]  ? trace_preempt_on+0x20/0xc0
[   26.650213]  ? __pfx_kthread+0x10/0x10
[   26.650249]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.650279]  ? calculate_sigpending+0x7b/0xa0
[   26.650308]  ? __pfx_kthread+0x10/0x10
[   26.650334]  ret_from_fork+0x116/0x1d0
[   26.650355]  ? __pfx_kthread+0x10/0x10
[   26.650380]  ret_from_fork_asm+0x1a/0x30
[   26.650417]  </TASK>
[   26.650431] 
[   26.661430] Allocated by task 313:
[   26.661892]  kasan_save_stack+0x45/0x70
[   26.662278]  kasan_save_track+0x18/0x40
[   26.662460]  kasan_save_alloc_info+0x3b/0x50
[   26.662653]  __kasan_kmalloc+0xb7/0xc0
[   26.662824]  __kmalloc_cache_noprof+0x189/0x420
[   26.663350]  kasan_atomics+0x95/0x310
[   26.663612]  kunit_try_run_case+0x1a5/0x480
[   26.664079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.664357]  kthread+0x337/0x6f0
[   26.664508]  ret_from_fork+0x116/0x1d0
[   26.664684]  ret_from_fork_asm+0x1a/0x30
[   26.665166] 
[   26.665267] The buggy address belongs to the object at ffff8881059cb500
[   26.665267]  which belongs to the cache kmalloc-64 of size 64
[   26.665784] The buggy address is located 0 bytes to the right of
[   26.665784]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.666486] 
[   26.666567] The buggy address belongs to the physical page:
[   26.667047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.667357] flags: 0x200000000000000(node=0|zone=2)
[   26.667621] page_type: f5(slab)
[   26.667943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.668459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.668789] page dumped because: kasan: bad access detected
[   26.669332] 
[   26.669426] Memory state around the buggy address:
[   26.669827]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.670201]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.670651] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.671183]                                      ^
[   26.671601]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.672091]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.672414] ==================================================================
[   26.673110] ==================================================================
[   26.673462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   26.674177] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.674632] 
[   26.674925] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.674984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.674998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.675108] Call Trace:
[   26.675131]  <TASK>
[   26.675153]  dump_stack_lvl+0x73/0xb0
[   26.675187]  print_report+0xd1/0x610
[   26.675212]  ? __virt_addr_valid+0x1db/0x2d0
[   26.675251]  ? kasan_atomics_helper+0x1217/0x5450
[   26.675281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.675311]  ? kasan_atomics_helper+0x1217/0x5450
[   26.675342]  kasan_report+0x141/0x180
[   26.675366]  ? kasan_atomics_helper+0x1217/0x5450
[   26.675400]  kasan_check_range+0x10c/0x1c0
[   26.675428]  __kasan_check_write+0x18/0x20
[   26.675455]  kasan_atomics_helper+0x1217/0x5450
[   26.675486]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.675517]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.675548]  ? kasan_atomics+0x152/0x310
[   26.675578]  kasan_atomics+0x1dc/0x310
[   26.675606]  ? __pfx_kasan_atomics+0x10/0x10
[   26.675634]  ? __pfx_read_tsc+0x10/0x10
[   26.675661]  ? ktime_get_ts64+0x86/0x230
[   26.675690]  kunit_try_run_case+0x1a5/0x480
[   26.675713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.675735]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.675777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.675809]  ? __kthread_parkme+0x82/0x180
[   26.675843]  ? preempt_count_sub+0x50/0x80
[   26.675869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.675893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.675922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.675951]  kthread+0x337/0x6f0
[   26.675975]  ? trace_preempt_on+0x20/0xc0
[   26.676001]  ? __pfx_kthread+0x10/0x10
[   26.676025]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.676054]  ? calculate_sigpending+0x7b/0xa0
[   26.676083]  ? __pfx_kthread+0x10/0x10
[   26.676109]  ret_from_fork+0x116/0x1d0
[   26.676133]  ? __pfx_kthread+0x10/0x10
[   26.676158]  ret_from_fork_asm+0x1a/0x30
[   26.676195]  </TASK>
[   26.676208] 
[   26.688721] Allocated by task 313:
[   26.688942]  kasan_save_stack+0x45/0x70
[   26.689350]  kasan_save_track+0x18/0x40
[   26.689537]  kasan_save_alloc_info+0x3b/0x50
[   26.689738]  __kasan_kmalloc+0xb7/0xc0
[   26.690138]  __kmalloc_cache_noprof+0x189/0x420
[   26.690419]  kasan_atomics+0x95/0x310
[   26.690616]  kunit_try_run_case+0x1a5/0x480
[   26.691058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.691534]  kthread+0x337/0x6f0
[   26.691700]  ret_from_fork+0x116/0x1d0
[   26.692070]  ret_from_fork_asm+0x1a/0x30
[   26.692371] 
[   26.692479] The buggy address belongs to the object at ffff8881059cb500
[   26.692479]  which belongs to the cache kmalloc-64 of size 64
[   26.693382] The buggy address is located 0 bytes to the right of
[   26.693382]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.694245] 
[   26.694622] The buggy address belongs to the physical page:
[   26.695089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.695469] flags: 0x200000000000000(node=0|zone=2)
[   26.695702] page_type: f5(slab)
[   26.695921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.696320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.696704] page dumped because: kasan: bad access detected
[   26.697023] 
[   26.697211] Memory state around the buggy address:
[   26.697394]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.698102]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.698623] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.699375]                                      ^
[   26.699922]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.700625]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.701450] ==================================================================
[   26.427882] ==================================================================
[   26.428197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   26.428841] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.429484] 
[   26.429655] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.429749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.429764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.429789] Call Trace:
[   26.429810]  <TASK>
[   26.429832]  dump_stack_lvl+0x73/0xb0
[   26.429864]  print_report+0xd1/0x610
[   26.429889]  ? __virt_addr_valid+0x1db/0x2d0
[   26.429916]  ? kasan_atomics_helper+0xde0/0x5450
[   26.429946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.429977]  ? kasan_atomics_helper+0xde0/0x5450
[   26.430008]  kasan_report+0x141/0x180
[   26.430033]  ? kasan_atomics_helper+0xde0/0x5450
[   26.430067]  kasan_check_range+0x10c/0x1c0
[   26.430095]  __kasan_check_write+0x18/0x20
[   26.430123]  kasan_atomics_helper+0xde0/0x5450
[   26.430154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.430185]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.430213]  ? kasan_atomics+0x152/0x310
[   26.430254]  kasan_atomics+0x1dc/0x310
[   26.430281]  ? __pfx_kasan_atomics+0x10/0x10
[   26.430308]  ? __pfx_read_tsc+0x10/0x10
[   26.430335]  ? ktime_get_ts64+0x86/0x230
[   26.430364]  kunit_try_run_case+0x1a5/0x480
[   26.430387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.430409]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.430433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.430464]  ? __kthread_parkme+0x82/0x180
[   26.430486]  ? preempt_count_sub+0x50/0x80
[   26.430512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.430536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.430564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.430592]  kthread+0x337/0x6f0
[   26.430615]  ? trace_preempt_on+0x20/0xc0
[   26.430641]  ? __pfx_kthread+0x10/0x10
[   26.430665]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.430695]  ? calculate_sigpending+0x7b/0xa0
[   26.430724]  ? __pfx_kthread+0x10/0x10
[   26.430767]  ret_from_fork+0x116/0x1d0
[   26.430796]  ? __pfx_kthread+0x10/0x10
[   26.430821]  ret_from_fork_asm+0x1a/0x30
[   26.430869]  </TASK>
[   26.430882] 
[   26.444544] Allocated by task 313:
[   26.444904]  kasan_save_stack+0x45/0x70
[   26.445383]  kasan_save_track+0x18/0x40
[   26.445824]  kasan_save_alloc_info+0x3b/0x50
[   26.446075]  __kasan_kmalloc+0xb7/0xc0
[   26.446206]  __kmalloc_cache_noprof+0x189/0x420
[   26.446371]  kasan_atomics+0x95/0x310
[   26.446501]  kunit_try_run_case+0x1a5/0x480
[   26.446640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.446982]  kthread+0x337/0x6f0
[   26.447288]  ret_from_fork+0x116/0x1d0
[   26.447762]  ret_from_fork_asm+0x1a/0x30
[   26.448301] 
[   26.448465] The buggy address belongs to the object at ffff8881059cb500
[   26.448465]  which belongs to the cache kmalloc-64 of size 64
[   26.449625] The buggy address is located 0 bytes to the right of
[   26.449625]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.450871] 
[   26.451037] The buggy address belongs to the physical page:
[   26.451508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.452003] flags: 0x200000000000000(node=0|zone=2)
[   26.452174] page_type: f5(slab)
[   26.452309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.452535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.452930] page dumped because: kasan: bad access detected
[   26.453473] 
[   26.453626] Memory state around the buggy address:
[   26.454087]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.454689]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.455333] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.456036]                                      ^
[   26.456471]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.457296]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.458136] ==================================================================
[   26.106494] ==================================================================
[   26.107901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   26.109148] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.110457] 
[   26.110895] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.110957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.110971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.110997] Call Trace:
[   26.111018]  <TASK>
[   26.111040]  dump_stack_lvl+0x73/0xb0
[   26.111077]  print_report+0xd1/0x610
[   26.111616]  ? __virt_addr_valid+0x1db/0x2d0
[   26.111645]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.111719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.111791]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.111826]  kasan_report+0x141/0x180
[   26.111853]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.111888]  kasan_check_range+0x10c/0x1c0
[   26.111915]  __kasan_check_write+0x18/0x20
[   26.111944]  kasan_atomics_helper+0x5fe/0x5450
[   26.111976]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.112007]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.112036]  ? kasan_atomics+0x152/0x310
[   26.112066]  kasan_atomics+0x1dc/0x310
[   26.112091]  ? __pfx_kasan_atomics+0x10/0x10
[   26.112119]  ? __pfx_read_tsc+0x10/0x10
[   26.112146]  ? ktime_get_ts64+0x86/0x230
[   26.112176]  kunit_try_run_case+0x1a5/0x480
[   26.112200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.112221]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.112258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.112289]  ? __kthread_parkme+0x82/0x180
[   26.112312]  ? preempt_count_sub+0x50/0x80
[   26.112339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.112363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.112391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.112420]  kthread+0x337/0x6f0
[   26.112443]  ? trace_preempt_on+0x20/0xc0
[   26.112470]  ? __pfx_kthread+0x10/0x10
[   26.112494]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.112523]  ? calculate_sigpending+0x7b/0xa0
[   26.112551]  ? __pfx_kthread+0x10/0x10
[   26.112577]  ret_from_fork+0x116/0x1d0
[   26.112599]  ? __pfx_kthread+0x10/0x10
[   26.112623]  ret_from_fork_asm+0x1a/0x30
[   26.112658]  </TASK>
[   26.112672] 
[   26.129979] Allocated by task 313:
[   26.130176]  kasan_save_stack+0x45/0x70
[   26.130683]  kasan_save_track+0x18/0x40
[   26.131193]  kasan_save_alloc_info+0x3b/0x50
[   26.131646]  __kasan_kmalloc+0xb7/0xc0
[   26.132041]  __kmalloc_cache_noprof+0x189/0x420
[   26.132209]  kasan_atomics+0x95/0x310
[   26.132579]  kunit_try_run_case+0x1a5/0x480
[   26.133173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.133968]  kthread+0x337/0x6f0
[   26.134222]  ret_from_fork+0x116/0x1d0
[   26.134371]  ret_from_fork_asm+0x1a/0x30
[   26.134512] 
[   26.134581] The buggy address belongs to the object at ffff8881059cb500
[   26.134581]  which belongs to the cache kmalloc-64 of size 64
[   26.135465] The buggy address is located 0 bytes to the right of
[   26.135465]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.136857] 
[   26.137103] The buggy address belongs to the physical page:
[   26.138164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.138439] flags: 0x200000000000000(node=0|zone=2)
[   26.138606] page_type: f5(slab)
[   26.138727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.139472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.140258] page dumped because: kasan: bad access detected
[   26.140521] 
[   26.140599] Memory state around the buggy address:
[   26.140767]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.141470]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.142050] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.142860]                                      ^
[   26.143175]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.143401]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.143610] ==================================================================
[   26.237969] ==================================================================
[   26.238502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   26.238986] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.239510] 
[   26.239623] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.239697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.239712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.239738] Call Trace:
[   26.239800]  <TASK>
[   26.239824]  dump_stack_lvl+0x73/0xb0
[   26.239858]  print_report+0xd1/0x610
[   26.239884]  ? __virt_addr_valid+0x1db/0x2d0
[   26.239910]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.239963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.239995]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.240026]  kasan_report+0x141/0x180
[   26.240050]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.240085]  kasan_check_range+0x10c/0x1c0
[   26.240112]  __kasan_check_write+0x18/0x20
[   26.240140]  kasan_atomics_helper+0x8f9/0x5450
[   26.240171]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.240220]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.240262]  ? kasan_atomics+0x152/0x310
[   26.240292]  kasan_atomics+0x1dc/0x310
[   26.240338]  ? __pfx_kasan_atomics+0x10/0x10
[   26.240365]  ? __pfx_read_tsc+0x10/0x10
[   26.240392]  ? ktime_get_ts64+0x86/0x230
[   26.240421]  kunit_try_run_case+0x1a5/0x480
[   26.240445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.240467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.240508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.240540]  ? __kthread_parkme+0x82/0x180
[   26.240562]  ? preempt_count_sub+0x50/0x80
[   26.240588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.240612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.240640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.240668]  kthread+0x337/0x6f0
[   26.240692]  ? trace_preempt_on+0x20/0xc0
[   26.240718]  ? __pfx_kthread+0x10/0x10
[   26.240807]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.240840]  ? calculate_sigpending+0x7b/0xa0
[   26.240868]  ? __pfx_kthread+0x10/0x10
[   26.240904]  ret_from_fork+0x116/0x1d0
[   26.240926]  ? __pfx_kthread+0x10/0x10
[   26.240950]  ret_from_fork_asm+0x1a/0x30
[   26.240986]  </TASK>
[   26.241000] 
[   26.249796] Allocated by task 313:
[   26.250006]  kasan_save_stack+0x45/0x70
[   26.250206]  kasan_save_track+0x18/0x40
[   26.250404]  kasan_save_alloc_info+0x3b/0x50
[   26.250625]  __kasan_kmalloc+0xb7/0xc0
[   26.250860]  __kmalloc_cache_noprof+0x189/0x420
[   26.251078]  kasan_atomics+0x95/0x310
[   26.251211]  kunit_try_run_case+0x1a5/0x480
[   26.251433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.251710]  kthread+0x337/0x6f0
[   26.251863]  ret_from_fork+0x116/0x1d0
[   26.252089]  ret_from_fork_asm+0x1a/0x30
[   26.252351] 
[   26.252446] The buggy address belongs to the object at ffff8881059cb500
[   26.252446]  which belongs to the cache kmalloc-64 of size 64
[   26.253023] The buggy address is located 0 bytes to the right of
[   26.253023]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.253959] 
[   26.254029] The buggy address belongs to the physical page:
[   26.254200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.254973] flags: 0x200000000000000(node=0|zone=2)
[   26.255249] page_type: f5(slab)
[   26.255436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.255671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.255978] page dumped because: kasan: bad access detected
[   26.256251] 
[   26.256353] Memory state around the buggy address:
[   26.256645]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.257295]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.257836] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.258102]                                      ^
[   26.258273]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.258587]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.258993] ==================================================================
[   26.177103] ==================================================================
[   26.177462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   26.177849] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.178129] 
[   26.178218] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.178283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.178297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.178322] Call Trace:
[   26.178344]  <TASK>
[   26.178366]  dump_stack_lvl+0x73/0xb0
[   26.178398]  print_report+0xd1/0x610
[   26.178422]  ? __virt_addr_valid+0x1db/0x2d0
[   26.178450]  ? kasan_atomics_helper+0x72f/0x5450
[   26.178480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.178510]  ? kasan_atomics_helper+0x72f/0x5450
[   26.178541]  kasan_report+0x141/0x180
[   26.178565]  ? kasan_atomics_helper+0x72f/0x5450
[   26.178600]  kasan_check_range+0x10c/0x1c0
[   26.178627]  __kasan_check_write+0x18/0x20
[   26.178655]  kasan_atomics_helper+0x72f/0x5450
[   26.178686]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.178717]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.178745]  ? kasan_atomics+0x152/0x310
[   26.178830]  kasan_atomics+0x1dc/0x310
[   26.178857]  ? __pfx_kasan_atomics+0x10/0x10
[   26.178885]  ? __pfx_read_tsc+0x10/0x10
[   26.178912]  ? ktime_get_ts64+0x86/0x230
[   26.178941]  kunit_try_run_case+0x1a5/0x480
[   26.178964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.178987]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.179011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.179041]  ? __kthread_parkme+0x82/0x180
[   26.179065]  ? preempt_count_sub+0x50/0x80
[   26.179092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.179116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.179144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.179174]  kthread+0x337/0x6f0
[   26.179198]  ? trace_preempt_on+0x20/0xc0
[   26.179226]  ? __pfx_kthread+0x10/0x10
[   26.179263]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.179291]  ? calculate_sigpending+0x7b/0xa0
[   26.179321]  ? __pfx_kthread+0x10/0x10
[   26.179346]  ret_from_fork+0x116/0x1d0
[   26.179368]  ? __pfx_kthread+0x10/0x10
[   26.179392]  ret_from_fork_asm+0x1a/0x30
[   26.179428]  </TASK>
[   26.179442] 
[   26.186835] Allocated by task 313:
[   26.186968]  kasan_save_stack+0x45/0x70
[   26.187107]  kasan_save_track+0x18/0x40
[   26.187304]  kasan_save_alloc_info+0x3b/0x50
[   26.187526]  __kasan_kmalloc+0xb7/0xc0
[   26.187710]  __kmalloc_cache_noprof+0x189/0x420
[   26.187930]  kasan_atomics+0x95/0x310
[   26.188128]  kunit_try_run_case+0x1a5/0x480
[   26.188346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.188741]  kthread+0x337/0x6f0
[   26.189217]  ret_from_fork+0x116/0x1d0
[   26.189385]  ret_from_fork_asm+0x1a/0x30
[   26.189585] 
[   26.189681] The buggy address belongs to the object at ffff8881059cb500
[   26.189681]  which belongs to the cache kmalloc-64 of size 64
[   26.190407] The buggy address is located 0 bytes to the right of
[   26.190407]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.190777] 
[   26.190846] The buggy address belongs to the physical page:
[   26.191091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.191748] flags: 0x200000000000000(node=0|zone=2)
[   26.191930] page_type: f5(slab)
[   26.192047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.192280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.192499] page dumped because: kasan: bad access detected
[   26.192945] 
[   26.193043] Memory state around the buggy address:
[   26.193289]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.193606]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.193920] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.194452]                                      ^
[   26.194611]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.194885]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.195226] ==================================================================
[   26.860554] ==================================================================
[   26.860995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   26.861374] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.861671] 
[   26.861824] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.861898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.861912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.861937] Call Trace:
[   26.861961]  <TASK>
[   26.861983]  dump_stack_lvl+0x73/0xb0
[   26.862015]  print_report+0xd1/0x610
[   26.862039]  ? __virt_addr_valid+0x1db/0x2d0
[   26.862065]  ? kasan_atomics_helper+0x151d/0x5450
[   26.862095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.862126]  ? kasan_atomics_helper+0x151d/0x5450
[   26.862156]  kasan_report+0x141/0x180
[   26.862182]  ? kasan_atomics_helper+0x151d/0x5450
[   26.862216]  kasan_check_range+0x10c/0x1c0
[   26.862254]  __kasan_check_write+0x18/0x20
[   26.862283]  kasan_atomics_helper+0x151d/0x5450
[   26.862313]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.862344]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.862373]  ? kasan_atomics+0x152/0x310
[   26.862402]  kasan_atomics+0x1dc/0x310
[   26.862428]  ? __pfx_kasan_atomics+0x10/0x10
[   26.862456]  ? __pfx_read_tsc+0x10/0x10
[   26.862484]  ? ktime_get_ts64+0x86/0x230
[   26.862513]  kunit_try_run_case+0x1a5/0x480
[   26.862536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.862559]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.862582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.862613]  ? __kthread_parkme+0x82/0x180
[   26.862636]  ? preempt_count_sub+0x50/0x80
[   26.862662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.862685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.862714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.862804]  kthread+0x337/0x6f0
[   26.862830]  ? trace_preempt_on+0x20/0xc0
[   26.862874]  ? __pfx_kthread+0x10/0x10
[   26.862899]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.862927]  ? calculate_sigpending+0x7b/0xa0
[   26.862957]  ? __pfx_kthread+0x10/0x10
[   26.862983]  ret_from_fork+0x116/0x1d0
[   26.863004]  ? __pfx_kthread+0x10/0x10
[   26.863028]  ret_from_fork_asm+0x1a/0x30
[   26.863064]  </TASK>
[   26.863077] 
[   26.871149] Allocated by task 313:
[   26.871340]  kasan_save_stack+0x45/0x70
[   26.871502]  kasan_save_track+0x18/0x40
[   26.871690]  kasan_save_alloc_info+0x3b/0x50
[   26.871991]  __kasan_kmalloc+0xb7/0xc0
[   26.872144]  __kmalloc_cache_noprof+0x189/0x420
[   26.872309]  kasan_atomics+0x95/0x310
[   26.872493]  kunit_try_run_case+0x1a5/0x480
[   26.872693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.872982]  kthread+0x337/0x6f0
[   26.873150]  ret_from_fork+0x116/0x1d0
[   26.873349]  ret_from_fork_asm+0x1a/0x30
[   26.873542] 
[   26.873610] The buggy address belongs to the object at ffff8881059cb500
[   26.873610]  which belongs to the cache kmalloc-64 of size 64
[   26.874091] The buggy address is located 0 bytes to the right of
[   26.874091]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.874458] 
[   26.874533] The buggy address belongs to the physical page:
[   26.874723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.875067] flags: 0x200000000000000(node=0|zone=2)
[   26.875308] page_type: f5(slab)
[   26.875470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.875794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.876062] page dumped because: kasan: bad access detected
[   26.876231] 
[   26.876389] Memory state around the buggy address:
[   26.876614]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.877007]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.877347] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.877645]                                      ^
[   26.878106]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.878408]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.878685] ==================================================================
[   26.965579] ==================================================================
[   26.966083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   26.966365] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.966714] 
[   26.966824] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.966878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.966912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.966937] Call Trace:
[   26.966959]  <TASK>
[   26.966980]  dump_stack_lvl+0x73/0xb0
[   26.967011]  print_report+0xd1/0x610
[   26.967109]  ? __virt_addr_valid+0x1db/0x2d0
[   26.967138]  ? kasan_atomics_helper+0x177f/0x5450
[   26.967176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.967207]  ? kasan_atomics_helper+0x177f/0x5450
[   26.967253]  kasan_report+0x141/0x180
[   26.967277]  ? kasan_atomics_helper+0x177f/0x5450
[   26.967313]  kasan_check_range+0x10c/0x1c0
[   26.967341]  __kasan_check_write+0x18/0x20
[   26.967369]  kasan_atomics_helper+0x177f/0x5450
[   26.967409]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.967440]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.967479]  ? kasan_atomics+0x152/0x310
[   26.967509]  kasan_atomics+0x1dc/0x310
[   26.967536]  ? __pfx_kasan_atomics+0x10/0x10
[   26.967572]  ? __pfx_read_tsc+0x10/0x10
[   26.967598]  ? ktime_get_ts64+0x86/0x230
[   26.967637]  kunit_try_run_case+0x1a5/0x480
[   26.967662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.967684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.967710]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.967742]  ? __kthread_parkme+0x82/0x180
[   26.967800]  ? preempt_count_sub+0x50/0x80
[   26.967828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.967852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.967890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.967920]  kthread+0x337/0x6f0
[   26.967943]  ? trace_preempt_on+0x20/0xc0
[   26.967992]  ? __pfx_kthread+0x10/0x10
[   26.968016]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.968045]  ? calculate_sigpending+0x7b/0xa0
[   26.968084]  ? __pfx_kthread+0x10/0x10
[   26.968109]  ret_from_fork+0x116/0x1d0
[   26.968131]  ? __pfx_kthread+0x10/0x10
[   26.968167]  ret_from_fork_asm+0x1a/0x30
[   26.968202]  </TASK>
[   26.968216] 
[   26.977284] Allocated by task 313:
[   26.977473]  kasan_save_stack+0x45/0x70
[   26.977695]  kasan_save_track+0x18/0x40
[   26.977916]  kasan_save_alloc_info+0x3b/0x50
[   26.978117]  __kasan_kmalloc+0xb7/0xc0
[   26.978325]  __kmalloc_cache_noprof+0x189/0x420
[   26.978493]  kasan_atomics+0x95/0x310
[   26.978677]  kunit_try_run_case+0x1a5/0x480
[   26.978880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.979068]  kthread+0x337/0x6f0
[   26.979186]  ret_from_fork+0x116/0x1d0
[   26.979366]  ret_from_fork_asm+0x1a/0x30
[   26.979692] 
[   26.979860] The buggy address belongs to the object at ffff8881059cb500
[   26.979860]  which belongs to the cache kmalloc-64 of size 64
[   26.980346] The buggy address is located 0 bytes to the right of
[   26.980346]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.981116] 
[   26.981227] The buggy address belongs to the physical page:
[   26.981469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.981963] flags: 0x200000000000000(node=0|zone=2)
[   26.982365] page_type: f5(slab)
[   26.982548] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.982979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.983207] page dumped because: kasan: bad access detected
[   26.983384] 
[   26.983451] Memory state around the buggy address:
[   26.983670]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.983996]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.984304] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.984511]                                      ^
[   26.984662]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.985341]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.985653] ==================================================================
[   26.879232] ==================================================================
[   26.879556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   26.879928] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.880176] 
[   26.880307] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.880361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.880374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.880399] Call Trace:
[   26.880421]  <TASK>
[   26.880442]  dump_stack_lvl+0x73/0xb0
[   26.880475]  print_report+0xd1/0x610
[   26.880500]  ? __virt_addr_valid+0x1db/0x2d0
[   26.880526]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.880556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.880586]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.880618]  kasan_report+0x141/0x180
[   26.880643]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.880678]  kasan_check_range+0x10c/0x1c0
[   26.880705]  __kasan_check_write+0x18/0x20
[   26.880733]  kasan_atomics_helper+0x15b6/0x5450
[   26.880839]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.880888]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.880918]  ? kasan_atomics+0x152/0x310
[   26.880948]  kasan_atomics+0x1dc/0x310
[   26.880974]  ? __pfx_kasan_atomics+0x10/0x10
[   26.881002]  ? __pfx_read_tsc+0x10/0x10
[   26.881029]  ? ktime_get_ts64+0x86/0x230
[   26.881058]  kunit_try_run_case+0x1a5/0x480
[   26.881082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.881104]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.881128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.881160]  ? __kthread_parkme+0x82/0x180
[   26.881182]  ? preempt_count_sub+0x50/0x80
[   26.881215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.881248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.881277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.881306]  kthread+0x337/0x6f0
[   26.881331]  ? trace_preempt_on+0x20/0xc0
[   26.881359]  ? __pfx_kthread+0x10/0x10
[   26.881384]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.881413]  ? calculate_sigpending+0x7b/0xa0
[   26.881442]  ? __pfx_kthread+0x10/0x10
[   26.881467]  ret_from_fork+0x116/0x1d0
[   26.881488]  ? __pfx_kthread+0x10/0x10
[   26.881512]  ret_from_fork_asm+0x1a/0x30
[   26.881548]  </TASK>
[   26.881561] 
[   26.889336] Allocated by task 313:
[   26.889501]  kasan_save_stack+0x45/0x70
[   26.889671]  kasan_save_track+0x18/0x40
[   26.890079]  kasan_save_alloc_info+0x3b/0x50
[   26.890261]  __kasan_kmalloc+0xb7/0xc0
[   26.890447]  __kmalloc_cache_noprof+0x189/0x420
[   26.890654]  kasan_atomics+0x95/0x310
[   26.890909]  kunit_try_run_case+0x1a5/0x480
[   26.891102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.891348]  kthread+0x337/0x6f0
[   26.891480]  ret_from_fork+0x116/0x1d0
[   26.891607]  ret_from_fork_asm+0x1a/0x30
[   26.892209] 
[   26.892347] The buggy address belongs to the object at ffff8881059cb500
[   26.892347]  which belongs to the cache kmalloc-64 of size 64
[   26.894504] The buggy address is located 0 bytes to the right of
[   26.894504]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.896979] 
[   26.897472] The buggy address belongs to the physical page:
[   26.897906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.899044] flags: 0x200000000000000(node=0|zone=2)
[   26.899614] page_type: f5(slab)
[   26.899992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.901003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.901235] page dumped because: kasan: bad access detected
[   26.901409] 
[   26.901473] Memory state around the buggy address:
[   26.901620]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.903393]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.904382] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.905514]                                      ^
[   26.905946]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.906797]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.907400] ==================================================================
[   27.270652] ==================================================================
[   27.271001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   27.271342] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.271706] 
[   27.271795] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.271866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.271879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.271903] Call Trace:
[   27.271922]  <TASK>
[   27.271941]  dump_stack_lvl+0x73/0xb0
[   27.271973]  print_report+0xd1/0x610
[   27.271997]  ? __virt_addr_valid+0x1db/0x2d0
[   27.272023]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.272052]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.272082]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.272113]  kasan_report+0x141/0x180
[   27.272137]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.272171]  kasan_check_range+0x10c/0x1c0
[   27.272198]  __kasan_check_write+0x18/0x20
[   27.272224]  kasan_atomics_helper+0x1eaa/0x5450
[   27.272265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.272296]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.272324]  ? kasan_atomics+0x152/0x310
[   27.272353]  kasan_atomics+0x1dc/0x310
[   27.272379]  ? __pfx_kasan_atomics+0x10/0x10
[   27.272407]  ? __pfx_read_tsc+0x10/0x10
[   27.272433]  ? ktime_get_ts64+0x86/0x230
[   27.272460]  kunit_try_run_case+0x1a5/0x480
[   27.272484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.272505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.272528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.272559]  ? __kthread_parkme+0x82/0x180
[   27.272581]  ? preempt_count_sub+0x50/0x80
[   27.272647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.272693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.272722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.272756]  kthread+0x337/0x6f0
[   27.272780]  ? trace_preempt_on+0x20/0xc0
[   27.272806]  ? __pfx_kthread+0x10/0x10
[   27.272830]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.272858]  ? calculate_sigpending+0x7b/0xa0
[   27.272921]  ? __pfx_kthread+0x10/0x10
[   27.272946]  ret_from_fork+0x116/0x1d0
[   27.272967]  ? __pfx_kthread+0x10/0x10
[   27.272991]  ret_from_fork_asm+0x1a/0x30
[   27.273025]  </TASK>
[   27.273038] 
[   27.281169] Allocated by task 313:
[   27.281371]  kasan_save_stack+0x45/0x70
[   27.281624]  kasan_save_track+0x18/0x40
[   27.281949]  kasan_save_alloc_info+0x3b/0x50
[   27.282226]  __kasan_kmalloc+0xb7/0xc0
[   27.282411]  __kmalloc_cache_noprof+0x189/0x420
[   27.282662]  kasan_atomics+0x95/0x310
[   27.282832]  kunit_try_run_case+0x1a5/0x480
[   27.283049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.283280]  kthread+0x337/0x6f0
[   27.283553]  ret_from_fork+0x116/0x1d0
[   27.283729]  ret_from_fork_asm+0x1a/0x30
[   27.283934] 
[   27.284003] The buggy address belongs to the object at ffff8881059cb500
[   27.284003]  which belongs to the cache kmalloc-64 of size 64
[   27.284535] The buggy address is located 0 bytes to the right of
[   27.284535]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.285185] 
[   27.285295] The buggy address belongs to the physical page:
[   27.285505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.285932] flags: 0x200000000000000(node=0|zone=2)
[   27.286152] page_type: f5(slab)
[   27.286322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.286636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.287022] page dumped because: kasan: bad access detected
[   27.287254] 
[   27.287345] Memory state around the buggy address:
[   27.287532]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.287866]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.288230] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.288445]                                      ^
[   27.288592]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.288797]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.289002] ==================================================================
[   27.402601] ==================================================================
[   27.402868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   27.403118] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.403448] 
[   27.403555] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.403603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.403616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.403638] Call Trace:
[   27.403656]  <TASK>
[   27.403674]  dump_stack_lvl+0x73/0xb0
[   27.403702]  print_report+0xd1/0x610
[   27.403726]  ? __virt_addr_valid+0x1db/0x2d0
[   27.403751]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.403780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.403809]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.403839]  kasan_report+0x141/0x180
[   27.403863]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.403896]  __asan_report_load8_noabort+0x18/0x20
[   27.403924]  kasan_atomics_helper+0x4fb2/0x5450
[   27.403955]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.403984]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.404012]  ? kasan_atomics+0x152/0x310
[   27.404042]  kasan_atomics+0x1dc/0x310
[   27.404068]  ? __pfx_kasan_atomics+0x10/0x10
[   27.404094]  ? __pfx_read_tsc+0x10/0x10
[   27.404120]  ? ktime_get_ts64+0x86/0x230
[   27.404187]  kunit_try_run_case+0x1a5/0x480
[   27.404211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.404233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.404268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.404301]  ? __kthread_parkme+0x82/0x180
[   27.404333]  ? preempt_count_sub+0x50/0x80
[   27.404359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.404383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.404422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.404452]  kthread+0x337/0x6f0
[   27.404475]  ? trace_preempt_on+0x20/0xc0
[   27.404501]  ? __pfx_kthread+0x10/0x10
[   27.404525]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.404554]  ? calculate_sigpending+0x7b/0xa0
[   27.404583]  ? __pfx_kthread+0x10/0x10
[   27.404609]  ret_from_fork+0x116/0x1d0
[   27.404630]  ? __pfx_kthread+0x10/0x10
[   27.404654]  ret_from_fork_asm+0x1a/0x30
[   27.404689]  </TASK>
[   27.404702] 
[   27.412410] Allocated by task 313:
[   27.413082]  kasan_save_stack+0x45/0x70
[   27.413921]  kasan_save_track+0x18/0x40
[   27.414116]  kasan_save_alloc_info+0x3b/0x50
[   27.414345]  __kasan_kmalloc+0xb7/0xc0
[   27.414516]  __kmalloc_cache_noprof+0x189/0x420
[   27.414705]  kasan_atomics+0x95/0x310
[   27.415988]  kunit_try_run_case+0x1a5/0x480
[   27.416686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.417581]  kthread+0x337/0x6f0
[   27.418269]  ret_from_fork+0x116/0x1d0
[   27.418984]  ret_from_fork_asm+0x1a/0x30
[   27.419331] 
[   27.419420] The buggy address belongs to the object at ffff8881059cb500
[   27.419420]  which belongs to the cache kmalloc-64 of size 64
[   27.419776] The buggy address is located 0 bytes to the right of
[   27.419776]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.421714] 
[   27.421822] The buggy address belongs to the physical page:
[   27.422052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.422370] flags: 0x200000000000000(node=0|zone=2)
[   27.422583] page_type: f5(slab)
[   27.422736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.423615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.424173] page dumped because: kasan: bad access detected
[   27.424621] 
[   27.424868] Memory state around the buggy address:
[   27.425367]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.425807]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.426327] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.426831]                                      ^
[   27.427167]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.427625]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.428251] ==================================================================
[   27.429721] ==================================================================
[   27.430119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   27.430475] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.430779] 
[   27.431174] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.431399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.431421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.431447] Call Trace:
[   27.431470]  <TASK>
[   27.431494]  dump_stack_lvl+0x73/0xb0
[   27.431529]  print_report+0xd1/0x610
[   27.431555]  ? __virt_addr_valid+0x1db/0x2d0
[   27.431581]  ? kasan_atomics_helper+0x218a/0x5450
[   27.431612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.431642]  ? kasan_atomics_helper+0x218a/0x5450
[   27.431673]  kasan_report+0x141/0x180
[   27.431697]  ? kasan_atomics_helper+0x218a/0x5450
[   27.431733]  kasan_check_range+0x10c/0x1c0
[   27.431760]  __kasan_check_write+0x18/0x20
[   27.431788]  kasan_atomics_helper+0x218a/0x5450
[   27.431829]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.431862]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.431891]  ? kasan_atomics+0x152/0x310
[   27.431921]  kasan_atomics+0x1dc/0x310
[   27.431946]  ? __pfx_kasan_atomics+0x10/0x10
[   27.431974]  ? __pfx_read_tsc+0x10/0x10
[   27.432000]  ? ktime_get_ts64+0x86/0x230
[   27.432029]  kunit_try_run_case+0x1a5/0x480
[   27.432054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.432076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.432101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.432132]  ? __kthread_parkme+0x82/0x180
[   27.432154]  ? preempt_count_sub+0x50/0x80
[   27.432182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.432205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.432234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.432277]  kthread+0x337/0x6f0
[   27.432300]  ? trace_preempt_on+0x20/0xc0
[   27.432327]  ? __pfx_kthread+0x10/0x10
[   27.432351]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.432379]  ? calculate_sigpending+0x7b/0xa0
[   27.432408]  ? __pfx_kthread+0x10/0x10
[   27.432433]  ret_from_fork+0x116/0x1d0
[   27.432454]  ? __pfx_kthread+0x10/0x10
[   27.432479]  ret_from_fork_asm+0x1a/0x30
[   27.432514]  </TASK>
[   27.432526] 
[   27.443509] Allocated by task 313:
[   27.443677]  kasan_save_stack+0x45/0x70
[   27.444111]  kasan_save_track+0x18/0x40
[   27.444406]  kasan_save_alloc_info+0x3b/0x50
[   27.444726]  __kasan_kmalloc+0xb7/0xc0
[   27.445164]  __kmalloc_cache_noprof+0x189/0x420
[   27.445393]  kasan_atomics+0x95/0x310
[   27.445564]  kunit_try_run_case+0x1a5/0x480
[   27.445748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.446313]  kthread+0x337/0x6f0
[   27.446524]  ret_from_fork+0x116/0x1d0
[   27.446832]  ret_from_fork_asm+0x1a/0x30
[   27.447156] 
[   27.447403] The buggy address belongs to the object at ffff8881059cb500
[   27.447403]  which belongs to the cache kmalloc-64 of size 64
[   27.448194] The buggy address is located 0 bytes to the right of
[   27.448194]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.448715] 
[   27.448806] The buggy address belongs to the physical page:
[   27.449378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.449991] flags: 0x200000000000000(node=0|zone=2)
[   27.450346] page_type: f5(slab)
[   27.450659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.451159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.451611] page dumped because: kasan: bad access detected
[   27.452038] 
[   27.452134] Memory state around the buggy address:
[   27.452581]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.453245]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.453621] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.454160]                                      ^
[   27.454462]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.455036]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.455342] ==================================================================
[   27.176918] ==================================================================
[   27.177583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   27.178360] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.178726] 
[   27.178853] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.178911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.178979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.179017] Call Trace:
[   27.179040]  <TASK>
[   27.179063]  dump_stack_lvl+0x73/0xb0
[   27.179108]  print_report+0xd1/0x610
[   27.179149]  ? __virt_addr_valid+0x1db/0x2d0
[   27.179189]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.179219]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.179259]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.179291]  kasan_report+0x141/0x180
[   27.179316]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.179350]  __asan_report_load8_noabort+0x18/0x20
[   27.179378]  kasan_atomics_helper+0x4f30/0x5450
[   27.179410]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.179441]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.179471]  ? kasan_atomics+0x152/0x310
[   27.179502]  kasan_atomics+0x1dc/0x310
[   27.179528]  ? __pfx_kasan_atomics+0x10/0x10
[   27.179555]  ? __pfx_read_tsc+0x10/0x10
[   27.179581]  ? ktime_get_ts64+0x86/0x230
[   27.179610]  kunit_try_run_case+0x1a5/0x480
[   27.179634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.179656]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.179680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.179711]  ? __kthread_parkme+0x82/0x180
[   27.179734]  ? preempt_count_sub+0x50/0x80
[   27.179807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.179844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.179872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.179901]  kthread+0x337/0x6f0
[   27.179924]  ? trace_preempt_on+0x20/0xc0
[   27.179952]  ? __pfx_kthread+0x10/0x10
[   27.179976]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.180006]  ? calculate_sigpending+0x7b/0xa0
[   27.180035]  ? __pfx_kthread+0x10/0x10
[   27.180060]  ret_from_fork+0x116/0x1d0
[   27.180082]  ? __pfx_kthread+0x10/0x10
[   27.180107]  ret_from_fork_asm+0x1a/0x30
[   27.180143]  </TASK>
[   27.180157] 
[   27.192694] Allocated by task 313:
[   27.193299]  kasan_save_stack+0x45/0x70
[   27.193490]  kasan_save_track+0x18/0x40
[   27.193875]  kasan_save_alloc_info+0x3b/0x50
[   27.194088]  __kasan_kmalloc+0xb7/0xc0
[   27.194275]  __kmalloc_cache_noprof+0x189/0x420
[   27.194485]  kasan_atomics+0x95/0x310
[   27.194658]  kunit_try_run_case+0x1a5/0x480
[   27.195156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.195580]  kthread+0x337/0x6f0
[   27.195885]  ret_from_fork+0x116/0x1d0
[   27.196039]  ret_from_fork_asm+0x1a/0x30
[   27.196634] 
[   27.196712] The buggy address belongs to the object at ffff8881059cb500
[   27.196712]  which belongs to the cache kmalloc-64 of size 64
[   27.197652] The buggy address is located 0 bytes to the right of
[   27.197652]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.198395] 
[   27.198509] The buggy address belongs to the physical page:
[   27.198739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.199289] flags: 0x200000000000000(node=0|zone=2)
[   27.199626] page_type: f5(slab)
[   27.199855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.200390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.200809] page dumped because: kasan: bad access detected
[   27.201356] 
[   27.201452] Memory state around the buggy address:
[   27.201640]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.202305]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.202724] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.203165]                                      ^
[   27.203409]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.204218]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.205093] ==================================================================
[   25.951741] ==================================================================
[   25.952471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   25.953281] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   25.953997] 
[   25.954208] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   25.954277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.954290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.954315] Call Trace:
[   25.954336]  <TASK>
[   25.954358]  dump_stack_lvl+0x73/0xb0
[   25.954391]  print_report+0xd1/0x610
[   25.954415]  ? __virt_addr_valid+0x1db/0x2d0
[   25.954442]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.954472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.954502]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.954533]  kasan_report+0x141/0x180
[   25.954557]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.954592]  __asan_report_store4_noabort+0x1b/0x30
[   25.954621]  kasan_atomics_helper+0x4b6e/0x5450
[   25.954652]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.954683]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.954712]  ? kasan_atomics+0x152/0x310
[   25.954742]  kasan_atomics+0x1dc/0x310
[   25.954813]  ? __pfx_kasan_atomics+0x10/0x10
[   25.954842]  ? __pfx_read_tsc+0x10/0x10
[   25.954869]  ? ktime_get_ts64+0x86/0x230
[   25.954898]  kunit_try_run_case+0x1a5/0x480
[   25.954922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.954944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.954968]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.955001]  ? __kthread_parkme+0x82/0x180
[   25.955024]  ? preempt_count_sub+0x50/0x80
[   25.955060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.955084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.955114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.955143]  kthread+0x337/0x6f0
[   25.955167]  ? trace_preempt_on+0x20/0xc0
[   25.955193]  ? __pfx_kthread+0x10/0x10
[   25.955218]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.955259]  ? calculate_sigpending+0x7b/0xa0
[   25.955289]  ? __pfx_kthread+0x10/0x10
[   25.955314]  ret_from_fork+0x116/0x1d0
[   25.955335]  ? __pfx_kthread+0x10/0x10
[   25.955358]  ret_from_fork_asm+0x1a/0x30
[   25.955394]  </TASK>
[   25.955407] 
[   25.965905] Allocated by task 313:
[   25.966070]  kasan_save_stack+0x45/0x70
[   25.966353]  kasan_save_track+0x18/0x40
[   25.966543]  kasan_save_alloc_info+0x3b/0x50
[   25.966795]  __kasan_kmalloc+0xb7/0xc0
[   25.966947]  __kmalloc_cache_noprof+0x189/0x420
[   25.967102]  kasan_atomics+0x95/0x310
[   25.967231]  kunit_try_run_case+0x1a5/0x480
[   25.967446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.967699]  kthread+0x337/0x6f0
[   25.967910]  ret_from_fork+0x116/0x1d0
[   25.968158]  ret_from_fork_asm+0x1a/0x30
[   25.968373] 
[   25.968452] The buggy address belongs to the object at ffff8881059cb500
[   25.968452]  which belongs to the cache kmalloc-64 of size 64
[   25.969039] The buggy address is located 0 bytes to the right of
[   25.969039]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   25.969517] 
[   25.969611] The buggy address belongs to the physical page:
[   25.969858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   25.970536] flags: 0x200000000000000(node=0|zone=2)
[   25.970875] page_type: f5(slab)
[   25.971023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.971331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.971651] page dumped because: kasan: bad access detected
[   25.971932] 
[   25.972027] Memory state around the buggy address:
[   25.972187]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.972412]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.972658] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.972962]                                      ^
[   25.973407]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.973641]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.973849] ==================================================================
[   27.206153] ==================================================================
[   27.206930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   27.207184] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.207424] 
[   27.207515] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.207569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.207585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.207608] Call Trace:
[   27.207631]  <TASK>
[   27.207653]  dump_stack_lvl+0x73/0xb0
[   27.207684]  print_report+0xd1/0x610
[   27.207709]  ? __virt_addr_valid+0x1db/0x2d0
[   27.207735]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.207767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.207797]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.207828]  kasan_report+0x141/0x180
[   27.207852]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.207959]  kasan_check_range+0x10c/0x1c0
[   27.207988]  __kasan_check_write+0x18/0x20
[   27.208018]  kasan_atomics_helper+0x1ce1/0x5450
[   27.208049]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.208079]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.208108]  ? kasan_atomics+0x152/0x310
[   27.208138]  kasan_atomics+0x1dc/0x310
[   27.208164]  ? __pfx_kasan_atomics+0x10/0x10
[   27.208191]  ? __pfx_read_tsc+0x10/0x10
[   27.208218]  ? ktime_get_ts64+0x86/0x230
[   27.208259]  kunit_try_run_case+0x1a5/0x480
[   27.208283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.208305]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.208329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.208359]  ? __kthread_parkme+0x82/0x180
[   27.208382]  ? preempt_count_sub+0x50/0x80
[   27.208408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.208431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.208459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.208488]  kthread+0x337/0x6f0
[   27.208511]  ? trace_preempt_on+0x20/0xc0
[   27.208537]  ? __pfx_kthread+0x10/0x10
[   27.208561]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.208589]  ? calculate_sigpending+0x7b/0xa0
[   27.208618]  ? __pfx_kthread+0x10/0x10
[   27.208643]  ret_from_fork+0x116/0x1d0
[   27.208664]  ? __pfx_kthread+0x10/0x10
[   27.208689]  ret_from_fork_asm+0x1a/0x30
[   27.208724]  </TASK>
[   27.208737] 
[   27.217454] Allocated by task 313:
[   27.217638]  kasan_save_stack+0x45/0x70
[   27.217965]  kasan_save_track+0x18/0x40
[   27.218151]  kasan_save_alloc_info+0x3b/0x50
[   27.218356]  __kasan_kmalloc+0xb7/0xc0
[   27.218527]  __kmalloc_cache_noprof+0x189/0x420
[   27.218730]  kasan_atomics+0x95/0x310
[   27.219106]  kunit_try_run_case+0x1a5/0x480
[   27.219309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.219543]  kthread+0x337/0x6f0
[   27.219696]  ret_from_fork+0x116/0x1d0
[   27.220045]  ret_from_fork_asm+0x1a/0x30
[   27.220234] 
[   27.220331] The buggy address belongs to the object at ffff8881059cb500
[   27.220331]  which belongs to the cache kmalloc-64 of size 64
[   27.220853] The buggy address is located 0 bytes to the right of
[   27.220853]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.221359] 
[   27.221450] The buggy address belongs to the physical page:
[   27.221673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.223009] flags: 0x200000000000000(node=0|zone=2)
[   27.223203] page_type: f5(slab)
[   27.223340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.223569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.223799] page dumped because: kasan: bad access detected
[   27.223985] 
[   27.224051] Memory state around the buggy address:
[   27.224205]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.224424]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.224635] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.224900]                                      ^
[   27.225127]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.225891]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.226501] ==================================================================
[   26.907923] ==================================================================
[   26.908471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   26.909320] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.910102] 
[   26.910213] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.910313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.910329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.910391] Call Trace:
[   26.910415]  <TASK>
[   26.910438]  dump_stack_lvl+0x73/0xb0
[   26.910484]  print_report+0xd1/0x610
[   26.910508]  ? __virt_addr_valid+0x1db/0x2d0
[   26.910537]  ? kasan_atomics_helper+0x164f/0x5450
[   26.910568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.910599]  ? kasan_atomics_helper+0x164f/0x5450
[   26.910629]  kasan_report+0x141/0x180
[   26.910653]  ? kasan_atomics_helper+0x164f/0x5450
[   26.910688]  kasan_check_range+0x10c/0x1c0
[   26.910715]  __kasan_check_write+0x18/0x20
[   26.910743]  kasan_atomics_helper+0x164f/0x5450
[   26.910785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.910828]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.910858]  ? kasan_atomics+0x152/0x310
[   26.910888]  kasan_atomics+0x1dc/0x310
[   26.910914]  ? __pfx_kasan_atomics+0x10/0x10
[   26.910942]  ? __pfx_read_tsc+0x10/0x10
[   26.910969]  ? ktime_get_ts64+0x86/0x230
[   26.910998]  kunit_try_run_case+0x1a5/0x480
[   26.911023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.911045]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.911069]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.911100]  ? __kthread_parkme+0x82/0x180
[   26.911123]  ? preempt_count_sub+0x50/0x80
[   26.911149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.911173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.911202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.911232]  kthread+0x337/0x6f0
[   26.911264]  ? trace_preempt_on+0x20/0xc0
[   26.911291]  ? __pfx_kthread+0x10/0x10
[   26.911315]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.911344]  ? calculate_sigpending+0x7b/0xa0
[   26.911375]  ? __pfx_kthread+0x10/0x10
[   26.911401]  ret_from_fork+0x116/0x1d0
[   26.911422]  ? __pfx_kthread+0x10/0x10
[   26.911446]  ret_from_fork_asm+0x1a/0x30
[   26.911484]  </TASK>
[   26.911496] 
[   26.926156] Allocated by task 313:
[   26.926317]  kasan_save_stack+0x45/0x70
[   26.926483]  kasan_save_track+0x18/0x40
[   26.926906]  kasan_save_alloc_info+0x3b/0x50
[   26.927415]  __kasan_kmalloc+0xb7/0xc0
[   26.927724]  __kmalloc_cache_noprof+0x189/0x420
[   26.928196]  kasan_atomics+0x95/0x310
[   26.928492]  kunit_try_run_case+0x1a5/0x480
[   26.928636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.928803]  kthread+0x337/0x6f0
[   26.929051]  ret_from_fork+0x116/0x1d0
[   26.929465]  ret_from_fork_asm+0x1a/0x30
[   26.929718] 
[   26.929934] The buggy address belongs to the object at ffff8881059cb500
[   26.929934]  which belongs to the cache kmalloc-64 of size 64
[   26.930799] The buggy address is located 0 bytes to the right of
[   26.930799]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.931782] 
[   26.931950] The buggy address belongs to the physical page:
[   26.932580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.933129] flags: 0x200000000000000(node=0|zone=2)
[   26.933493] page_type: f5(slab)
[   26.933857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.934518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.934735] page dumped because: kasan: bad access detected
[   26.935107] 
[   26.935313] Memory state around the buggy address:
[   26.935868]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.936685]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.937404] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.937905]                                      ^
[   26.938056]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.938270]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.938471] ==================================================================
[   27.252377] ==================================================================
[   27.252702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   27.253064] Write of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.253340] 
[   27.253426] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.253476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.253490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.253513] Call Trace:
[   27.253532]  <TASK>
[   27.253551]  dump_stack_lvl+0x73/0xb0
[   27.253582]  print_report+0xd1/0x610
[   27.253607]  ? __virt_addr_valid+0x1db/0x2d0
[   27.253632]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.253661]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.253691]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.253720]  kasan_report+0x141/0x180
[   27.253768]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.253820]  kasan_check_range+0x10c/0x1c0
[   27.253847]  __kasan_check_write+0x18/0x20
[   27.253874]  kasan_atomics_helper+0x1e12/0x5450
[   27.253906]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.253936]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.253964]  ? kasan_atomics+0x152/0x310
[   27.253993]  kasan_atomics+0x1dc/0x310
[   27.254019]  ? __pfx_kasan_atomics+0x10/0x10
[   27.254046]  ? __pfx_read_tsc+0x10/0x10
[   27.254072]  ? ktime_get_ts64+0x86/0x230
[   27.254100]  kunit_try_run_case+0x1a5/0x480
[   27.254124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.254146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.254169]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.254199]  ? __kthread_parkme+0x82/0x180
[   27.254223]  ? preempt_count_sub+0x50/0x80
[   27.254275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.254300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.254328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.254356]  kthread+0x337/0x6f0
[   27.254378]  ? trace_preempt_on+0x20/0xc0
[   27.254404]  ? __pfx_kthread+0x10/0x10
[   27.254428]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.254456]  ? calculate_sigpending+0x7b/0xa0
[   27.254484]  ? __pfx_kthread+0x10/0x10
[   27.254509]  ret_from_fork+0x116/0x1d0
[   27.254529]  ? __pfx_kthread+0x10/0x10
[   27.254553]  ret_from_fork_asm+0x1a/0x30
[   27.254587]  </TASK>
[   27.254601] 
[   27.262364] Allocated by task 313:
[   27.262495]  kasan_save_stack+0x45/0x70
[   27.262632]  kasan_save_track+0x18/0x40
[   27.262764]  kasan_save_alloc_info+0x3b/0x50
[   27.262983]  __kasan_kmalloc+0xb7/0xc0
[   27.263269]  __kmalloc_cache_noprof+0x189/0x420
[   27.263485]  kasan_atomics+0x95/0x310
[   27.263665]  kunit_try_run_case+0x1a5/0x480
[   27.263881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.264135]  kthread+0x337/0x6f0
[   27.264434]  ret_from_fork+0x116/0x1d0
[   27.264615]  ret_from_fork_asm+0x1a/0x30
[   27.264835] 
[   27.264925] The buggy address belongs to the object at ffff8881059cb500
[   27.264925]  which belongs to the cache kmalloc-64 of size 64
[   27.265602] The buggy address is located 0 bytes to the right of
[   27.265602]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.265956] 
[   27.266036] The buggy address belongs to the physical page:
[   27.266293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.266641] flags: 0x200000000000000(node=0|zone=2)
[   27.266876] page_type: f5(slab)
[   27.267046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.267434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.267778] page dumped because: kasan: bad access detected
[   27.268041] 
[   27.268153] Memory state around the buggy address:
[   27.268352]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.268554]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.268791] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.269111]                                      ^
[   27.269339]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.269725]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.270223] ==================================================================
[   27.308869] ==================================================================
[   27.309231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   27.309546] Read of size 8 at addr ffff8881059cb530 by task kunit_try_catch/313
[   27.309763] 
[   27.309848] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.309896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.309910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.309934] Call Trace:
[   27.309954]  <TASK>
[   27.309974]  dump_stack_lvl+0x73/0xb0
[   27.310002]  print_report+0xd1/0x610
[   27.310025]  ? __virt_addr_valid+0x1db/0x2d0
[   27.310050]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.310081]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.310110]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.310140]  kasan_report+0x141/0x180
[   27.310163]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.310197]  __asan_report_load8_noabort+0x18/0x20
[   27.310224]  kasan_atomics_helper+0x4f71/0x5450
[   27.310265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.310295]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.310323]  ? kasan_atomics+0x152/0x310
[   27.310363]  kasan_atomics+0x1dc/0x310
[   27.310390]  ? __pfx_kasan_atomics+0x10/0x10
[   27.310417]  ? __pfx_read_tsc+0x10/0x10
[   27.310443]  ? ktime_get_ts64+0x86/0x230
[   27.310470]  kunit_try_run_case+0x1a5/0x480
[   27.310494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.310527]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.310560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.310590]  ? __kthread_parkme+0x82/0x180
[   27.310612]  ? preempt_count_sub+0x50/0x80
[   27.310638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.310662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.310690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.310719]  kthread+0x337/0x6f0
[   27.310765]  ? trace_preempt_on+0x20/0xc0
[   27.310791]  ? __pfx_kthread+0x10/0x10
[   27.310814]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.310843]  ? calculate_sigpending+0x7b/0xa0
[   27.310872]  ? __pfx_kthread+0x10/0x10
[   27.310896]  ret_from_fork+0x116/0x1d0
[   27.310917]  ? __pfx_kthread+0x10/0x10
[   27.310941]  ret_from_fork_asm+0x1a/0x30
[   27.310977]  </TASK>
[   27.310989] 
[   27.323893] Allocated by task 313:
[   27.324301]  kasan_save_stack+0x45/0x70
[   27.324616]  kasan_save_track+0x18/0x40
[   27.324875]  kasan_save_alloc_info+0x3b/0x50
[   27.325258]  __kasan_kmalloc+0xb7/0xc0
[   27.325544]  __kmalloc_cache_noprof+0x189/0x420
[   27.325961]  kasan_atomics+0x95/0x310
[   27.326273]  kunit_try_run_case+0x1a5/0x480
[   27.326571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.327062]  kthread+0x337/0x6f0
[   27.327365]  ret_from_fork+0x116/0x1d0
[   27.327662]  ret_from_fork_asm+0x1a/0x30
[   27.328002] 
[   27.328126] The buggy address belongs to the object at ffff8881059cb500
[   27.328126]  which belongs to the cache kmalloc-64 of size 64
[   27.328848] The buggy address is located 0 bytes to the right of
[   27.328848]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   27.329609] 
[   27.329717] The buggy address belongs to the physical page:
[   27.330216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   27.330623] flags: 0x200000000000000(node=0|zone=2)
[   27.331006] page_type: f5(slab)
[   27.331300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.331721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.332094] page dumped because: kasan: bad access detected
[   27.332336] 
[   27.332417] Memory state around the buggy address:
[   27.332646]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.333210]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.333589] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.333997]                                      ^
[   27.334381]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.334735]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.335197] ==================================================================
[   26.216719] ==================================================================
[   26.217356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   26.217590] Write of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.218042] 
[   26.218281] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.218337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.218368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.218393] Call Trace:
[   26.218428]  <TASK>
[   26.218463]  dump_stack_lvl+0x73/0xb0
[   26.218508]  print_report+0xd1/0x610
[   26.218533]  ? __virt_addr_valid+0x1db/0x2d0
[   26.218558]  ? kasan_atomics_helper+0x860/0x5450
[   26.218588]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.218619]  ? kasan_atomics_helper+0x860/0x5450
[   26.218649]  kasan_report+0x141/0x180
[   26.218673]  ? kasan_atomics_helper+0x860/0x5450
[   26.218708]  kasan_check_range+0x10c/0x1c0
[   26.218735]  __kasan_check_write+0x18/0x20
[   26.218763]  kasan_atomics_helper+0x860/0x5450
[   26.218794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.218825]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.218853]  ? kasan_atomics+0x152/0x310
[   26.218884]  kasan_atomics+0x1dc/0x310
[   26.218912]  ? __pfx_kasan_atomics+0x10/0x10
[   26.218959]  ? __pfx_read_tsc+0x10/0x10
[   26.218987]  ? ktime_get_ts64+0x86/0x230
[   26.219016]  kunit_try_run_case+0x1a5/0x480
[   26.219040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.219114]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.219142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.219193]  ? __kthread_parkme+0x82/0x180
[   26.219217]  ? preempt_count_sub+0x50/0x80
[   26.219255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.219279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.219307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.219353]  kthread+0x337/0x6f0
[   26.219389]  ? trace_preempt_on+0x20/0xc0
[   26.219415]  ? __pfx_kthread+0x10/0x10
[   26.219439]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.219482]  ? calculate_sigpending+0x7b/0xa0
[   26.219524]  ? __pfx_kthread+0x10/0x10
[   26.219549]  ret_from_fork+0x116/0x1d0
[   26.219570]  ? __pfx_kthread+0x10/0x10
[   26.219594]  ret_from_fork_asm+0x1a/0x30
[   26.219630]  </TASK>
[   26.219644] 
[   26.227867] Allocated by task 313:
[   26.228126]  kasan_save_stack+0x45/0x70
[   26.228426]  kasan_save_track+0x18/0x40
[   26.228857]  kasan_save_alloc_info+0x3b/0x50
[   26.229063]  __kasan_kmalloc+0xb7/0xc0
[   26.229275]  __kmalloc_cache_noprof+0x189/0x420
[   26.229505]  kasan_atomics+0x95/0x310
[   26.229724]  kunit_try_run_case+0x1a5/0x480
[   26.230045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.230351]  kthread+0x337/0x6f0
[   26.230477]  ret_from_fork+0x116/0x1d0
[   26.230608]  ret_from_fork_asm+0x1a/0x30
[   26.230745] 
[   26.230838] The buggy address belongs to the object at ffff8881059cb500
[   26.230838]  which belongs to the cache kmalloc-64 of size 64
[   26.231438] The buggy address is located 0 bytes to the right of
[   26.231438]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.232177] 
[   26.232310] The buggy address belongs to the physical page:
[   26.232662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.232898] flags: 0x200000000000000(node=0|zone=2)
[   26.233056] page_type: f5(slab)
[   26.233173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.233412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.234140] page dumped because: kasan: bad access detected
[   26.234603] 
[   26.234724] Memory state around the buggy address:
[   26.234968]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.235410]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.235701] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.236463]                                      ^
[   26.236710]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.237132]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.237369] ==================================================================
[   26.535272] ==================================================================
[   26.535508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   26.535749] Read of size 4 at addr ffff8881059cb530 by task kunit_try_catch/313
[   26.535965] 
[   26.536051] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   26.536101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.536115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.536138] Call Trace:
[   26.536157]  <TASK>
[   26.536176]  dump_stack_lvl+0x73/0xb0
[   26.536206]  print_report+0xd1/0x610
[   26.536229]  ? __virt_addr_valid+0x1db/0x2d0
[   26.536719]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.536753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.536784]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.537276]  kasan_report+0x141/0x180
[   26.537310]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.537348]  __asan_report_load4_noabort+0x18/0x20
[   26.537378]  kasan_atomics_helper+0x4a36/0x5450
[   26.537410]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.537440]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.537468]  ? kasan_atomics+0x152/0x310
[   26.537498]  kasan_atomics+0x1dc/0x310
[   26.537524]  ? __pfx_kasan_atomics+0x10/0x10
[   26.537551]  ? __pfx_read_tsc+0x10/0x10
[   26.537579]  ? ktime_get_ts64+0x86/0x230
[   26.537607]  kunit_try_run_case+0x1a5/0x480
[   26.537631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.537653]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.537677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.537707]  ? __kthread_parkme+0x82/0x180
[   26.537729]  ? preempt_count_sub+0x50/0x80
[   26.537790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.537833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.537864]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.537893]  kthread+0x337/0x6f0
[   26.537916]  ? trace_preempt_on+0x20/0xc0
[   26.537943]  ? __pfx_kthread+0x10/0x10
[   26.537967]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.537996]  ? calculate_sigpending+0x7b/0xa0
[   26.538025]  ? __pfx_kthread+0x10/0x10
[   26.538051]  ret_from_fork+0x116/0x1d0
[   26.538072]  ? __pfx_kthread+0x10/0x10
[   26.538096]  ret_from_fork_asm+0x1a/0x30
[   26.538132]  </TASK>
[   26.538145] 
[   26.552604] Allocated by task 313:
[   26.552932]  kasan_save_stack+0x45/0x70
[   26.553307]  kasan_save_track+0x18/0x40
[   26.553649]  kasan_save_alloc_info+0x3b/0x50
[   26.554057]  __kasan_kmalloc+0xb7/0xc0
[   26.554389]  __kmalloc_cache_noprof+0x189/0x420
[   26.554774]  kasan_atomics+0x95/0x310
[   26.555177]  kunit_try_run_case+0x1a5/0x480
[   26.555983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.556255]  kthread+0x337/0x6f0
[   26.556552]  ret_from_fork+0x116/0x1d0
[   26.556714]  ret_from_fork_asm+0x1a/0x30
[   26.556924] 
[   26.557019] The buggy address belongs to the object at ffff8881059cb500
[   26.557019]  which belongs to the cache kmalloc-64 of size 64
[   26.558268] The buggy address is located 0 bytes to the right of
[   26.558268]  allocated 48-byte region [ffff8881059cb500, ffff8881059cb530)
[   26.558739] 
[   26.559399] The buggy address belongs to the physical page:
[   26.559634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   26.559916] flags: 0x200000000000000(node=0|zone=2)
[   26.560101] page_type: f5(slab)
[   26.560340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.560751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.561231] page dumped because: kasan: bad access detected
[   26.561480] 
[   26.561554] Memory state around the buggy address:
[   26.561760]  ffff8881059cb400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.562404]  ffff8881059cb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.562808] >ffff8881059cb500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.563361]                                      ^
[   26.563582]  ffff8881059cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.564122]  ffff8881059cb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.564399] ==================================================================