Hay
Date
July 9, 2025, 1:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   32.062879] ==================================================================
[   32.062936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   32.063259] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.063591] 
[   32.063705] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.063810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.064191] Hardware name: linux,dummy-virt (DT)
[   32.064260] Call trace:
[   32.064376]  show_stack+0x20/0x38 (C)
[   32.064487]  dump_stack_lvl+0x8c/0xd0
[   32.064540]  print_report+0x118/0x5d0
[   32.064695]  kasan_report+0xdc/0x128
[   32.064885]  kasan_check_range+0x100/0x1a8
[   32.064999]  __kasan_check_write+0x20/0x30
[   32.065249]  kasan_atomics_helper+0xa6c/0x4858
[   32.065479]  kasan_atomics+0x198/0x2e0
[   32.065576]  kunit_try_run_case+0x170/0x3f0
[   32.065963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.066203]  kthread+0x328/0x630
[   32.066322]  ret_from_fork+0x10/0x20
[   32.066374] 
[   32.066395] Allocated by task 297:
[   32.066631]  kasan_save_stack+0x3c/0x68
[   32.066856]  kasan_save_track+0x20/0x40
[   32.067208]  kasan_save_alloc_info+0x40/0x58
[   32.067295]  __kasan_kmalloc+0xd4/0xd8
[   32.067372]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.067619]  kasan_atomics+0xb8/0x2e0
[   32.067858]  kunit_try_run_case+0x170/0x3f0
[   32.068001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.068198]  kthread+0x328/0x630
[   32.068399]  ret_from_fork+0x10/0x20
[   32.068454] 
[   32.068634] The buggy address belongs to the object at fff00000c9c2c400
[   32.068634]  which belongs to the cache kmalloc-64 of size 64
[   32.068721] The buggy address is located 0 bytes to the right of
[   32.068721]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.068905] 
[   32.068931] The buggy address belongs to the physical page:
[   32.069304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.069387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.069439] page_type: f5(slab)
[   32.069637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.069696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.070106] page dumped because: kasan: bad access detected
[   32.070149] 
[   32.070170] Memory state around the buggy address:
[   32.070224]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.070479]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.070806] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.070963]                                      ^
[   32.071140]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.071503]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.071656] ==================================================================
[   32.405714] ==================================================================
[   32.405777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   32.406077] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.406195] 
[   32.406233] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.406519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.406648] Hardware name: linux,dummy-virt (DT)
[   32.406811] Call trace:
[   32.406848]  show_stack+0x20/0x38 (C)
[   32.407017]  dump_stack_lvl+0x8c/0xd0
[   32.407121]  print_report+0x118/0x5d0
[   32.407259]  kasan_report+0xdc/0x128
[   32.407337]  kasan_check_range+0x100/0x1a8
[   32.407392]  __kasan_check_write+0x20/0x30
[   32.407447]  kasan_atomics_helper+0x17ec/0x4858
[   32.407778]  kasan_atomics+0x198/0x2e0
[   32.407898]  kunit_try_run_case+0x170/0x3f0
[   32.407951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.408422]  kthread+0x328/0x630
[   32.408705]  ret_from_fork+0x10/0x20
[   32.408970] 
[   32.409042] Allocated by task 297:
[   32.409094]  kasan_save_stack+0x3c/0x68
[   32.410138]  kasan_save_track+0x20/0x40
[   32.410213]  kasan_save_alloc_info+0x40/0x58
[   32.410548]  __kasan_kmalloc+0xd4/0xd8
[   32.410756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.410852]  kasan_atomics+0xb8/0x2e0
[   32.411090]  kunit_try_run_case+0x170/0x3f0
[   32.411145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.411197]  kthread+0x328/0x630
[   32.411444]  ret_from_fork+0x10/0x20
[   32.411876] 
[   32.411932] The buggy address belongs to the object at fff00000c9c2c400
[   32.411932]  which belongs to the cache kmalloc-64 of size 64
[   32.411997] The buggy address is located 0 bytes to the right of
[   32.411997]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.412082] 
[   32.412105] The buggy address belongs to the physical page:
[   32.412138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.412565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.412782] page_type: f5(slab)
[   32.413066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.413352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.413617] page dumped because: kasan: bad access detected
[   32.413811] 
[   32.413902] Memory state around the buggy address:
[   32.414266]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.414415]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.414576] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.414740]                                      ^
[   32.414949]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.415259]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.415484] ==================================================================
[   32.385970] ==================================================================
[   32.386020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   32.386085] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.386137] 
[   32.386168] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.386256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.386287] Hardware name: linux,dummy-virt (DT)
[   32.386320] Call trace:
[   32.386346]  show_stack+0x20/0x38 (C)
[   32.386394]  dump_stack_lvl+0x8c/0xd0
[   32.386444]  print_report+0x118/0x5d0
[   32.386488]  kasan_report+0xdc/0x128
[   32.386534]  kasan_check_range+0x100/0x1a8
[   32.386580]  __kasan_check_write+0x20/0x30
[   32.386647]  kasan_atomics_helper+0x175c/0x4858
[   32.386698]  kasan_atomics+0x198/0x2e0
[   32.386744]  kunit_try_run_case+0x170/0x3f0
[   32.386796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.386852]  kthread+0x328/0x630
[   32.386896]  ret_from_fork+0x10/0x20
[   32.386946] 
[   32.386969] Allocated by task 297:
[   32.387016]  kasan_save_stack+0x3c/0x68
[   32.387512]  kasan_save_track+0x20/0x40
[   32.387567]  kasan_save_alloc_info+0x40/0x58
[   32.387609]  __kasan_kmalloc+0xd4/0xd8
[   32.387945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.388668]  kasan_atomics+0xb8/0x2e0
[   32.388736]  kunit_try_run_case+0x170/0x3f0
[   32.388806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.389065]  kthread+0x328/0x630
[   32.389620]  ret_from_fork+0x10/0x20
[   32.389983] 
[   32.390122] The buggy address belongs to the object at fff00000c9c2c400
[   32.390122]  which belongs to the cache kmalloc-64 of size 64
[   32.390340] The buggy address is located 0 bytes to the right of
[   32.390340]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.390738] 
[   32.390870] The buggy address belongs to the physical page:
[   32.390906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.391307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.391604] page_type: f5(slab)
[   32.391759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.392142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.392218] page dumped because: kasan: bad access detected
[   32.392438] 
[   32.392556] Memory state around the buggy address:
[   32.392644]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.392726]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.392869] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.393296]                                      ^
[   32.393375]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.393506]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.393663] ==================================================================
[   32.156261] ==================================================================
[   32.156613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   32.156718] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.156842] 
[   32.156876] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.156966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.157112] Hardware name: linux,dummy-virt (DT)
[   32.157148] Call trace:
[   32.157172]  show_stack+0x20/0x38 (C)
[   32.157483]  dump_stack_lvl+0x8c/0xd0
[   32.157794]  print_report+0x118/0x5d0
[   32.157873]  kasan_report+0xdc/0x128
[   32.157920]  kasan_check_range+0x100/0x1a8
[   32.158217]  __kasan_check_read+0x20/0x30
[   32.158356]  kasan_atomics_helper+0xdd4/0x4858
[   32.158415]  kasan_atomics+0x198/0x2e0
[   32.158649]  kunit_try_run_case+0x170/0x3f0
[   32.158828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.158896]  kthread+0x328/0x630
[   32.158940]  ret_from_fork+0x10/0x20
[   32.159318] 
[   32.159515] Allocated by task 297:
[   32.159558]  kasan_save_stack+0x3c/0x68
[   32.159622]  kasan_save_track+0x20/0x40
[   32.159748]  kasan_save_alloc_info+0x40/0x58
[   32.159792]  __kasan_kmalloc+0xd4/0xd8
[   32.159833]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.159877]  kasan_atomics+0xb8/0x2e0
[   32.160226]  kunit_try_run_case+0x170/0x3f0
[   32.160322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.160412]  kthread+0x328/0x630
[   32.160744]  ret_from_fork+0x10/0x20
[   32.160807] 
[   32.160830] The buggy address belongs to the object at fff00000c9c2c400
[   32.160830]  which belongs to the cache kmalloc-64 of size 64
[   32.161228] The buggy address is located 0 bytes to the right of
[   32.161228]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.161470] 
[   32.161500] The buggy address belongs to the physical page:
[   32.161649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.161764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.162127] page_type: f5(slab)
[   32.162183] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.162432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.162636] page dumped because: kasan: bad access detected
[   32.162698] 
[   32.162836] Memory state around the buggy address:
[   32.162931]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.163118]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.163217] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.163261]                                      ^
[   32.163295]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.163925]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.164127] ==================================================================
[   32.320659] ==================================================================
[   32.320900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   32.321316] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.321397] 
[   32.321432] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.321520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.321548] Hardware name: linux,dummy-virt (DT)
[   32.321582] Call trace:
[   32.321772]  show_stack+0x20/0x38 (C)
[   32.321836]  dump_stack_lvl+0x8c/0xd0
[   32.322202]  print_report+0x118/0x5d0
[   32.322273]  kasan_report+0xdc/0x128
[   32.322320]  kasan_check_range+0x100/0x1a8
[   32.322597]  __kasan_check_write+0x20/0x30
[   32.322843]  kasan_atomics_helper+0x14e4/0x4858
[   32.323229]  kasan_atomics+0x198/0x2e0
[   32.323302]  kunit_try_run_case+0x170/0x3f0
[   32.323592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.323886]  kthread+0x328/0x630
[   32.323940]  ret_from_fork+0x10/0x20
[   32.323990] 
[   32.324329] Allocated by task 297:
[   32.324483]  kasan_save_stack+0x3c/0x68
[   32.324570]  kasan_save_track+0x20/0x40
[   32.325102]  kasan_save_alloc_info+0x40/0x58
[   32.325203]  __kasan_kmalloc+0xd4/0xd8
[   32.325640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.325721]  kasan_atomics+0xb8/0x2e0
[   32.326087]  kunit_try_run_case+0x170/0x3f0
[   32.326271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.326404]  kthread+0x328/0x630
[   32.326550]  ret_from_fork+0x10/0x20
[   32.326905] 
[   32.326990] The buggy address belongs to the object at fff00000c9c2c400
[   32.326990]  which belongs to the cache kmalloc-64 of size 64
[   32.327229] The buggy address is located 0 bytes to the right of
[   32.327229]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.327352] 
[   32.327623] The buggy address belongs to the physical page:
[   32.328008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.328238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.328465] page_type: f5(slab)
[   32.328534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.328780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.328958] page dumped because: kasan: bad access detected
[   32.329232] 
[   32.329335] Memory state around the buggy address:
[   32.329401]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.329764]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.329930] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.330085]                                      ^
[   32.330134]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.330411]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.330559] ==================================================================
[   32.310818] ==================================================================
[   32.310886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   32.310939] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.310990] 
[   32.311424] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.311561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.311685] Hardware name: linux,dummy-virt (DT)
[   32.311726] Call trace:
[   32.311946]  show_stack+0x20/0x38 (C)
[   32.312202]  dump_stack_lvl+0x8c/0xd0
[   32.312403]  print_report+0x118/0x5d0
[   32.312666]  kasan_report+0xdc/0x128
[   32.312842]  kasan_check_range+0x100/0x1a8
[   32.312959]  __kasan_check_write+0x20/0x30
[   32.313310]  kasan_atomics_helper+0x147c/0x4858
[   32.313518]  kasan_atomics+0x198/0x2e0
[   32.313740]  kunit_try_run_case+0x170/0x3f0
[   32.313977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.314048]  kthread+0x328/0x630
[   32.314295]  ret_from_fork+0x10/0x20
[   32.314507] 
[   32.314852] Allocated by task 297:
[   32.314896]  kasan_save_stack+0x3c/0x68
[   32.315111]  kasan_save_track+0x20/0x40
[   32.315350]  kasan_save_alloc_info+0x40/0x58
[   32.315425]  __kasan_kmalloc+0xd4/0xd8
[   32.315625]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.315730]  kasan_atomics+0xb8/0x2e0
[   32.315773]  kunit_try_run_case+0x170/0x3f0
[   32.316048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.316398]  kthread+0x328/0x630
[   32.316462]  ret_from_fork+0x10/0x20
[   32.316502] 
[   32.316634] The buggy address belongs to the object at fff00000c9c2c400
[   32.316634]  which belongs to the cache kmalloc-64 of size 64
[   32.316709] The buggy address is located 0 bytes to the right of
[   32.316709]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.316929] 
[   32.316955] The buggy address belongs to the physical page:
[   32.316991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.317047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.317113] page_type: f5(slab)
[   32.317391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.317725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.317974] page dumped because: kasan: bad access detected
[   32.318453] 
[   32.318861] Memory state around the buggy address:
[   32.319008]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.319206]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.319310] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.319689]                                      ^
[   32.319988]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.320241]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.320316] ==================================================================
[   32.244529] ==================================================================
[   32.244591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   32.244643] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.244695] 
[   32.244920] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.245155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.245351] Hardware name: linux,dummy-virt (DT)
[   32.245452] Call trace:
[   32.245511]  show_stack+0x20/0x38 (C)
[   32.245572]  dump_stack_lvl+0x8c/0xd0
[   32.245796]  print_report+0x118/0x5d0
[   32.246108]  kasan_report+0xdc/0x128
[   32.246178]  kasan_check_range+0x100/0x1a8
[   32.246226]  __kasan_check_write+0x20/0x30
[   32.246453]  kasan_atomics_helper+0x1128/0x4858
[   32.246548]  kasan_atomics+0x198/0x2e0
[   32.246867]  kunit_try_run_case+0x170/0x3f0
[   32.246942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.247148]  kthread+0x328/0x630
[   32.247211]  ret_from_fork+0x10/0x20
[   32.247261] 
[   32.247590] Allocated by task 297:
[   32.247653]  kasan_save_stack+0x3c/0x68
[   32.247923]  kasan_save_track+0x20/0x40
[   32.248162]  kasan_save_alloc_info+0x40/0x58
[   32.248291]  __kasan_kmalloc+0xd4/0xd8
[   32.248377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.248596]  kasan_atomics+0xb8/0x2e0
[   32.248662]  kunit_try_run_case+0x170/0x3f0
[   32.248851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.248914]  kthread+0x328/0x630
[   32.249162]  ret_from_fork+0x10/0x20
[   32.249313] 
[   32.249614] The buggy address belongs to the object at fff00000c9c2c400
[   32.249614]  which belongs to the cache kmalloc-64 of size 64
[   32.249778] The buggy address is located 0 bytes to the right of
[   32.249778]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.250047] 
[   32.250233] The buggy address belongs to the physical page:
[   32.250598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.250678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.250730] page_type: f5(slab)
[   32.251089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.251187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.251371] page dumped because: kasan: bad access detected
[   32.251612] 
[   32.251773] Memory state around the buggy address:
[   32.251858]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.251937]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.252361] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.252481]                                      ^
[   32.252546]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.252688]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.252751] ==================================================================
[   32.174001] ==================================================================
[   32.174070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   32.174124] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.174498] 
[   32.174543] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.174867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.175070] Hardware name: linux,dummy-virt (DT)
[   32.175267] Call trace:
[   32.175302]  show_stack+0x20/0x38 (C)
[   32.175769]  dump_stack_lvl+0x8c/0xd0
[   32.175854]  print_report+0x118/0x5d0
[   32.175935]  kasan_report+0xdc/0x128
[   32.176318]  kasan_check_range+0x100/0x1a8
[   32.176559]  __kasan_check_write+0x20/0x30
[   32.176782]  kasan_atomics_helper+0xe44/0x4858
[   32.176948]  kasan_atomics+0x198/0x2e0
[   32.177264]  kunit_try_run_case+0x170/0x3f0
[   32.177446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.177541]  kthread+0x328/0x630
[   32.177906]  ret_from_fork+0x10/0x20
[   32.178179] 
[   32.178496] Allocated by task 297:
[   32.178550]  kasan_save_stack+0x3c/0x68
[   32.178641]  kasan_save_track+0x20/0x40
[   32.178683]  kasan_save_alloc_info+0x40/0x58
[   32.179159]  __kasan_kmalloc+0xd4/0xd8
[   32.179480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.179592]  kasan_atomics+0xb8/0x2e0
[   32.179793]  kunit_try_run_case+0x170/0x3f0
[   32.180028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.180266]  kthread+0x328/0x630
[   32.180469]  ret_from_fork+0x10/0x20
[   32.180709] 
[   32.180754] The buggy address belongs to the object at fff00000c9c2c400
[   32.180754]  which belongs to the cache kmalloc-64 of size 64
[   32.181139] The buggy address is located 0 bytes to the right of
[   32.181139]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.181279] 
[   32.181367] The buggy address belongs to the physical page:
[   32.181682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.181933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.182040] page_type: f5(slab)
[   32.182212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.182361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.182547] page dumped because: kasan: bad access detected
[   32.182775] 
[   32.182897] Memory state around the buggy address:
[   32.183076]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.183141]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.183223] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.183348]                                      ^
[   32.183384]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183838]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183924] ==================================================================
[   32.253497] ==================================================================
[   32.253550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   32.253685] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.253764] 
[   32.253797] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.253885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.253920] Hardware name: linux,dummy-virt (DT)
[   32.253965] Call trace:
[   32.253991]  show_stack+0x20/0x38 (C)
[   32.254041]  dump_stack_lvl+0x8c/0xd0
[   32.254111]  print_report+0x118/0x5d0
[   32.254157]  kasan_report+0xdc/0x128
[   32.254208]  kasan_check_range+0x100/0x1a8
[   32.254266]  __kasan_check_write+0x20/0x30
[   32.254314]  kasan_atomics_helper+0x1190/0x4858
[   32.254364]  kasan_atomics+0x198/0x2e0
[   32.254420]  kunit_try_run_case+0x170/0x3f0
[   32.254472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.254532]  kthread+0x328/0x630
[   32.254582]  ret_from_fork+0x10/0x20
[   32.254632] 
[   32.254653] Allocated by task 297:
[   32.254689]  kasan_save_stack+0x3c/0x68
[   32.254734]  kasan_save_track+0x20/0x40
[   32.254773]  kasan_save_alloc_info+0x40/0x58
[   32.254823]  __kasan_kmalloc+0xd4/0xd8
[   32.254864]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.254906]  kasan_atomics+0xb8/0x2e0
[   32.254953]  kunit_try_run_case+0x170/0x3f0
[   32.254995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.255044]  kthread+0x328/0x630
[   32.255089]  ret_from_fork+0x10/0x20
[   32.255173] 
[   32.255198] The buggy address belongs to the object at fff00000c9c2c400
[   32.255198]  which belongs to the cache kmalloc-64 of size 64
[   32.255977] The buggy address is located 0 bytes to the right of
[   32.255977]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.256107] 
[   32.256151] The buggy address belongs to the physical page:
[   32.256203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.256463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.256521] page_type: f5(slab)
[   32.256561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.256703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.256909] page dumped because: kasan: bad access detected
[   32.257111] 
[   32.257208] Memory state around the buggy address:
[   32.257474]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.257637]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.258138] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.258250]                                      ^
[   32.258318]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.258458]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.258519] ==================================================================
[   32.210459] ==================================================================
[   32.210516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   32.210568] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.210934] 
[   32.210987] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.211113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.211182] Hardware name: linux,dummy-virt (DT)
[   32.211241] Call trace:
[   32.211320]  show_stack+0x20/0x38 (C)
[   32.211375]  dump_stack_lvl+0x8c/0xd0
[   32.211422]  print_report+0x118/0x5d0
[   32.211781]  kasan_report+0xdc/0x128
[   32.212085]  kasan_check_range+0x100/0x1a8
[   32.212360]  __kasan_check_write+0x20/0x30
[   32.212450]  kasan_atomics_helper+0xf88/0x4858
[   32.212741]  kasan_atomics+0x198/0x2e0
[   32.212945]  kunit_try_run_case+0x170/0x3f0
[   32.213002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.213273]  kthread+0x328/0x630
[   32.213663]  ret_from_fork+0x10/0x20
[   32.213838] 
[   32.213890] Allocated by task 297:
[   32.214189]  kasan_save_stack+0x3c/0x68
[   32.214515]  kasan_save_track+0x20/0x40
[   32.214660]  kasan_save_alloc_info+0x40/0x58
[   32.214833]  __kasan_kmalloc+0xd4/0xd8
[   32.214942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.215330]  kasan_atomics+0xb8/0x2e0
[   32.215435]  kunit_try_run_case+0x170/0x3f0
[   32.215540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.215862]  kthread+0x328/0x630
[   32.215910]  ret_from_fork+0x10/0x20
[   32.215959] 
[   32.215982] The buggy address belongs to the object at fff00000c9c2c400
[   32.215982]  which belongs to the cache kmalloc-64 of size 64
[   32.216044] The buggy address is located 0 bytes to the right of
[   32.216044]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.216687] 
[   32.216776] The buggy address belongs to the physical page:
[   32.216880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.217289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.217663] page_type: f5(slab)
[   32.217789] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.217970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.218202] page dumped because: kasan: bad access detected
[   32.218283] 
[   32.218338] Memory state around the buggy address:
[   32.218694]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.218754]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.218863] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.218905]                                      ^
[   32.218942]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.219313]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.219511] ==================================================================
[   32.268405] ==================================================================
[   32.268457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   32.268618] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.268677] 
[   32.268707] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.269212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.269299] Hardware name: linux,dummy-virt (DT)
[   32.269336] Call trace:
[   32.269372]  show_stack+0x20/0x38 (C)
[   32.269426]  dump_stack_lvl+0x8c/0xd0
[   32.269655]  print_report+0x118/0x5d0
[   32.269716]  kasan_report+0xdc/0x128
[   32.269853]  kasan_check_range+0x100/0x1a8
[   32.269907]  __kasan_check_write+0x20/0x30
[   32.269954]  kasan_atomics_helper+0x126c/0x4858
[   32.270013]  kasan_atomics+0x198/0x2e0
[   32.270193]  kunit_try_run_case+0x170/0x3f0
[   32.270391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.270691]  kthread+0x328/0x630
[   32.270829]  ret_from_fork+0x10/0x20
[   32.270888] 
[   32.270910] Allocated by task 297:
[   32.270984]  kasan_save_stack+0x3c/0x68
[   32.271223]  kasan_save_track+0x20/0x40
[   32.271375]  kasan_save_alloc_info+0x40/0x58
[   32.271555]  __kasan_kmalloc+0xd4/0xd8
[   32.271610]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.271916]  kasan_atomics+0xb8/0x2e0
[   32.272161]  kunit_try_run_case+0x170/0x3f0
[   32.272279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.272549]  kthread+0x328/0x630
[   32.272716]  ret_from_fork+0x10/0x20
[   32.272763] 
[   32.272793] The buggy address belongs to the object at fff00000c9c2c400
[   32.272793]  which belongs to the cache kmalloc-64 of size 64
[   32.272855] The buggy address is located 0 bytes to the right of
[   32.272855]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.272954] 
[   32.272986] The buggy address belongs to the physical page:
[   32.273034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.273130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.273191] page_type: f5(slab)
[   32.273239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.273299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.273343] page dumped because: kasan: bad access detected
[   32.273391] 
[   32.273422] Memory state around the buggy address:
[   32.273461]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273507]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273563] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.273604]                                      ^
[   32.273639]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273685]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273735] ==================================================================
[   32.052579] ==================================================================
[   32.052621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   32.052670] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.052722] 
[   32.052754] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.052842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.052891] Hardware name: linux,dummy-virt (DT)
[   32.053847]  print_report+0x118/0x5d0
[   32.055333]  kthread+0x328/0x630
[   32.056193]  kasan_save_stack+0x3c/0x68
[   32.057305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.058273] The buggy address is located 0 bytes to the right of
[   32.058273]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.058360] 
[   32.058535] The buggy address belongs to the physical page:
[   32.058673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.059196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.059529] page_type: f5(slab)
[   32.059941] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.060048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.060174] page dumped because: kasan: bad access detected
[   32.060264] 
[   32.060436] Memory state around the buggy address:
[   32.060543]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.060631]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.060767] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.060894]                                      ^
[   32.060960]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.061127]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.061174] ==================================================================
[   32.150192] ==================================================================
[   32.150248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   32.150314] Read of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.150367] 
[   32.150400] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.150488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.150517] Hardware name: linux,dummy-virt (DT)
[   32.150549] Call trace:
[   32.150575]  show_stack+0x20/0x38 (C)
[   32.150634]  dump_stack_lvl+0x8c/0xd0
[   32.150699]  print_report+0x118/0x5d0
[   32.150747]  kasan_report+0xdc/0x128
[   32.150792]  __asan_report_load4_noabort+0x20/0x30
[   32.150843]  kasan_atomics_helper+0x3e04/0x4858
[   32.150896]  kasan_atomics+0x198/0x2e0
[   32.150945]  kunit_try_run_case+0x170/0x3f0
[   32.150996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.151072]  kthread+0x328/0x630
[   32.151118]  ret_from_fork+0x10/0x20
[   32.151181] 
[   32.151202] Allocated by task 297:
[   32.151233]  kasan_save_stack+0x3c/0x68
[   32.151275]  kasan_save_track+0x20/0x40
[   32.151317]  kasan_save_alloc_info+0x40/0x58
[   32.151359]  __kasan_kmalloc+0xd4/0xd8
[   32.151400]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.151443]  kasan_atomics+0xb8/0x2e0
[   32.151482]  kunit_try_run_case+0x170/0x3f0
[   32.151524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.151579]  kthread+0x328/0x630
[   32.151623]  ret_from_fork+0x10/0x20
[   32.152076] 
[   32.152106] The buggy address belongs to the object at fff00000c9c2c400
[   32.152106]  which belongs to the cache kmalloc-64 of size 64
[   32.152617] The buggy address is located 0 bytes to the right of
[   32.152617]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.152715] 
[   32.152757] The buggy address belongs to the physical page:
[   32.152811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.152888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.153162] page_type: f5(slab)
[   32.153214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.153476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.153837] page dumped because: kasan: bad access detected
[   32.154139] 
[   32.154263] Memory state around the buggy address:
[   32.154342]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.154409]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.154737] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.154931]                                      ^
[   32.155177]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.155429]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.155518] ==================================================================
[   32.286454] ==================================================================
[   32.286678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   32.286902] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.286968] 
[   32.287061] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.287157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.287193] Hardware name: linux,dummy-virt (DT)
[   32.287237] Call trace:
[   32.287264]  show_stack+0x20/0x38 (C)
[   32.287316]  dump_stack_lvl+0x8c/0xd0
[   32.287374]  print_report+0x118/0x5d0
[   32.287420]  kasan_report+0xdc/0x128
[   32.287473]  kasan_check_range+0x100/0x1a8
[   32.287521]  __kasan_check_write+0x20/0x30
[   32.287568]  kasan_atomics_helper+0x1384/0x4858
[   32.287619]  kasan_atomics+0x198/0x2e0
[   32.288100]  kunit_try_run_case+0x170/0x3f0
[   32.288518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.288592]  kthread+0x328/0x630
[   32.288648]  ret_from_fork+0x10/0x20
[   32.289041] 
[   32.289349] Allocated by task 297:
[   32.289403]  kasan_save_stack+0x3c/0x68
[   32.289613]  kasan_save_track+0x20/0x40
[   32.289861]  kasan_save_alloc_info+0x40/0x58
[   32.290118]  __kasan_kmalloc+0xd4/0xd8
[   32.290205]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.290398]  kasan_atomics+0xb8/0x2e0
[   32.290494]  kunit_try_run_case+0x170/0x3f0
[   32.290765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.290936]  kthread+0x328/0x630
[   32.291423]  ret_from_fork+0x10/0x20
[   32.291500] 
[   32.291554] The buggy address belongs to the object at fff00000c9c2c400
[   32.291554]  which belongs to the cache kmalloc-64 of size 64
[   32.291646] The buggy address is located 0 bytes to the right of
[   32.291646]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.292128] 
[   32.292164] The buggy address belongs to the physical page:
[   32.292348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.292505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.292688] page_type: f5(slab)
[   32.293329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.293430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.293818] page dumped because: kasan: bad access detected
[   32.294000] 
[   32.294203] Memory state around the buggy address:
[   32.294380]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.294580]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.294719] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.294797]                                      ^
[   32.294966]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.295047]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.295145] ==================================================================
[   32.194295] ==================================================================
[   32.194389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   32.194497] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.194562] 
[   32.194859] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.195083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.195161] Hardware name: linux,dummy-virt (DT)
[   32.195199] Call trace:
[   32.195224]  show_stack+0x20/0x38 (C)
[   32.195429]  dump_stack_lvl+0x8c/0xd0
[   32.195502]  print_report+0x118/0x5d0
[   32.195568]  kasan_report+0xdc/0x128
[   32.195613]  kasan_check_range+0x100/0x1a8
[   32.195758]  __kasan_check_write+0x20/0x30
[   32.196109]  kasan_atomics_helper+0xeb8/0x4858
[   32.196589]  kasan_atomics+0x198/0x2e0
[   32.196656]  kunit_try_run_case+0x170/0x3f0
[   32.196993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.197432]  kthread+0x328/0x630
[   32.197492]  ret_from_fork+0x10/0x20
[   32.197858] 
[   32.198206] Allocated by task 297:
[   32.198320]  kasan_save_stack+0x3c/0x68
[   32.198449]  kasan_save_track+0x20/0x40
[   32.198598]  kasan_save_alloc_info+0x40/0x58
[   32.198641]  __kasan_kmalloc+0xd4/0xd8
[   32.198961]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.199330]  kasan_atomics+0xb8/0x2e0
[   32.199753]  kunit_try_run_case+0x170/0x3f0
[   32.199825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.200015]  kthread+0x328/0x630
[   32.200452]  ret_from_fork+0x10/0x20
[   32.200555] 
[   32.200922] The buggy address belongs to the object at fff00000c9c2c400
[   32.200922]  which belongs to the cache kmalloc-64 of size 64
[   32.200999] The buggy address is located 0 bytes to the right of
[   32.200999]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.201114] 
[   32.201138] The buggy address belongs to the physical page:
[   32.201193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.201248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.201297] page_type: f5(slab)
[   32.201339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.201403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.201466] page dumped because: kasan: bad access detected
[   32.201501] 
[   32.201530] Memory state around the buggy address:
[   32.201565]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.201610]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.201660] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.201701]                                      ^
[   32.201737]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.201781]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.201837] ==================================================================
[   32.228261] ==================================================================
[   32.228310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   32.228361] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.228413] 
[   32.228467] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.228565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.228593] Hardware name: linux,dummy-virt (DT)
[   32.228635] Call trace:
[   32.228665]  show_stack+0x20/0x38 (C)
[   32.228713]  dump_stack_lvl+0x8c/0xd0
[   32.228763]  print_report+0x118/0x5d0
[   32.228807]  kasan_report+0xdc/0x128
[   32.228853]  kasan_check_range+0x100/0x1a8
[   32.228898]  __kasan_check_write+0x20/0x30
[   32.228944]  kasan_atomics_helper+0x1058/0x4858
[   32.229003]  kasan_atomics+0x198/0x2e0
[   32.229064]  kunit_try_run_case+0x170/0x3f0
[   32.229289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.229366]  kthread+0x328/0x630
[   32.229411]  ret_from_fork+0x10/0x20
[   32.229460] 
[   32.229481] Allocated by task 297:
[   32.230204]  kasan_save_stack+0x3c/0x68
[   32.230274]  kasan_save_track+0x20/0x40
[   32.230495]  kasan_save_alloc_info+0x40/0x58
[   32.230555]  __kasan_kmalloc+0xd4/0xd8
[   32.230680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.230809]  kasan_atomics+0xb8/0x2e0
[   32.230879]  kunit_try_run_case+0x170/0x3f0
[   32.230922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.231262]  kthread+0x328/0x630
[   32.231324]  ret_from_fork+0x10/0x20
[   32.231713] 
[   32.231860] The buggy address belongs to the object at fff00000c9c2c400
[   32.231860]  which belongs to the cache kmalloc-64 of size 64
[   32.231949] The buggy address is located 0 bytes to the right of
[   32.231949]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.232312] 
[   32.232411] The buggy address belongs to the physical page:
[   32.232466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.232532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.232900] page_type: f5(slab)
[   32.232958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.233205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.233419] page dumped because: kasan: bad access detected
[   32.233519] 
[   32.233692] Memory state around the buggy address:
[   32.233945]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.234111]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.234215] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.234405]                                      ^
[   32.234481]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.234976]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235194] ==================================================================
[   32.347452] ==================================================================
[   32.347506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   32.347560] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.347768] 
[   32.347976] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.348443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.348484] Hardware name: linux,dummy-virt (DT)
[   32.348519] Call trace:
[   32.348754]  show_stack+0x20/0x38 (C)
[   32.348895]  dump_stack_lvl+0x8c/0xd0
[   32.349005]  print_report+0x118/0x5d0
[   32.349380]  kasan_report+0xdc/0x128
[   32.349502]  __asan_report_load8_noabort+0x20/0x30
[   32.349671]  kasan_atomics_helper+0x3db0/0x4858
[   32.349859]  kasan_atomics+0x198/0x2e0
[   32.350195]  kunit_try_run_case+0x170/0x3f0
[   32.350448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.350848]  kthread+0x328/0x630
[   32.350968]  ret_from_fork+0x10/0x20
[   32.351024] 
[   32.351047] Allocated by task 297:
[   32.351622]  kasan_save_stack+0x3c/0x68
[   32.351829]  kasan_save_track+0x20/0x40
[   32.351917]  kasan_save_alloc_info+0x40/0x58
[   32.351977]  __kasan_kmalloc+0xd4/0xd8
[   32.352017]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.352427]  kasan_atomics+0xb8/0x2e0
[   32.352541]  kunit_try_run_case+0x170/0x3f0
[   32.352941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.353079]  kthread+0x328/0x630
[   32.353194]  ret_from_fork+0x10/0x20
[   32.353235] 
[   32.353257] The buggy address belongs to the object at fff00000c9c2c400
[   32.353257]  which belongs to the cache kmalloc-64 of size 64
[   32.353470] The buggy address is located 0 bytes to the right of
[   32.353470]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.353635] 
[   32.353682] The buggy address belongs to the physical page:
[   32.353717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.353783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.353840] page_type: f5(slab)
[   32.353904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.353970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.354040] page dumped because: kasan: bad access detected
[   32.354087] 
[   32.354123] Memory state around the buggy address:
[   32.354155]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.354224]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.354280] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.354330]                                      ^
[   32.354365]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.354411]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.354453] ==================================================================
[   32.202203] ==================================================================
[   32.202254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   32.202304] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.202357] 
[   32.202407] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.202505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.202534] Hardware name: linux,dummy-virt (DT)
[   32.202567] Call trace:
[   32.202591]  show_stack+0x20/0x38 (C)
[   32.202638]  dump_stack_lvl+0x8c/0xd0
[   32.202690]  print_report+0x118/0x5d0
[   32.202739]  kasan_report+0xdc/0x128
[   32.202784]  kasan_check_range+0x100/0x1a8
[   32.202832]  __kasan_check_write+0x20/0x30
[   32.202889]  kasan_atomics_helper+0xf20/0x4858
[   32.202940]  kasan_atomics+0x198/0x2e0
[   32.202989]  kunit_try_run_case+0x170/0x3f0
[   32.203045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.203561]  kthread+0x328/0x630
[   32.204128]  ret_from_fork+0x10/0x20
[   32.204236] 
[   32.204290] Allocated by task 297:
[   32.204356]  kasan_save_stack+0x3c/0x68
[   32.204436]  kasan_save_track+0x20/0x40
[   32.204766]  kasan_save_alloc_info+0x40/0x58
[   32.204902]  __kasan_kmalloc+0xd4/0xd8
[   32.204957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.205000]  kasan_atomics+0xb8/0x2e0
[   32.205040]  kunit_try_run_case+0x170/0x3f0
[   32.205098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.205571]  kthread+0x328/0x630
[   32.205846]  ret_from_fork+0x10/0x20
[   32.206394] 
[   32.206504] The buggy address belongs to the object at fff00000c9c2c400
[   32.206504]  which belongs to the cache kmalloc-64 of size 64
[   32.206768] The buggy address is located 0 bytes to the right of
[   32.206768]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.207044] 
[   32.207140] The buggy address belongs to the physical page:
[   32.207473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.207790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.207895] page_type: f5(slab)
[   32.207944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.208278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.208350] page dumped because: kasan: bad access detected
[   32.208476] 
[   32.208558] Memory state around the buggy address:
[   32.208743]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.208828]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.209165] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.209349]                                      ^
[   32.209501]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.209549]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.209590] ==================================================================
[   32.331254] ==================================================================
[   32.331335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   32.331408] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.331463] 
[   32.331647] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.331887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.332268] Hardware name: linux,dummy-virt (DT)
[   32.332430] Call trace:
[   32.332515]  show_stack+0x20/0x38 (C)
[   32.332724]  dump_stack_lvl+0x8c/0xd0
[   32.332948]  print_report+0x118/0x5d0
[   32.333028]  kasan_report+0xdc/0x128
[   32.333252]  kasan_check_range+0x100/0x1a8
[   32.333311]  __kasan_check_write+0x20/0x30
[   32.333524]  kasan_atomics_helper+0x154c/0x4858
[   32.333995]  kasan_atomics+0x198/0x2e0
[   32.334110]  kunit_try_run_case+0x170/0x3f0
[   32.334165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.334236]  kthread+0x328/0x630
[   32.334282]  ret_from_fork+0x10/0x20
[   32.334332] 
[   32.334355] Allocated by task 297:
[   32.334384]  kasan_save_stack+0x3c/0x68
[   32.334519]  kasan_save_track+0x20/0x40
[   32.334567]  kasan_save_alloc_info+0x40/0x58
[   32.334607]  __kasan_kmalloc+0xd4/0xd8
[   32.334659]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.334711]  kasan_atomics+0xb8/0x2e0
[   32.334760]  kunit_try_run_case+0x170/0x3f0
[   32.334811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.334868]  kthread+0x328/0x630
[   32.334911]  ret_from_fork+0x10/0x20
[   32.334950] 
[   32.334978] The buggy address belongs to the object at fff00000c9c2c400
[   32.334978]  which belongs to the cache kmalloc-64 of size 64
[   32.335039] The buggy address is located 0 bytes to the right of
[   32.335039]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.335117] 
[   32.335148] The buggy address belongs to the physical page:
[   32.335183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.335246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.335315] page_type: f5(slab)
[   32.335364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.335416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.335460] page dumped because: kasan: bad access detected
[   32.335495] 
[   32.335515] Memory state around the buggy address:
[   32.335549]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.335595]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.336001] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.336527]                                      ^
[   32.336576]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.336626]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.336667] ==================================================================
[   32.236061] ==================================================================
[   32.236317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   32.236670] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.236864] 
[   32.236952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.237143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.237214] Hardware name: linux,dummy-virt (DT)
[   32.237250] Call trace:
[   32.237276]  show_stack+0x20/0x38 (C)
[   32.237328]  dump_stack_lvl+0x8c/0xd0
[   32.237545]  print_report+0x118/0x5d0
[   32.237905]  kasan_report+0xdc/0x128
[   32.238092]  kasan_check_range+0x100/0x1a8
[   32.238153]  __kasan_check_write+0x20/0x30
[   32.238229]  kasan_atomics_helper+0x10c0/0x4858
[   32.238423]  kasan_atomics+0x198/0x2e0
[   32.238502]  kunit_try_run_case+0x170/0x3f0
[   32.238555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.238797]  kthread+0x328/0x630
[   32.239155]  ret_from_fork+0x10/0x20
[   32.239369] 
[   32.239415] Allocated by task 297:
[   32.239448]  kasan_save_stack+0x3c/0x68
[   32.239854]  kasan_save_track+0x20/0x40
[   32.239938]  kasan_save_alloc_info+0x40/0x58
[   32.240377]  __kasan_kmalloc+0xd4/0xd8
[   32.240589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.240641]  kasan_atomics+0xb8/0x2e0
[   32.240702]  kunit_try_run_case+0x170/0x3f0
[   32.240752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.241087]  kthread+0x328/0x630
[   32.241347]  ret_from_fork+0x10/0x20
[   32.241687] 
[   32.242163] The buggy address belongs to the object at fff00000c9c2c400
[   32.242163]  which belongs to the cache kmalloc-64 of size 64
[   32.242234] The buggy address is located 0 bytes to the right of
[   32.242234]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.242537] 
[   32.242602] The buggy address belongs to the physical page:
[   32.242719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.242780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.242828] page_type: f5(slab)
[   32.242895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.242956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.243010] page dumped because: kasan: bad access detected
[   32.243044] 
[   32.243086] Memory state around the buggy address:
[   32.243129]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.243177]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.243222] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.243263]                                      ^
[   32.243299]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.243357]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.243397] ==================================================================
[   32.165434] ==================================================================
[   32.165588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   32.165649] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.165702] 
[   32.165795] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.165915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.166133] Hardware name: linux,dummy-virt (DT)
[   32.166323] Call trace:
[   32.166398]  show_stack+0x20/0x38 (C)
[   32.166463]  dump_stack_lvl+0x8c/0xd0
[   32.166705]  print_report+0x118/0x5d0
[   32.166861]  kasan_report+0xdc/0x128
[   32.166918]  __asan_report_load8_noabort+0x20/0x30
[   32.167205]  kasan_atomics_helper+0x3f58/0x4858
[   32.167283]  kasan_atomics+0x198/0x2e0
[   32.167679]  kunit_try_run_case+0x170/0x3f0
[   32.167759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.168000]  kthread+0x328/0x630
[   32.168198]  ret_from_fork+0x10/0x20
[   32.168546] 
[   32.168636] Allocated by task 297:
[   32.168712]  kasan_save_stack+0x3c/0x68
[   32.169117]  kasan_save_track+0x20/0x40
[   32.169199]  kasan_save_alloc_info+0x40/0x58
[   32.169405]  __kasan_kmalloc+0xd4/0xd8
[   32.169590]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.169748]  kasan_atomics+0xb8/0x2e0
[   32.169818]  kunit_try_run_case+0x170/0x3f0
[   32.169879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.169928]  kthread+0x328/0x630
[   32.170150]  ret_from_fork+0x10/0x20
[   32.170354] 
[   32.170399] The buggy address belongs to the object at fff00000c9c2c400
[   32.170399]  which belongs to the cache kmalloc-64 of size 64
[   32.170490] The buggy address is located 0 bytes to the right of
[   32.170490]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.170689] 
[   32.170717] The buggy address belongs to the physical page:
[   32.171100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.171301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.171605] page_type: f5(slab)
[   32.171881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.172146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.172311] page dumped because: kasan: bad access detected
[   32.172381] 
[   32.172549] Memory state around the buggy address:
[   32.172614]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.172799]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.172980] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.173138]                                      ^
[   32.173186]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.173233]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.173274] ==================================================================
[   32.073012] ==================================================================
[   32.073086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   32.073142] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.073242] 
[   32.073275] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.073854]  kasan_atomics+0x198/0x2e0
[   32.074279]  kasan_save_alloc_info+0x40/0x58
[   32.074718] The buggy address is located 0 bytes to the right of
[   32.074718]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.074791] 
[   32.074814] The buggy address belongs to the physical page:
[   32.074856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.074909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.074956] page_type: f5(slab)
[   32.074997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.075050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.075490] page dumped because: kasan: bad access detected
[   32.075528] 
[   32.075947] Memory state around the buggy address:
[   32.076185]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.076343]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.076822]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.079114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.080125]  kasan_atomics+0x198/0x2e0
[   32.082307]  kasan_atomics+0xb8/0x2e0
[   32.083667] 
[   32.083703] The buggy address belongs to the physical page:
[   32.084243] page_type: f5(slab)
[   32.085045]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.085623]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.087527] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.089319]  kasan_check_range+0x100/0x1a8
[   32.090154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.091446]  __kasan_kmalloc+0xd4/0xd8
[   32.092345]  ret_from_fork+0x10/0x20
[   32.093213] The buggy address belongs to the physical page:
[   32.093265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.093923] page dumped because: kasan: bad access detected
[   32.094764] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.095245] ==================================================================
[   32.048570] ==================================================================
[   32.048628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   32.048877] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.049110] 
[   32.049156] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.049311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.049344] Hardware name: linux,dummy-virt (DT)
[   32.049443] Call trace:
[   32.049535]  show_stack+0x20/0x38 (C)
[   32.049593]  dump_stack_lvl+0x8c/0xd0
[   32.049642]  print_report+0x118/0x5d0
[   32.049836]  kasan_report+0xdc/0x128
[   32.049880]  kasan_check_range+0x100/0x1a8
[   32.050071]  __kasan_check_write+0x20/0x30
[   32.050236]  kasan_atomics_helper+0x99c/0x4858
[   32.050297]  kasan_atomics+0x198/0x2e0
[   32.050491]  kunit_try_run_case+0x170/0x3f0
[   32.050549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.050643]  kthread+0x328/0x630
[   32.050686]  ret_from_fork+0x10/0x20
[   32.050945] 
[   32.050981] Allocated by task 297:
[   32.051013]  kasan_save_stack+0x3c/0x68
[   32.051076]  kasan_save_track+0x20/0x40
[   32.051117]  kasan_save_alloc_info+0x40/0x58
[   32.051157]  __kasan_kmalloc+0xd4/0xd8
[   32.051197]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.051237]  kasan_atomics+0xb8/0x2e0
[   32.051423]  kunit_try_run_case+0x170/0x3f0
[   32.051478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.051524]  kthread+0x328/0x630
[   32.051559]  ret_from_fork+0x10/0x20
[   32.051601] 
[   32.051625] The buggy address belongs to the object at fff00000c9c2c400
[   32.051625]  which belongs to the cache kmalloc-64 of size 64
[   32.051684] The buggy address is located 0 bytes to the right of
[   32.051684]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.051749] 
[   32.051785] The buggy address belongs to the physical page:
[   32.051829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.051881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.051931] page_type: f5(slab)
[   32.051973] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.052028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.052084] page dumped because: kasan: bad access detected
[   32.052128] 
[   32.052156] Memory state around the buggy address:
[   32.052200]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.052247]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.052293] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.052334]                                      ^
[   32.052370]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.052416]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.052458] ==================================================================
[   32.259350] ==================================================================
[   32.259415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   32.259578] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.259635] 
[   32.259689] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.259858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.259888] Hardware name: linux,dummy-virt (DT)
[   32.259920] Call trace:
[   32.259945]  show_stack+0x20/0x38 (C)
[   32.260305]  dump_stack_lvl+0x8c/0xd0
[   32.260495]  print_report+0x118/0x5d0
[   32.260670]  kasan_report+0xdc/0x128
[   32.260775]  kasan_check_range+0x100/0x1a8
[   32.260958]  __kasan_check_write+0x20/0x30
[   32.261143]  kasan_atomics_helper+0x11f8/0x4858
[   32.261213]  kasan_atomics+0x198/0x2e0
[   32.261285]  kunit_try_run_case+0x170/0x3f0
[   32.261498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.261805]  kthread+0x328/0x630
[   32.261985]  ret_from_fork+0x10/0x20
[   32.262156] 
[   32.262184] Allocated by task 297:
[   32.262215]  kasan_save_stack+0x3c/0x68
[   32.262293]  kasan_save_track+0x20/0x40
[   32.262635]  kasan_save_alloc_info+0x40/0x58
[   32.263039]  __kasan_kmalloc+0xd4/0xd8
[   32.263110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.263283]  kasan_atomics+0xb8/0x2e0
[   32.263376]  kunit_try_run_case+0x170/0x3f0
[   32.263538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.263882]  kthread+0x328/0x630
[   32.263964]  ret_from_fork+0x10/0x20
[   32.264019] 
[   32.264041] The buggy address belongs to the object at fff00000c9c2c400
[   32.264041]  which belongs to the cache kmalloc-64 of size 64
[   32.264115] The buggy address is located 0 bytes to the right of
[   32.264115]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.264182] 
[   32.264676] The buggy address belongs to the physical page:
[   32.264985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.265163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.265483] page_type: f5(slab)
[   32.265719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.266137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.266245] page dumped because: kasan: bad access detected
[   32.266316] 
[   32.266396] Memory state around the buggy address:
[   32.266516]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.266890]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.266974] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.267085]                                      ^
[   32.267152]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.267506]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.267601] ==================================================================
[   32.131407] ==================================================================
[   32.131470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   32.131644] Read of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.131871] 
[   32.131935] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.132421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.132458] Hardware name: linux,dummy-virt (DT)
[   32.132763] Call trace:
[   32.132812]  show_stack+0x20/0x38 (C)
[   32.132878]  dump_stack_lvl+0x8c/0xd0
[   32.132952]  print_report+0x118/0x5d0
[   32.133000]  kasan_report+0xdc/0x128
[   32.133047]  __asan_report_load4_noabort+0x20/0x30
[   32.133169]  kasan_atomics_helper+0x3dd8/0x4858
[   32.133225]  kasan_atomics+0x198/0x2e0
[   32.133274]  kunit_try_run_case+0x170/0x3f0
[   32.133324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.133400]  kthread+0x328/0x630
[   32.133444]  ret_from_fork+0x10/0x20
[   32.133504] 
[   32.133531] Allocated by task 297:
[   32.133571]  kasan_save_stack+0x3c/0x68
[   32.133616]  kasan_save_track+0x20/0x40
[   32.133674]  kasan_save_alloc_info+0x40/0x58
[   32.133714]  __kasan_kmalloc+0xd4/0xd8
[   32.133766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.133818]  kasan_atomics+0xb8/0x2e0
[   32.133866]  kunit_try_run_case+0x170/0x3f0
[   32.133907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.133954]  kthread+0x328/0x630
[   32.133994]  ret_from_fork+0x10/0x20
[   32.134062] 
[   32.134999] The buggy address belongs to the object at fff00000c9c2c400
[   32.134999]  which belongs to the cache kmalloc-64 of size 64
[   32.135299] The buggy address is located 0 bytes to the right of
[   32.135299]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.135470] 
[   32.135754] The buggy address belongs to the physical page:
[   32.135857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.136029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.136390] page_type: f5(slab)
[   32.136446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.136711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.136909] page dumped because: kasan: bad access detected
[   32.137089] 
[   32.137181] Memory state around the buggy address:
[   32.137219]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.137270]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.137833] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.137915]                                      ^
[   32.138196]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.138602]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.138692] ==================================================================
[   32.139396] ==================================================================
[   32.139831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   32.139954] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.140132] 
[   32.140249] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.140364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.140554] Hardware name: linux,dummy-virt (DT)
[   32.140766] Call trace:
[   32.140848]  show_stack+0x20/0x38 (C)
[   32.140942]  dump_stack_lvl+0x8c/0xd0
[   32.141312]  print_report+0x118/0x5d0
[   32.141394]  kasan_report+0xdc/0x128
[   32.141441]  kasan_check_range+0x100/0x1a8
[   32.141489]  __kasan_check_write+0x20/0x30
[   32.141719]  kasan_atomics_helper+0xd3c/0x4858
[   32.142138]  kasan_atomics+0x198/0x2e0
[   32.142226]  kunit_try_run_case+0x170/0x3f0
[   32.142283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.142753]  kthread+0x328/0x630
[   32.142992]  ret_from_fork+0x10/0x20
[   32.143189] 
[   32.143215] Allocated by task 297:
[   32.143379]  kasan_save_stack+0x3c/0x68
[   32.143586]  kasan_save_track+0x20/0x40
[   32.143805]  kasan_save_alloc_info+0x40/0x58
[   32.143998]  __kasan_kmalloc+0xd4/0xd8
[   32.144068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.144113]  kasan_atomics+0xb8/0x2e0
[   32.144155]  kunit_try_run_case+0x170/0x3f0
[   32.144530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.144965]  kthread+0x328/0x630
[   32.145108]  ret_from_fork+0x10/0x20
[   32.145151] 
[   32.145174] The buggy address belongs to the object at fff00000c9c2c400
[   32.145174]  which belongs to the cache kmalloc-64 of size 64
[   32.145524] The buggy address is located 0 bytes to the right of
[   32.145524]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.145918] 
[   32.145964] The buggy address belongs to the physical page:
[   32.145997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.146404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.146577] page_type: f5(slab)
[   32.146827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.147229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.147335] page dumped because: kasan: bad access detected
[   32.147442] 
[   32.147539] Memory state around the buggy address:
[   32.147720]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.147785]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.147831] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.147872]                                      ^
[   32.147908]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.148418]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.148635] ==================================================================
[   32.394926] ==================================================================
[   32.394998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   32.395111] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.395486] 
[   32.395656] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.395779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.396026] Hardware name: linux,dummy-virt (DT)
[   32.396187] Call trace:
[   32.396223]  show_stack+0x20/0x38 (C)
[   32.396423]  dump_stack_lvl+0x8c/0xd0
[   32.396479]  print_report+0x118/0x5d0
[   32.396540]  kasan_report+0xdc/0x128
[   32.396588]  __asan_report_load8_noabort+0x20/0x30
[   32.396638]  kasan_atomics_helper+0x3e20/0x4858
[   32.397261]  kasan_atomics+0x198/0x2e0
[   32.397596]  kunit_try_run_case+0x170/0x3f0
[   32.397858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.398113]  kthread+0x328/0x630
[   32.398277]  ret_from_fork+0x10/0x20
[   32.398514] 
[   32.398729] Allocated by task 297:
[   32.398883]  kasan_save_stack+0x3c/0x68
[   32.398937]  kasan_save_track+0x20/0x40
[   32.399148]  kasan_save_alloc_info+0x40/0x58
[   32.399608]  __kasan_kmalloc+0xd4/0xd8
[   32.399764]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.399812]  kasan_atomics+0xb8/0x2e0
[   32.399886]  kunit_try_run_case+0x170/0x3f0
[   32.399930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.400269]  kthread+0x328/0x630
[   32.400520]  ret_from_fork+0x10/0x20
[   32.400692] 
[   32.400806] The buggy address belongs to the object at fff00000c9c2c400
[   32.400806]  which belongs to the cache kmalloc-64 of size 64
[   32.400958] The buggy address is located 0 bytes to the right of
[   32.400958]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.401040] 
[   32.401805] The buggy address belongs to the physical page:
[   32.401941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.402001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.402243] page_type: f5(slab)
[   32.402463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.402798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.402911] page dumped because: kasan: bad access detected
[   32.402975] 
[   32.403357] Memory state around the buggy address:
[   32.403713]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.403799]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.404100] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.404183]                                      ^
[   32.404429]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.404500]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.404673] ==================================================================
[   32.364815] ==================================================================
[   32.364907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   32.364969] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.365022] 
[   32.365219] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.365493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.365567] Hardware name: linux,dummy-virt (DT)
[   32.365601] Call trace:
[   32.365628]  show_stack+0x20/0x38 (C)
[   32.365681]  dump_stack_lvl+0x8c/0xd0
[   32.365897]  print_report+0x118/0x5d0
[   32.366077]  kasan_report+0xdc/0x128
[   32.366138]  __asan_report_load8_noabort+0x20/0x30
[   32.366190]  kasan_atomics_helper+0x3df4/0x4858
[   32.366240]  kasan_atomics+0x198/0x2e0
[   32.366290]  kunit_try_run_case+0x170/0x3f0
[   32.366341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.366397]  kthread+0x328/0x630
[   32.366442]  ret_from_fork+0x10/0x20
[   32.366501] 
[   32.366524] Allocated by task 297:
[   32.366563]  kasan_save_stack+0x3c/0x68
[   32.366609]  kasan_save_track+0x20/0x40
[   32.366653]  kasan_save_alloc_info+0x40/0x58
[   32.366695]  __kasan_kmalloc+0xd4/0xd8
[   32.366745]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.366788]  kasan_atomics+0xb8/0x2e0
[   32.366827]  kunit_try_run_case+0x170/0x3f0
[   32.366869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.366916]  kthread+0x328/0x630
[   32.366960]  ret_from_fork+0x10/0x20
[   32.367000] 
[   32.367021] The buggy address belongs to the object at fff00000c9c2c400
[   32.367021]  which belongs to the cache kmalloc-64 of size 64
[   32.367093] The buggy address is located 0 bytes to the right of
[   32.367093]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.367172] 
[   32.367197] The buggy address belongs to the physical page:
[   32.367230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.367286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.367344] page_type: f5(slab)
[   32.367390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.367444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.367486] page dumped because: kasan: bad access detected
[   32.367529] 
[   32.367549] Memory state around the buggy address:
[   32.367583]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.368043]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.368586] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.368676]                                      ^
[   32.368715]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.368763]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.368806] ==================================================================
[   32.185355] ==================================================================
[   32.185409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   32.185463] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.185516] 
[   32.185980] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.186208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.186417] Hardware name: linux,dummy-virt (DT)
[   32.186492] Call trace:
[   32.186644]  show_stack+0x20/0x38 (C)
[   32.186706]  dump_stack_lvl+0x8c/0xd0
[   32.186758]  print_report+0x118/0x5d0
[   32.186825]  kasan_report+0xdc/0x128
[   32.186922]  __asan_report_store8_noabort+0x20/0x30
[   32.187281]  kasan_atomics_helper+0x3e5c/0x4858
[   32.187354]  kasan_atomics+0x198/0x2e0
[   32.187405]  kunit_try_run_case+0x170/0x3f0
[   32.187946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.188033]  kthread+0x328/0x630
[   32.188225]  ret_from_fork+0x10/0x20
[   32.188508] 
[   32.188609] Allocated by task 297:
[   32.188905]  kasan_save_stack+0x3c/0x68
[   32.189159]  kasan_save_track+0x20/0x40
[   32.189265]  kasan_save_alloc_info+0x40/0x58
[   32.189308]  __kasan_kmalloc+0xd4/0xd8
[   32.189380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.189538]  kasan_atomics+0xb8/0x2e0
[   32.189931]  kunit_try_run_case+0x170/0x3f0
[   32.190007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.190391]  kthread+0x328/0x630
[   32.190572]  ret_from_fork+0x10/0x20
[   32.190797] 
[   32.190823] The buggy address belongs to the object at fff00000c9c2c400
[   32.190823]  which belongs to the cache kmalloc-64 of size 64
[   32.190916] The buggy address is located 0 bytes to the right of
[   32.190916]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.191299] 
[   32.191475] The buggy address belongs to the physical page:
[   32.191609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.191727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.191834] page_type: f5(slab)
[   32.191984] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.192047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.192103] page dumped because: kasan: bad access detected
[   32.192311] 
[   32.192367] Memory state around the buggy address:
[   32.192406]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.192454]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.192539] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.192592]                                      ^
[   32.192629]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.192675]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.192728] ==================================================================
[   32.355384] ==================================================================
[   32.355640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   32.355864] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.356161] 
[   32.356276] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.356595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.356804] Hardware name: linux,dummy-virt (DT)
[   32.357179] Call trace:
[   32.357259]  show_stack+0x20/0x38 (C)
[   32.357413]  dump_stack_lvl+0x8c/0xd0
[   32.357502]  print_report+0x118/0x5d0
[   32.357608]  kasan_report+0xdc/0x128
[   32.357715]  kasan_check_range+0x100/0x1a8
[   32.358025]  __kasan_check_write+0x20/0x30
[   32.358582]  kasan_atomics_helper+0x1644/0x4858
[   32.358669]  kasan_atomics+0x198/0x2e0
[   32.358975]  kunit_try_run_case+0x170/0x3f0
[   32.359050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.359145]  kthread+0x328/0x630
[   32.359337]  ret_from_fork+0x10/0x20
[   32.359401] 
[   32.359547] Allocated by task 297:
[   32.359730]  kasan_save_stack+0x3c/0x68
[   32.359793]  kasan_save_track+0x20/0x40
[   32.360147]  kasan_save_alloc_info+0x40/0x58
[   32.360236]  __kasan_kmalloc+0xd4/0xd8
[   32.360321]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.360366]  kasan_atomics+0xb8/0x2e0
[   32.360413]  kunit_try_run_case+0x170/0x3f0
[   32.360643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.360838]  kthread+0x328/0x630
[   32.361064]  ret_from_fork+0x10/0x20
[   32.361243] 
[   32.361289] The buggy address belongs to the object at fff00000c9c2c400
[   32.361289]  which belongs to the cache kmalloc-64 of size 64
[   32.361608] The buggy address is located 0 bytes to the right of
[   32.361608]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.361798] 
[   32.361857] The buggy address belongs to the physical page:
[   32.362112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.362282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.362641] page_type: f5(slab)
[   32.362805] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.363146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.363218] page dumped because: kasan: bad access detected
[   32.363298] 
[   32.363379] Memory state around the buggy address:
[   32.363554]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.363776]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.363870] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.363978]                                      ^
[   32.364035]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.364175]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.364393] ==================================================================
[   32.274435] ==================================================================
[   32.274858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   32.275156] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.275346] 
[   32.275390] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.275547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.275750] Hardware name: linux,dummy-virt (DT)
[   32.275996] Call trace:
[   32.276048]  show_stack+0x20/0x38 (C)
[   32.276364]  dump_stack_lvl+0x8c/0xd0
[   32.276519]  print_report+0x118/0x5d0
[   32.276625]  kasan_report+0xdc/0x128
[   32.276762]  kasan_check_range+0x100/0x1a8
[   32.276815]  __kasan_check_write+0x20/0x30
[   32.276862]  kasan_atomics_helper+0x12d8/0x4858
[   32.276920]  kasan_atomics+0x198/0x2e0
[   32.276968]  kunit_try_run_case+0x170/0x3f0
[   32.277212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.277910]  kthread+0x328/0x630
[   32.277988]  ret_from_fork+0x10/0x20
[   32.278327] 
[   32.278404] Allocated by task 297:
[   32.278476]  kasan_save_stack+0x3c/0x68
[   32.278703]  kasan_save_track+0x20/0x40
[   32.279067]  kasan_save_alloc_info+0x40/0x58
[   32.279544]  __kasan_kmalloc+0xd4/0xd8
[   32.279698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.279813]  kasan_atomics+0xb8/0x2e0
[   32.280035]  kunit_try_run_case+0x170/0x3f0
[   32.280243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.280377]  kthread+0x328/0x630
[   32.280636]  ret_from_fork+0x10/0x20
[   32.280795] 
[   32.281248] The buggy address belongs to the object at fff00000c9c2c400
[   32.281248]  which belongs to the cache kmalloc-64 of size 64
[   32.281615] The buggy address is located 0 bytes to the right of
[   32.281615]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.281697] 
[   32.282102] The buggy address belongs to the physical page:
[   32.282171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.282384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.282574] page_type: f5(slab)
[   32.282648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.282962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.283104] page dumped because: kasan: bad access detected
[   32.283462] 
[   32.283512] Memory state around the buggy address:
[   32.283765]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.284135]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.284311] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.284478]                                      ^
[   32.284571]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.284720]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.284936] ==================================================================
[   32.296113] ==================================================================
[   32.296223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   32.296295] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.296349] 
[   32.296389] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.296478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.296506] Hardware name: linux,dummy-virt (DT)
[   32.296540] Call trace:
[   32.296996]  show_stack+0x20/0x38 (C)
[   32.297147]  dump_stack_lvl+0x8c/0xd0
[   32.297241]  print_report+0x118/0x5d0
[   32.297347]  kasan_report+0xdc/0x128
[   32.297436]  __asan_report_load8_noabort+0x20/0x30
[   32.297487]  kasan_atomics_helper+0x3f04/0x4858
[   32.297546]  kasan_atomics+0x198/0x2e0
[   32.297594]  kunit_try_run_case+0x170/0x3f0
[   32.297645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.297702]  kthread+0x328/0x630
[   32.297747]  ret_from_fork+0x10/0x20
[   32.297796] 
[   32.297858] Allocated by task 297:
[   32.297902]  kasan_save_stack+0x3c/0x68
[   32.297955]  kasan_save_track+0x20/0x40
[   32.297997]  kasan_save_alloc_info+0x40/0x58
[   32.298037]  __kasan_kmalloc+0xd4/0xd8
[   32.298096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.298138]  kasan_atomics+0xb8/0x2e0
[   32.298177]  kunit_try_run_case+0x170/0x3f0
[   32.298218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.298264]  kthread+0x328/0x630
[   32.298299]  ret_from_fork+0x10/0x20
[   32.298337] 
[   32.298358] The buggy address belongs to the object at fff00000c9c2c400
[   32.298358]  which belongs to the cache kmalloc-64 of size 64
[   32.298418] The buggy address is located 0 bytes to the right of
[   32.298418]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.298486] 
[   32.298507] The buggy address belongs to the physical page:
[   32.298540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.298595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.298642] page_type: f5(slab)
[   32.298681] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.298742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.298795] page dumped because: kasan: bad access detected
[   32.298829] 
[   32.298854] Memory state around the buggy address:
[   32.298886]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.298942]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.298988] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.299028]                                      ^
[   32.299472]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.299527]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.299987] ==================================================================
[   32.369825] ==================================================================
[   32.369896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   32.369950] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.370081] 
[   32.370118] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.370210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.370410] Hardware name: linux,dummy-virt (DT)
[   32.370672] Call trace:
[   32.370894]  show_stack+0x20/0x38 (C)
[   32.370965]  dump_stack_lvl+0x8c/0xd0
[   32.371082]  print_report+0x118/0x5d0
[   32.371134]  kasan_report+0xdc/0x128
[   32.371179]  kasan_check_range+0x100/0x1a8
[   32.371272]  __kasan_check_write+0x20/0x30
[   32.371324]  kasan_atomics_helper+0x16d0/0x4858
[   32.371375]  kasan_atomics+0x198/0x2e0
[   32.371995]  kunit_try_run_case+0x170/0x3f0
[   32.372112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.372249]  kthread+0x328/0x630
[   32.372443]  ret_from_fork+0x10/0x20
[   32.372678] 
[   32.372750] Allocated by task 297:
[   32.373047]  kasan_save_stack+0x3c/0x68
[   32.373199]  kasan_save_track+0x20/0x40
[   32.373469]  kasan_save_alloc_info+0x40/0x58
[   32.373709]  __kasan_kmalloc+0xd4/0xd8
[   32.374099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.374183]  kasan_atomics+0xb8/0x2e0
[   32.374246]  kunit_try_run_case+0x170/0x3f0
[   32.374325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.374564]  kthread+0x328/0x630
[   32.374752]  ret_from_fork+0x10/0x20
[   32.374966] 
[   32.375143] The buggy address belongs to the object at fff00000c9c2c400
[   32.375143]  which belongs to the cache kmalloc-64 of size 64
[   32.375299] The buggy address is located 0 bytes to the right of
[   32.375299]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.375553] 
[   32.375641] The buggy address belongs to the physical page:
[   32.375893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.376045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.376180] page_type: f5(slab)
[   32.376274] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.376620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.376741] page dumped because: kasan: bad access detected
[   32.376924] 
[   32.377092] Memory state around the buggy address:
[   32.377208]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.377328]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.377496] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.377586]                                      ^
[   32.377810]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.378005]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.378119] ==================================================================
[   32.301023] ==================================================================
[   32.301097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   32.301149] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.301321] 
[   32.301415] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.301801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.301884] Hardware name: linux,dummy-virt (DT)
[   32.301920] Call trace:
[   32.301947]  show_stack+0x20/0x38 (C)
[   32.302181]  dump_stack_lvl+0x8c/0xd0
[   32.302351]  print_report+0x118/0x5d0
[   32.302530]  kasan_report+0xdc/0x128
[   32.302604]  kasan_check_range+0x100/0x1a8
[   32.302655]  __kasan_check_write+0x20/0x30
[   32.302729]  kasan_atomics_helper+0x1414/0x4858
[   32.303115]  kasan_atomics+0x198/0x2e0
[   32.303184]  kunit_try_run_case+0x170/0x3f0
[   32.303237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.303525]  kthread+0x328/0x630
[   32.303900]  ret_from_fork+0x10/0x20
[   32.304224] 
[   32.304320] Allocated by task 297:
[   32.304677]  kasan_save_stack+0x3c/0x68
[   32.304796]  kasan_save_track+0x20/0x40
[   32.305104]  kasan_save_alloc_info+0x40/0x58
[   32.305203]  __kasan_kmalloc+0xd4/0xd8
[   32.305366]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.305442]  kasan_atomics+0xb8/0x2e0
[   32.305648]  kunit_try_run_case+0x170/0x3f0
[   32.305867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.305966]  kthread+0x328/0x630
[   32.306216]  ret_from_fork+0x10/0x20
[   32.306358] 
[   32.306502] The buggy address belongs to the object at fff00000c9c2c400
[   32.306502]  which belongs to the cache kmalloc-64 of size 64
[   32.306705] The buggy address is located 0 bytes to the right of
[   32.306705]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.306997] 
[   32.307158] The buggy address belongs to the physical page:
[   32.307206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.307265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.307820] page_type: f5(slab)
[   32.308073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.308180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.308340] page dumped because: kasan: bad access detected
[   32.308426] 
[   32.308506] Memory state around the buggy address:
[   32.308727]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.309067]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.309169] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.309410]                                      ^
[   32.309613]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.309671]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.309875] ==================================================================
[   32.032880] ==================================================================
[   32.032942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.032997] Read of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.033180] 
[   32.033281] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.033377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.033524] Hardware name: linux,dummy-virt (DT)
[   32.033569] Call trace:
[   32.033633]  show_stack+0x20/0x38 (C)
[   32.033685]  dump_stack_lvl+0x8c/0xd0
[   32.033744]  print_report+0x118/0x5d0
[   32.033789]  kasan_report+0xdc/0x128
[   32.033835]  __asan_report_load4_noabort+0x20/0x30
[   32.033895]  kasan_atomics_helper+0x42d8/0x4858
[   32.033948]  kasan_atomics+0x198/0x2e0
[   32.033995]  kunit_try_run_case+0x170/0x3f0
[   32.034077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.034137]  kthread+0x328/0x630
[   32.034179]  ret_from_fork+0x10/0x20
[   32.034229] 
[   32.034257] Allocated by task 297:
[   32.034289]  kasan_save_stack+0x3c/0x68
[   32.034332]  kasan_save_track+0x20/0x40
[   32.034373]  kasan_save_alloc_info+0x40/0x58
[   32.034419]  __kasan_kmalloc+0xd4/0xd8
[   32.034460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.034511]  kasan_atomics+0xb8/0x2e0
[   32.034550]  kunit_try_run_case+0x170/0x3f0
[   32.034599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.034646]  kthread+0x328/0x630
[   32.034681]  ret_from_fork+0x10/0x20
[   32.034719] 
[   32.034739] The buggy address belongs to the object at fff00000c9c2c400
[   32.034739]  which belongs to the cache kmalloc-64 of size 64
[   32.034928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.036914]                                      ^
[   32.038407] Write of size 4 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.039907]  kasan_check_range+0x100/0x1a8
[   32.041433] Allocated by task 297:
[   32.041507]  kasan_save_stack+0x3c/0x68
[   32.041667]  kasan_save_track+0x20/0x40
[   32.041715]  kasan_save_alloc_info+0x40/0x58
[   32.041944]  __kasan_kmalloc+0xd4/0xd8
[   32.042107]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.042374]  kasan_atomics+0xb8/0x2e0
[   32.042479]  kunit_try_run_case+0x170/0x3f0
[   32.042586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.042723]  kthread+0x328/0x630
[   32.042964]  ret_from_fork+0x10/0x20
[   32.043141] 
[   32.043230] The buggy address belongs to the object at fff00000c9c2c400
[   32.043230]  which belongs to the cache kmalloc-64 of size 64
[   32.043408] The buggy address is located 0 bytes to the right of
[   32.043408]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.043481] 
[   32.043646] The buggy address belongs to the physical page:
[   32.043909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.044121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.044330] page_type: f5(slab)
[   32.044535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.044663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.044767] page dumped because: kasan: bad access detected
[   32.044948] 
[   32.045025] Memory state around the buggy address:
[   32.045090]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.045368]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.045426] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.045870]                                      ^
[   32.046027]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.046147]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.046431] ==================================================================
[   32.337376] ==================================================================
[   32.337439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   32.337491] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.337554] 
[   32.337792] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.338270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.338319] Hardware name: linux,dummy-virt (DT)
[   32.338368] Call trace:
[   32.338630]  show_stack+0x20/0x38 (C)
[   32.338869]  dump_stack_lvl+0x8c/0xd0
[   32.338983]  print_report+0x118/0x5d0
[   32.339574]  kasan_report+0xdc/0x128
[   32.339690]  kasan_check_range+0x100/0x1a8
[   32.339774]  __kasan_check_write+0x20/0x30
[   32.340030]  kasan_atomics_helper+0x15b4/0x4858
[   32.340365]  kasan_atomics+0x198/0x2e0
[   32.340436]  kunit_try_run_case+0x170/0x3f0
[   32.340626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.340788]  kthread+0x328/0x630
[   32.340907]  ret_from_fork+0x10/0x20
[   32.341005] 
[   32.341205] Allocated by task 297:
[   32.341239]  kasan_save_stack+0x3c/0x68
[   32.341472]  kasan_save_track+0x20/0x40
[   32.341569]  kasan_save_alloc_info+0x40/0x58
[   32.341915]  __kasan_kmalloc+0xd4/0xd8
[   32.342080]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.342166]  kasan_atomics+0xb8/0x2e0
[   32.342480]  kunit_try_run_case+0x170/0x3f0
[   32.342559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.342656]  kthread+0x328/0x630
[   32.342857]  ret_from_fork+0x10/0x20
[   32.342927] 
[   32.343225] The buggy address belongs to the object at fff00000c9c2c400
[   32.343225]  which belongs to the cache kmalloc-64 of size 64
[   32.343467] The buggy address is located 0 bytes to the right of
[   32.343467]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.343862] 
[   32.343912] The buggy address belongs to the physical page:
[   32.344089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.344153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.344352] page_type: f5(slab)
[   32.344523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.344983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.345140] page dumped because: kasan: bad access detected
[   32.345247] 
[   32.345589] Memory state around the buggy address:
[   32.345705]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.345857]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.345971] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.346075]                                      ^
[   32.346129]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.346319]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.346469] ==================================================================
[   32.378436] ==================================================================
[   32.378646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   32.378931] Read of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.379130] 
[   32.379173] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.379263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.379320] Hardware name: linux,dummy-virt (DT)
[   32.379386] Call trace:
[   32.379412]  show_stack+0x20/0x38 (C)
[   32.379547]  dump_stack_lvl+0x8c/0xd0
[   32.379602]  print_report+0x118/0x5d0
[   32.379945]  kasan_report+0xdc/0x128
[   32.380134]  __asan_report_load8_noabort+0x20/0x30
[   32.380432]  kasan_atomics_helper+0x3e10/0x4858
[   32.380541]  kasan_atomics+0x198/0x2e0
[   32.380688]  kunit_try_run_case+0x170/0x3f0
[   32.380864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.380959]  kthread+0x328/0x630
[   32.381005]  ret_from_fork+0x10/0x20
[   32.381397] 
[   32.381453] Allocated by task 297:
[   32.381661]  kasan_save_stack+0x3c/0x68
[   32.381805]  kasan_save_track+0x20/0x40
[   32.382154]  kasan_save_alloc_info+0x40/0x58
[   32.382239]  __kasan_kmalloc+0xd4/0xd8
[   32.382453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.382720]  kasan_atomics+0xb8/0x2e0
[   32.382939]  kunit_try_run_case+0x170/0x3f0
[   32.383142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.383415]  kthread+0x328/0x630
[   32.383570]  ret_from_fork+0x10/0x20
[   32.383633] 
[   32.383849] The buggy address belongs to the object at fff00000c9c2c400
[   32.383849]  which belongs to the cache kmalloc-64 of size 64
[   32.384147] The buggy address is located 0 bytes to the right of
[   32.384147]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.384245] 
[   32.384613] The buggy address belongs to the physical page:
[   32.384723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.384788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.385068] page_type: f5(slab)
[   32.385162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.385226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.385270] page dumped because: kasan: bad access detected
[   32.385304] 
[   32.385341] Memory state around the buggy address:
[   32.385407]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.385455]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.385522] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.385564]                                      ^
[   32.385600]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.385645]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.385688] ==================================================================
[   32.220373] ==================================================================
[   32.220491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   32.220558] Write of size 8 at addr fff00000c9c2c430 by task kunit_try_catch/297
[   32.220610] 
[   32.220646] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250709 #1 PREEMPT 
[   32.221108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.221204] Hardware name: linux,dummy-virt (DT)
[   32.221239] Call trace:
[   32.221330]  show_stack+0x20/0x38 (C)
[   32.221416]  dump_stack_lvl+0x8c/0xd0
[   32.221579]  print_report+0x118/0x5d0
[   32.221633]  kasan_report+0xdc/0x128
[   32.221826]  kasan_check_range+0x100/0x1a8
[   32.222004]  __kasan_check_write+0x20/0x30
[   32.222075]  kasan_atomics_helper+0xff0/0x4858
[   32.222127]  kasan_atomics+0x198/0x2e0
[   32.222366]  kunit_try_run_case+0x170/0x3f0
[   32.222823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.222907]  kthread+0x328/0x630
[   32.222955]  ret_from_fork+0x10/0x20
[   32.223214] 
[   32.223347] Allocated by task 297:
[   32.223391]  kasan_save_stack+0x3c/0x68
[   32.223643]  kasan_save_track+0x20/0x40
[   32.223799]  kasan_save_alloc_info+0x40/0x58
[   32.224048]  __kasan_kmalloc+0xd4/0xd8
[   32.224224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.224364]  kasan_atomics+0xb8/0x2e0
[   32.224523]  kunit_try_run_case+0x170/0x3f0
[   32.224568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.224624]  kthread+0x328/0x630
[   32.224660]  ret_from_fork+0x10/0x20
[   32.224999] 
[   32.225111] The buggy address belongs to the object at fff00000c9c2c400
[   32.225111]  which belongs to the cache kmalloc-64 of size 64
[   32.225410] The buggy address is located 0 bytes to the right of
[   32.225410]  allocated 48-byte region [fff00000c9c2c400, fff00000c9c2c430)
[   32.225590] 
[   32.225632] The buggy address belongs to the physical page:
[   32.225873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c2c
[   32.226221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.226367] page_type: f5(slab)
[   32.226735] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.226826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.227017] page dumped because: kasan: bad access detected
[   32.227265] 
[   32.227374] Memory state around the buggy address:
[   32.227590]  fff00000c9c2c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.227776]  fff00000c9c2c380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.227843] >fff00000c9c2c400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.227892]                                      ^
[   32.227928]  fff00000c9c2c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.227983]  fff00000c9c2c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.228023] ==================================================================

[   27.111139] ==================================================================
[   27.112071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   27.112743] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.113310] 
[   27.113403] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.113458] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.113473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.113498] Call Trace:
[   27.113521]  <TASK>
[   27.113542]  dump_stack_lvl+0x73/0xb0
[   27.113576]  print_report+0xd1/0x610
[   27.113599]  ? __virt_addr_valid+0x1db/0x2d0
[   27.113625]  ? kasan_atomics_helper+0x1079/0x5450
[   27.113647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.113674]  ? kasan_atomics_helper+0x1079/0x5450
[   27.113708]  kasan_report+0x141/0x180
[   27.113731]  ? kasan_atomics_helper+0x1079/0x5450
[   27.113758]  kasan_check_range+0x10c/0x1c0
[   27.113792]  __kasan_check_write+0x18/0x20
[   27.113816]  kasan_atomics_helper+0x1079/0x5450
[   27.113840]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.113863]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.113898]  ? kasan_save_alloc_info+0x3b/0x50
[   27.113927]  kasan_atomics+0x1dc/0x310
[   27.113962]  ? __pfx_kasan_atomics+0x10/0x10
[   27.113987]  ? __pfx_read_tsc+0x10/0x10
[   27.114011]  ? ktime_get_ts64+0x86/0x230
[   27.114038]  kunit_try_run_case+0x1a5/0x480
[   27.114070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.114092]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.114118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.114155]  ? __kthread_parkme+0x82/0x180
[   27.114179]  ? preempt_count_sub+0x50/0x80
[   27.114204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.114228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.114254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.114280]  kthread+0x337/0x6f0
[   27.114301]  ? trace_preempt_on+0x20/0xc0
[   27.114327]  ? __pfx_kthread+0x10/0x10
[   27.114349]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.114372]  ? calculate_sigpending+0x7b/0xa0
[   27.114398]  ? __pfx_kthread+0x10/0x10
[   27.114429]  ret_from_fork+0x116/0x1d0
[   27.114450]  ? __pfx_kthread+0x10/0x10
[   27.114471]  ret_from_fork_asm+0x1a/0x30
[   27.114514]  </TASK>
[   27.114526] 
[   27.123892] Allocated by task 315:
[   27.124098]  kasan_save_stack+0x45/0x70
[   27.124329]  kasan_save_track+0x18/0x40
[   27.124522]  kasan_save_alloc_info+0x3b/0x50
[   27.124740]  __kasan_kmalloc+0xb7/0xc0
[   27.125029]  __kmalloc_cache_noprof+0x189/0x420
[   27.125198]  kasan_atomics+0x95/0x310
[   27.125328]  kunit_try_run_case+0x1a5/0x480
[   27.125468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.125749]  kthread+0x337/0x6f0
[   27.125921]  ret_from_fork+0x116/0x1d0
[   27.126105]  ret_from_fork_asm+0x1a/0x30
[   27.126284] 
[   27.126351] The buggy address belongs to the object at ffff8881058d6700
[   27.126351]  which belongs to the cache kmalloc-64 of size 64
[   27.126725] The buggy address is located 0 bytes to the right of
[   27.126725]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.127276] 
[   27.127373] The buggy address belongs to the physical page:
[   27.127655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.128009] flags: 0x200000000000000(node=0|zone=2)
[   27.128176] page_type: f5(slab)
[   27.128348] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.128717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.129068] page dumped because: kasan: bad access detected
[   27.129295] 
[   27.129399] Memory state around the buggy address:
[   27.129593]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.129960]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.130265] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.130555]                                      ^
[   27.130772]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.131088]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.131400] ==================================================================
[   27.643258] ==================================================================
[   27.643522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   27.644157] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.644529] 
[   27.644736] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.644795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.644811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.644835] Call Trace:
[   27.644857]  <TASK>
[   27.644881]  dump_stack_lvl+0x73/0xb0
[   27.644915]  print_report+0xd1/0x610
[   27.644941]  ? __virt_addr_valid+0x1db/0x2d0
[   27.644967]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.644989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.645016]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.645038]  kasan_report+0x141/0x180
[   27.645060]  ? kasan_atomics_helper+0x1d7a/0x5450
[   27.645087]  kasan_check_range+0x10c/0x1c0
[   27.645111]  __kasan_check_write+0x18/0x20
[   27.645134]  kasan_atomics_helper+0x1d7a/0x5450
[   27.645158]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.645180]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.645205]  ? kasan_save_alloc_info+0x3b/0x50
[   27.645235]  kasan_atomics+0x1dc/0x310
[   27.645259]  ? __pfx_kasan_atomics+0x10/0x10
[   27.645283]  ? __pfx_read_tsc+0x10/0x10
[   27.645307]  ? ktime_get_ts64+0x86/0x230
[   27.645334]  kunit_try_run_case+0x1a5/0x480
[   27.645357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.645378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.645404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.645429]  ? __kthread_parkme+0x82/0x180
[   27.645452]  ? preempt_count_sub+0x50/0x80
[   27.645478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.645501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.645527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.645553]  kthread+0x337/0x6f0
[   27.645574]  ? trace_preempt_on+0x20/0xc0
[   27.645602]  ? __pfx_kthread+0x10/0x10
[   27.645625]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.645648]  ? calculate_sigpending+0x7b/0xa0
[   27.645674]  ? __pfx_kthread+0x10/0x10
[   27.645868]  ret_from_fork+0x116/0x1d0
[   27.645895]  ? __pfx_kthread+0x10/0x10
[   27.645918]  ret_from_fork_asm+0x1a/0x30
[   27.645952]  </TASK>
[   27.645966] 
[   27.655687] Allocated by task 315:
[   27.656063]  kasan_save_stack+0x45/0x70
[   27.656280]  kasan_save_track+0x18/0x40
[   27.656570]  kasan_save_alloc_info+0x3b/0x50
[   27.656794]  __kasan_kmalloc+0xb7/0xc0
[   27.657048]  __kmalloc_cache_noprof+0x189/0x420
[   27.657257]  kasan_atomics+0x95/0x310
[   27.657425]  kunit_try_run_case+0x1a5/0x480
[   27.657619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.657855]  kthread+0x337/0x6f0
[   27.658330]  ret_from_fork+0x116/0x1d0
[   27.658515]  ret_from_fork_asm+0x1a/0x30
[   27.658657] 
[   27.658767] The buggy address belongs to the object at ffff8881058d6700
[   27.658767]  which belongs to the cache kmalloc-64 of size 64
[   27.659391] The buggy address is located 0 bytes to the right of
[   27.659391]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.660165] 
[   27.660329] The buggy address belongs to the physical page:
[   27.660572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.661132] flags: 0x200000000000000(node=0|zone=2)
[   27.661433] page_type: f5(slab)
[   27.661574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.662069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.662441] page dumped because: kasan: bad access detected
[   27.662636] 
[   27.662745] Memory state around the buggy address:
[   27.662949]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.663430]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.663795] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.664148]                                      ^
[   27.664356]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.664642]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.665165] ==================================================================
[   27.313893] ==================================================================
[   27.315297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   27.315629] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.316015] 
[   27.316148] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.316204] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.316219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.316254] Call Trace:
[   27.316275]  <TASK>
[   27.316297]  dump_stack_lvl+0x73/0xb0
[   27.316342]  print_report+0xd1/0x610
[   27.316366]  ? __virt_addr_valid+0x1db/0x2d0
[   27.316392]  ? kasan_atomics_helper+0x1467/0x5450
[   27.316414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.316450]  ? kasan_atomics_helper+0x1467/0x5450
[   27.316473]  kasan_report+0x141/0x180
[   27.316495]  ? kasan_atomics_helper+0x1467/0x5450
[   27.316613]  kasan_check_range+0x10c/0x1c0
[   27.316640]  __kasan_check_write+0x18/0x20
[   27.316664]  kasan_atomics_helper+0x1467/0x5450
[   27.316688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.316726]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.316753]  ? kasan_save_alloc_info+0x3b/0x50
[   27.316792]  kasan_atomics+0x1dc/0x310
[   27.316815]  ? __pfx_kasan_atomics+0x10/0x10
[   27.316840]  ? __pfx_read_tsc+0x10/0x10
[   27.316875]  ? ktime_get_ts64+0x86/0x230
[   27.316902]  kunit_try_run_case+0x1a5/0x480
[   27.316937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.316958]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.316984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.317008]  ? __kthread_parkme+0x82/0x180
[   27.317030]  ? preempt_count_sub+0x50/0x80
[   27.317055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.317078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.317104]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.317129]  kthread+0x337/0x6f0
[   27.317150]  ? trace_preempt_on+0x20/0xc0
[   27.317174]  ? __pfx_kthread+0x10/0x10
[   27.317196]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.317219]  ? calculate_sigpending+0x7b/0xa0
[   27.317244]  ? __pfx_kthread+0x10/0x10
[   27.317267]  ret_from_fork+0x116/0x1d0
[   27.317287]  ? __pfx_kthread+0x10/0x10
[   27.317309]  ret_from_fork_asm+0x1a/0x30
[   27.317342]  </TASK>
[   27.317356] 
[   27.324944] Allocated by task 315:
[   27.325155]  kasan_save_stack+0x45/0x70
[   27.325369]  kasan_save_track+0x18/0x40
[   27.325504]  kasan_save_alloc_info+0x3b/0x50
[   27.325679]  __kasan_kmalloc+0xb7/0xc0
[   27.325881]  __kmalloc_cache_noprof+0x189/0x420
[   27.326101]  kasan_atomics+0x95/0x310
[   27.326262]  kunit_try_run_case+0x1a5/0x480
[   27.326405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.326831]  kthread+0x337/0x6f0
[   27.326968]  ret_from_fork+0x116/0x1d0
[   27.327173]  ret_from_fork_asm+0x1a/0x30
[   27.327311] 
[   27.327379] The buggy address belongs to the object at ffff8881058d6700
[   27.327379]  which belongs to the cache kmalloc-64 of size 64
[   27.327757] The buggy address is located 0 bytes to the right of
[   27.327757]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.328330] 
[   27.328423] The buggy address belongs to the physical page:
[   27.328671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.328962] flags: 0x200000000000000(node=0|zone=2)
[   27.329124] page_type: f5(slab)
[   27.329242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.329586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.330209] page dumped because: kasan: bad access detected
[   27.330462] 
[   27.330553] Memory state around the buggy address:
[   27.330764]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.331085]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.331385] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.331676]                                      ^
[   27.331925]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.332227]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.332513] ==================================================================
[   27.131954] ==================================================================
[   27.132890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   27.133226] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.133446] 
[   27.133544] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.133609] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.133624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.133648] Call Trace:
[   27.133682]  <TASK>
[   27.133713]  dump_stack_lvl+0x73/0xb0
[   27.133748]  print_report+0xd1/0x610
[   27.133772]  ? __virt_addr_valid+0x1db/0x2d0
[   27.133798]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.133821]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.133869]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.133892]  kasan_report+0x141/0x180
[   27.133925]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.133952]  __asan_report_load4_noabort+0x18/0x20
[   27.133977]  kasan_atomics_helper+0x4a1c/0x5450
[   27.134000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.134023]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.134049]  ? kasan_save_alloc_info+0x3b/0x50
[   27.134077]  kasan_atomics+0x1dc/0x310
[   27.134101]  ? __pfx_kasan_atomics+0x10/0x10
[   27.134126]  ? __pfx_read_tsc+0x10/0x10
[   27.134150]  ? ktime_get_ts64+0x86/0x230
[   27.134177]  kunit_try_run_case+0x1a5/0x480
[   27.134201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.134222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.134248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.134273]  ? __kthread_parkme+0x82/0x180
[   27.134305]  ? preempt_count_sub+0x50/0x80
[   27.134331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.134354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.134391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.134418]  kthread+0x337/0x6f0
[   27.134440]  ? trace_preempt_on+0x20/0xc0
[   27.134464]  ? __pfx_kthread+0x10/0x10
[   27.134486]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.134509]  ? calculate_sigpending+0x7b/0xa0
[   27.134536]  ? __pfx_kthread+0x10/0x10
[   27.134567]  ret_from_fork+0x116/0x1d0
[   27.134588]  ? __pfx_kthread+0x10/0x10
[   27.134609]  ret_from_fork_asm+0x1a/0x30
[   27.134653]  </TASK>
[   27.134667] 
[   27.142275] Allocated by task 315:
[   27.142509]  kasan_save_stack+0x45/0x70
[   27.142730]  kasan_save_track+0x18/0x40
[   27.142966]  kasan_save_alloc_info+0x3b/0x50
[   27.143152]  __kasan_kmalloc+0xb7/0xc0
[   27.143342]  __kmalloc_cache_noprof+0x189/0x420
[   27.143553]  kasan_atomics+0x95/0x310
[   27.143745]  kunit_try_run_case+0x1a5/0x480
[   27.143949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.144183]  kthread+0x337/0x6f0
[   27.144361]  ret_from_fork+0x116/0x1d0
[   27.144546]  ret_from_fork_asm+0x1a/0x30
[   27.144724] 
[   27.144851] The buggy address belongs to the object at ffff8881058d6700
[   27.144851]  which belongs to the cache kmalloc-64 of size 64
[   27.145332] The buggy address is located 0 bytes to the right of
[   27.145332]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.145768] 
[   27.145853] The buggy address belongs to the physical page:
[   27.146248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.146601] flags: 0x200000000000000(node=0|zone=2)
[   27.146861] page_type: f5(slab)
[   27.147219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.147520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.147753] page dumped because: kasan: bad access detected
[   27.148018] 
[   27.148111] Memory state around the buggy address:
[   27.148362]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.148681]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.149234] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.149547]                                      ^
[   27.149735]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.150166]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.150428] ==================================================================
[   27.874367] ==================================================================
[   27.875129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   27.875549] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.876116] 
[   27.876368] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.876557] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.876576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.876599] Call Trace:
[   27.876617]  <TASK>
[   27.876636]  dump_stack_lvl+0x73/0xb0
[   27.876669]  print_report+0xd1/0x610
[   27.876706]  ? __virt_addr_valid+0x1db/0x2d0
[   27.876731]  ? kasan_atomics_helper+0x224c/0x5450
[   27.876754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.876795]  ? kasan_atomics_helper+0x224c/0x5450
[   27.876818]  kasan_report+0x141/0x180
[   27.876840]  ? kasan_atomics_helper+0x224c/0x5450
[   27.876867]  kasan_check_range+0x10c/0x1c0
[   27.876892]  __kasan_check_write+0x18/0x20
[   27.876915]  kasan_atomics_helper+0x224c/0x5450
[   27.876938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.876961]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.876986]  ? kasan_save_alloc_info+0x3b/0x50
[   27.877016]  kasan_atomics+0x1dc/0x310
[   27.877038]  ? __pfx_kasan_atomics+0x10/0x10
[   27.877063]  ? __pfx_read_tsc+0x10/0x10
[   27.877086]  ? ktime_get_ts64+0x86/0x230
[   27.877112]  kunit_try_run_case+0x1a5/0x480
[   27.877134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.877156]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.877181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.877206]  ? __kthread_parkme+0x82/0x180
[   27.877227]  ? preempt_count_sub+0x50/0x80
[   27.877252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.877275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.877301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.877327]  kthread+0x337/0x6f0
[   27.877347]  ? trace_preempt_on+0x20/0xc0
[   27.877372]  ? __pfx_kthread+0x10/0x10
[   27.877394]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.877417]  ? calculate_sigpending+0x7b/0xa0
[   27.877442]  ? __pfx_kthread+0x10/0x10
[   27.877464]  ret_from_fork+0x116/0x1d0
[   27.877484]  ? __pfx_kthread+0x10/0x10
[   27.877506]  ret_from_fork_asm+0x1a/0x30
[   27.877538]  </TASK>
[   27.877551] 
[   27.887849] Allocated by task 315:
[   27.888053]  kasan_save_stack+0x45/0x70
[   27.888370]  kasan_save_track+0x18/0x40
[   27.888563]  kasan_save_alloc_info+0x3b/0x50
[   27.888766]  __kasan_kmalloc+0xb7/0xc0
[   27.889189]  __kmalloc_cache_noprof+0x189/0x420
[   27.889480]  kasan_atomics+0x95/0x310
[   27.889663]  kunit_try_run_case+0x1a5/0x480
[   27.890013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.890351]  kthread+0x337/0x6f0
[   27.890505]  ret_from_fork+0x116/0x1d0
[   27.890860]  ret_from_fork_asm+0x1a/0x30
[   27.891181] 
[   27.891261] The buggy address belongs to the object at ffff8881058d6700
[   27.891261]  which belongs to the cache kmalloc-64 of size 64
[   27.891766] The buggy address is located 0 bytes to the right of
[   27.891766]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.892581] 
[   27.892678] The buggy address belongs to the physical page:
[   27.893087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.893588] flags: 0x200000000000000(node=0|zone=2)
[   27.894161] page_type: f5(slab)
[   27.894558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.895306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.895603] page dumped because: kasan: bad access detected
[   27.895810] 
[   27.895967] Memory state around the buggy address:
[   27.896377]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.897073]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.897710] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.898048]                                      ^
[   27.898201]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.898411]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.898620] ==================================================================
[   26.836628] ==================================================================
[   26.837123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   26.837364] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.837990] 
[   26.838200] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.838255] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.838270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.838294] Call Trace:
[   26.838309]  <TASK>
[   26.838329]  dump_stack_lvl+0x73/0xb0
[   26.838360]  print_report+0xd1/0x610
[   26.838385]  ? __virt_addr_valid+0x1db/0x2d0
[   26.838410]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.838431]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.838459]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.838480]  kasan_report+0x141/0x180
[   26.838503]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.838529]  kasan_check_range+0x10c/0x1c0
[   26.838554]  __kasan_check_write+0x18/0x20
[   26.838578]  kasan_atomics_helper+0x8f9/0x5450
[   26.838612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.838635]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.838659]  ? kasan_save_alloc_info+0x3b/0x50
[   26.838706]  kasan_atomics+0x1dc/0x310
[   26.838731]  ? __pfx_kasan_atomics+0x10/0x10
[   26.838756]  ? __pfx_read_tsc+0x10/0x10
[   26.838789]  ? ktime_get_ts64+0x86/0x230
[   26.838815]  kunit_try_run_case+0x1a5/0x480
[   26.838839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.838860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.838901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.838936]  ? __kthread_parkme+0x82/0x180
[   26.838958]  ? preempt_count_sub+0x50/0x80
[   26.838983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.839006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.839032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.839059]  kthread+0x337/0x6f0
[   26.839080]  ? trace_preempt_on+0x20/0xc0
[   26.839104]  ? __pfx_kthread+0x10/0x10
[   26.839126]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.839148]  ? calculate_sigpending+0x7b/0xa0
[   26.839174]  ? __pfx_kthread+0x10/0x10
[   26.839197]  ret_from_fork+0x116/0x1d0
[   26.839218]  ? __pfx_kthread+0x10/0x10
[   26.839239]  ret_from_fork_asm+0x1a/0x30
[   26.839271]  </TASK>
[   26.839284] 
[   26.853505] Allocated by task 315:
[   26.853885]  kasan_save_stack+0x45/0x70
[   26.854344]  kasan_save_track+0x18/0x40
[   26.854478]  kasan_save_alloc_info+0x3b/0x50
[   26.854625]  __kasan_kmalloc+0xb7/0xc0
[   26.854767]  __kmalloc_cache_noprof+0x189/0x420
[   26.855186]  kasan_atomics+0x95/0x310
[   26.855654]  kunit_try_run_case+0x1a5/0x480
[   26.856103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.856687]  kthread+0x337/0x6f0
[   26.857049]  ret_from_fork+0x116/0x1d0
[   26.857415]  ret_from_fork_asm+0x1a/0x30
[   26.857824] 
[   26.858027] The buggy address belongs to the object at ffff8881058d6700
[   26.858027]  which belongs to the cache kmalloc-64 of size 64
[   26.859111] The buggy address is located 0 bytes to the right of
[   26.859111]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.860023] 
[   26.860097] The buggy address belongs to the physical page:
[   26.860418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.861165] flags: 0x200000000000000(node=0|zone=2)
[   26.861611] page_type: f5(slab)
[   26.861765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.862222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.862678] page dumped because: kasan: bad access detected
[   26.862872] 
[   26.863062] Memory state around the buggy address:
[   26.863569]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.864061]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.864303] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.864918]                                      ^
[   26.865421]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.865682]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.865941] ==================================================================
[   26.585534] ==================================================================
[   26.586029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   26.586370] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.586704] 
[   26.586870] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.586922] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.586937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.586960] Call Trace:
[   26.586975]  <TASK>
[   26.586992]  dump_stack_lvl+0x73/0xb0
[   26.587022]  print_report+0xd1/0x610
[   26.587047]  ? __virt_addr_valid+0x1db/0x2d0
[   26.587072]  ? kasan_atomics_helper+0x3df/0x5450
[   26.587094]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.587121]  ? kasan_atomics_helper+0x3df/0x5450
[   26.587143]  kasan_report+0x141/0x180
[   26.587166]  ? kasan_atomics_helper+0x3df/0x5450
[   26.587192]  kasan_check_range+0x10c/0x1c0
[   26.587217]  __kasan_check_read+0x15/0x20
[   26.587241]  kasan_atomics_helper+0x3df/0x5450
[   26.587265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.587288]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.587312]  ? kasan_save_alloc_info+0x3b/0x50
[   26.587341]  kasan_atomics+0x1dc/0x310
[   26.587365]  ? __pfx_kasan_atomics+0x10/0x10
[   26.587389]  ? __pfx_read_tsc+0x10/0x10
[   26.587413]  ? ktime_get_ts64+0x86/0x230
[   26.587439]  kunit_try_run_case+0x1a5/0x480
[   26.587462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.587485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.587510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.587536]  ? __kthread_parkme+0x82/0x180
[   26.587558]  ? preempt_count_sub+0x50/0x80
[   26.587634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.587659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.587685]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.587725]  kthread+0x337/0x6f0
[   26.587746]  ? trace_preempt_on+0x20/0xc0
[   26.587782]  ? __pfx_kthread+0x10/0x10
[   26.587804]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.587832]  ? calculate_sigpending+0x7b/0xa0
[   26.587858]  ? __pfx_kthread+0x10/0x10
[   26.587882]  ret_from_fork+0x116/0x1d0
[   26.587903]  ? __pfx_kthread+0x10/0x10
[   26.587943]  ret_from_fork_asm+0x1a/0x30
[   26.587975]  </TASK>
[   26.587988] 
[   26.594933] Allocated by task 315:
[   26.595062]  kasan_save_stack+0x45/0x70
[   26.595201]  kasan_save_track+0x18/0x40
[   26.595329]  kasan_save_alloc_info+0x3b/0x50
[   26.595471]  __kasan_kmalloc+0xb7/0xc0
[   26.595596]  __kmalloc_cache_noprof+0x189/0x420
[   26.595845]  kasan_atomics+0x95/0x310
[   26.596089]  kunit_try_run_case+0x1a5/0x480
[   26.596289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.596541]  kthread+0x337/0x6f0
[   26.596714]  ret_from_fork+0x116/0x1d0
[   26.597088]  ret_from_fork_asm+0x1a/0x30
[   26.597293] 
[   26.597388] The buggy address belongs to the object at ffff8881058d6700
[   26.597388]  which belongs to the cache kmalloc-64 of size 64
[   26.598223] The buggy address is located 0 bytes to the right of
[   26.598223]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.598645] 
[   26.598730] The buggy address belongs to the physical page:
[   26.599254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.599601] flags: 0x200000000000000(node=0|zone=2)
[   26.599771] page_type: f5(slab)
[   26.600204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.600520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.600855] page dumped because: kasan: bad access detected
[   26.601087] 
[   26.601157] Memory state around the buggy address:
[   26.601308]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.601520]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.601762] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.602371]                                      ^
[   26.602604]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.603235]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.603524] ==================================================================
[   26.496177] ==================================================================
[   26.497354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   26.497932] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.498567] 
[   26.498762] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.498818] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.498833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.498868] Call Trace:
[   26.498882]  <TASK>
[   26.498915]  dump_stack_lvl+0x73/0xb0
[   26.498949]  print_report+0xd1/0x610
[   26.498972]  ? __virt_addr_valid+0x1db/0x2d0
[   26.498997]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.499018]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.499044]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.499065]  kasan_report+0x141/0x180
[   26.499087]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.499112]  __asan_report_load4_noabort+0x18/0x20
[   26.499136]  kasan_atomics_helper+0x4bbc/0x5450
[   26.499158]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.499180]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.499204]  ? kasan_save_alloc_info+0x3b/0x50
[   26.499232]  kasan_atomics+0x1dc/0x310
[   26.499253]  ? __pfx_kasan_atomics+0x10/0x10
[   26.499277]  ? __pfx_read_tsc+0x10/0x10
[   26.499300]  ? ktime_get_ts64+0x86/0x230
[   26.499326]  kunit_try_run_case+0x1a5/0x480
[   26.499349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.499370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.499394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.499418]  ? __kthread_parkme+0x82/0x180
[   26.499439]  ? preempt_count_sub+0x50/0x80
[   26.499463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.499485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.499510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.499536]  kthread+0x337/0x6f0
[   26.499555]  ? trace_preempt_on+0x20/0xc0
[   26.499580]  ? __pfx_kthread+0x10/0x10
[   26.499600]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.499623]  ? calculate_sigpending+0x7b/0xa0
[   26.499647]  ? __pfx_kthread+0x10/0x10
[   26.499667]  ret_from_fork+0x116/0x1d0
[   26.499687]  ? __pfx_kthread+0x10/0x10
[   26.499730]  ret_from_fork_asm+0x1a/0x30
[   26.499761]  </TASK>
[   26.499772] 
[   26.512929] Allocated by task 315:
[   26.513065]  kasan_save_stack+0x45/0x70
[   26.513204]  kasan_save_track+0x18/0x40
[   26.513331]  kasan_save_alloc_info+0x3b/0x50
[   26.513468]  __kasan_kmalloc+0xb7/0xc0
[   26.513591]  __kmalloc_cache_noprof+0x189/0x420
[   26.513847]  kasan_atomics+0x95/0x310
[   26.514172]  kunit_try_run_case+0x1a5/0x480
[   26.514532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.514999]  kthread+0x337/0x6f0
[   26.515288]  ret_from_fork+0x116/0x1d0
[   26.515618]  ret_from_fork_asm+0x1a/0x30
[   26.516189] 
[   26.516276] The buggy address belongs to the object at ffff8881058d6700
[   26.516276]  which belongs to the cache kmalloc-64 of size 64
[   26.516622] The buggy address is located 0 bytes to the right of
[   26.516622]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.517610] 
[   26.518674] The buggy address belongs to the physical page:
[   26.520361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.521430] flags: 0x200000000000000(node=0|zone=2)
[   26.521905] page_type: f5(slab)
[   26.522617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.523130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.523364] page dumped because: kasan: bad access detected
[   26.523536] 
[   26.523605] Memory state around the buggy address:
[   26.524438]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.525518]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.526479] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.527395]                                      ^
[   26.528081]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.529099]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.529362] ==================================================================
[   26.603984] ==================================================================
[   26.604273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   26.604567] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.604964] 
[   26.605075] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.605123] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.605139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.605160] Call Trace:
[   26.605177]  <TASK>
[   26.605193]  dump_stack_lvl+0x73/0xb0
[   26.605222]  print_report+0xd1/0x610
[   26.605244]  ? __virt_addr_valid+0x1db/0x2d0
[   26.605268]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.605291]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.605318]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.605340]  kasan_report+0x141/0x180
[   26.605363]  ? kasan_atomics_helper+0x4b54/0x5450
[   26.605390]  __asan_report_load4_noabort+0x18/0x20
[   26.605415]  kasan_atomics_helper+0x4b54/0x5450
[   26.605439]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.605461]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.605486]  ? kasan_save_alloc_info+0x3b/0x50
[   26.605514]  kasan_atomics+0x1dc/0x310
[   26.605539]  ? __pfx_kasan_atomics+0x10/0x10
[   26.605564]  ? __pfx_read_tsc+0x10/0x10
[   26.605587]  ? ktime_get_ts64+0x86/0x230
[   26.605611]  kunit_try_run_case+0x1a5/0x480
[   26.605634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.605655]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.605680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.605718]  ? __kthread_parkme+0x82/0x180
[   26.605739]  ? preempt_count_sub+0x50/0x80
[   26.605764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.605797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.605823]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.605850]  kthread+0x337/0x6f0
[   26.605871]  ? trace_preempt_on+0x20/0xc0
[   26.605939]  ? __pfx_kthread+0x10/0x10
[   26.605963]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.605987]  ? calculate_sigpending+0x7b/0xa0
[   26.606011]  ? __pfx_kthread+0x10/0x10
[   26.606034]  ret_from_fork+0x116/0x1d0
[   26.606055]  ? __pfx_kthread+0x10/0x10
[   26.606077]  ret_from_fork_asm+0x1a/0x30
[   26.606110]  </TASK>
[   26.606121] 
[   26.613421] Allocated by task 315:
[   26.613549]  kasan_save_stack+0x45/0x70
[   26.613689]  kasan_save_track+0x18/0x40
[   26.614067]  kasan_save_alloc_info+0x3b/0x50
[   26.614284]  __kasan_kmalloc+0xb7/0xc0
[   26.614478]  __kmalloc_cache_noprof+0x189/0x420
[   26.614687]  kasan_atomics+0x95/0x310
[   26.614959]  kunit_try_run_case+0x1a5/0x480
[   26.615139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.615357]  kthread+0x337/0x6f0
[   26.615506]  ret_from_fork+0x116/0x1d0
[   26.615680]  ret_from_fork_asm+0x1a/0x30
[   26.615959] 
[   26.616042] The buggy address belongs to the object at ffff8881058d6700
[   26.616042]  which belongs to the cache kmalloc-64 of size 64
[   26.616449] The buggy address is located 0 bytes to the right of
[   26.616449]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.617065] 
[   26.617178] The buggy address belongs to the physical page:
[   26.617432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.617846] flags: 0x200000000000000(node=0|zone=2)
[   26.618254] page_type: f5(slab)
[   26.618431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.618724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.619095] page dumped because: kasan: bad access detected
[   26.619269] 
[   26.619335] Memory state around the buggy address:
[   26.619555]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.620026]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.620247] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.620456]                                      ^
[   26.620608]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.621355]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.621686] ==================================================================
[   26.867047] ==================================================================
[   26.867765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   26.868587] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.869252] 
[   26.869476] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.869532] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.869547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.869584] Call Trace:
[   26.869601]  <TASK>
[   26.869623]  dump_stack_lvl+0x73/0xb0
[   26.869670]  print_report+0xd1/0x610
[   26.869704]  ? __virt_addr_valid+0x1db/0x2d0
[   26.869731]  ? kasan_atomics_helper+0x992/0x5450
[   26.869763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.869800]  ? kasan_atomics_helper+0x992/0x5450
[   26.869834]  kasan_report+0x141/0x180
[   26.869857]  ? kasan_atomics_helper+0x992/0x5450
[   26.869884]  kasan_check_range+0x10c/0x1c0
[   26.869908]  __kasan_check_write+0x18/0x20
[   26.869932]  kasan_atomics_helper+0x992/0x5450
[   26.869955]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.869978]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.870004]  ? kasan_save_alloc_info+0x3b/0x50
[   26.870033]  kasan_atomics+0x1dc/0x310
[   26.870057]  ? __pfx_kasan_atomics+0x10/0x10
[   26.870082]  ? __pfx_read_tsc+0x10/0x10
[   26.870106]  ? ktime_get_ts64+0x86/0x230
[   26.870133]  kunit_try_run_case+0x1a5/0x480
[   26.870156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.870178]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.870203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.870228]  ? __kthread_parkme+0x82/0x180
[   26.870251]  ? preempt_count_sub+0x50/0x80
[   26.870275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.870298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.870324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.870351]  kthread+0x337/0x6f0
[   26.870372]  ? trace_preempt_on+0x20/0xc0
[   26.870397]  ? __pfx_kthread+0x10/0x10
[   26.870418]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.870442]  ? calculate_sigpending+0x7b/0xa0
[   26.870467]  ? __pfx_kthread+0x10/0x10
[   26.870490]  ret_from_fork+0x116/0x1d0
[   26.870511]  ? __pfx_kthread+0x10/0x10
[   26.870532]  ret_from_fork_asm+0x1a/0x30
[   26.870564]  </TASK>
[   26.870577] 
[   26.883119] Allocated by task 315:
[   26.883466]  kasan_save_stack+0x45/0x70
[   26.883791]  kasan_save_track+0x18/0x40
[   26.883932]  kasan_save_alloc_info+0x3b/0x50
[   26.884348]  __kasan_kmalloc+0xb7/0xc0
[   26.884711]  __kmalloc_cache_noprof+0x189/0x420
[   26.885045]  kasan_atomics+0x95/0x310
[   26.885187]  kunit_try_run_case+0x1a5/0x480
[   26.885538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.886180]  kthread+0x337/0x6f0
[   26.886410]  ret_from_fork+0x116/0x1d0
[   26.886658]  ret_from_fork_asm+0x1a/0x30
[   26.886828] 
[   26.886963] The buggy address belongs to the object at ffff8881058d6700
[   26.886963]  which belongs to the cache kmalloc-64 of size 64
[   26.887567] The buggy address is located 0 bytes to the right of
[   26.887567]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.888139] 
[   26.888317] The buggy address belongs to the physical page:
[   26.888594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.888883] flags: 0x200000000000000(node=0|zone=2)
[   26.889336] page_type: f5(slab)
[   26.889631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.890308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.890994] page dumped because: kasan: bad access detected
[   26.891409] 
[   26.891477] Memory state around the buggy address:
[   26.891629]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.892046]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.892662] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.893286]                                      ^
[   26.893718]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.894453]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.894666] ==================================================================
[   27.014064] ==================================================================
[   27.014446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   27.014830] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.015156] 
[   27.015265] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.015326] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.015342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.015364] Call Trace:
[   27.015393]  <TASK>
[   27.015411]  dump_stack_lvl+0x73/0xb0
[   27.015443]  print_report+0xd1/0x610
[   27.015466]  ? __virt_addr_valid+0x1db/0x2d0
[   27.015500]  ? kasan_atomics_helper+0xde0/0x5450
[   27.015522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.015549]  ? kasan_atomics_helper+0xde0/0x5450
[   27.015582]  kasan_report+0x141/0x180
[   27.015605]  ? kasan_atomics_helper+0xde0/0x5450
[   27.015631]  kasan_check_range+0x10c/0x1c0
[   27.015656]  __kasan_check_write+0x18/0x20
[   27.015679]  kasan_atomics_helper+0xde0/0x5450
[   27.015721]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.015744]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.015768]  ? kasan_save_alloc_info+0x3b/0x50
[   27.015821]  kasan_atomics+0x1dc/0x310
[   27.015844]  ? __pfx_kasan_atomics+0x10/0x10
[   27.015868]  ? __pfx_read_tsc+0x10/0x10
[   27.015891]  ? ktime_get_ts64+0x86/0x230
[   27.015917]  kunit_try_run_case+0x1a5/0x480
[   27.015940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.015961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.015986]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.016011]  ? __kthread_parkme+0x82/0x180
[   27.016032]  ? preempt_count_sub+0x50/0x80
[   27.016057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.016079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.016105]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.016132]  kthread+0x337/0x6f0
[   27.016153]  ? trace_preempt_on+0x20/0xc0
[   27.016177]  ? __pfx_kthread+0x10/0x10
[   27.016208]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.016231]  ? calculate_sigpending+0x7b/0xa0
[   27.016267]  ? __pfx_kthread+0x10/0x10
[   27.016290]  ret_from_fork+0x116/0x1d0
[   27.016311]  ? __pfx_kthread+0x10/0x10
[   27.016332]  ret_from_fork_asm+0x1a/0x30
[   27.016364]  </TASK>
[   27.016376] 
[   27.024284] Allocated by task 315:
[   27.024467]  kasan_save_stack+0x45/0x70
[   27.024645]  kasan_save_track+0x18/0x40
[   27.024845]  kasan_save_alloc_info+0x3b/0x50
[   27.025044]  __kasan_kmalloc+0xb7/0xc0
[   27.025235]  __kmalloc_cache_noprof+0x189/0x420
[   27.025435]  kasan_atomics+0x95/0x310
[   27.025614]  kunit_try_run_case+0x1a5/0x480
[   27.025879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.026106]  kthread+0x337/0x6f0
[   27.026264]  ret_from_fork+0x116/0x1d0
[   27.026397]  ret_from_fork_asm+0x1a/0x30
[   27.026540] 
[   27.026652] The buggy address belongs to the object at ffff8881058d6700
[   27.026652]  which belongs to the cache kmalloc-64 of size 64
[   27.027122] The buggy address is located 0 bytes to the right of
[   27.027122]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.027893] 
[   27.027963] The buggy address belongs to the physical page:
[   27.028230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.028485] flags: 0x200000000000000(node=0|zone=2)
[   27.028645] page_type: f5(slab)
[   27.028775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.029005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.029524] page dumped because: kasan: bad access detected
[   27.029779] 
[   27.029868] Memory state around the buggy address:
[   27.030083]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.030522]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.030753] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.031070]                                      ^
[   27.031256]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.031534]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.031755] ==================================================================
[   27.072372] ==================================================================
[   27.072740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   27.073437] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.073833] 
[   27.073947] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.074015] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.074031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.074055] Call Trace:
[   27.074077]  <TASK>
[   27.074097]  dump_stack_lvl+0x73/0xb0
[   27.074130]  print_report+0xd1/0x610
[   27.074153]  ? __virt_addr_valid+0x1db/0x2d0
[   27.074179]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.074201]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.074230]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.074253]  kasan_report+0x141/0x180
[   27.074276]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.074312]  kasan_check_range+0x10c/0x1c0
[   27.074337]  __kasan_check_write+0x18/0x20
[   27.074371]  kasan_atomics_helper+0xfa9/0x5450
[   27.074395]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.074418]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.074444]  ? kasan_save_alloc_info+0x3b/0x50
[   27.074473]  kasan_atomics+0x1dc/0x310
[   27.074506]  ? __pfx_kasan_atomics+0x10/0x10
[   27.074532]  ? __pfx_read_tsc+0x10/0x10
[   27.074567]  ? ktime_get_ts64+0x86/0x230
[   27.074595]  kunit_try_run_case+0x1a5/0x480
[   27.074623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.074645]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.074679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.074721]  ? __kthread_parkme+0x82/0x180
[   27.074743]  ? preempt_count_sub+0x50/0x80
[   27.074767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.074799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.074825]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.074852]  kthread+0x337/0x6f0
[   27.074882]  ? trace_preempt_on+0x20/0xc0
[   27.074907]  ? __pfx_kthread+0x10/0x10
[   27.074929]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.074962]  ? calculate_sigpending+0x7b/0xa0
[   27.074988]  ? __pfx_kthread+0x10/0x10
[   27.075011]  ret_from_fork+0x116/0x1d0
[   27.075032]  ? __pfx_kthread+0x10/0x10
[   27.075063]  ret_from_fork_asm+0x1a/0x30
[   27.075096]  </TASK>
[   27.075109] 
[   27.082504] Allocated by task 315:
[   27.082632]  kasan_save_stack+0x45/0x70
[   27.082883]  kasan_save_track+0x18/0x40
[   27.083072]  kasan_save_alloc_info+0x3b/0x50
[   27.083339]  __kasan_kmalloc+0xb7/0xc0
[   27.083538]  __kmalloc_cache_noprof+0x189/0x420
[   27.083766]  kasan_atomics+0x95/0x310
[   27.083927]  kunit_try_run_case+0x1a5/0x480
[   27.084069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.084314]  kthread+0x337/0x6f0
[   27.084506]  ret_from_fork+0x116/0x1d0
[   27.084704]  ret_from_fork_asm+0x1a/0x30
[   27.084922] 
[   27.085005] The buggy address belongs to the object at ffff8881058d6700
[   27.085005]  which belongs to the cache kmalloc-64 of size 64
[   27.085492] The buggy address is located 0 bytes to the right of
[   27.085492]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.086058] 
[   27.086131] The buggy address belongs to the physical page:
[   27.086299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.086536] flags: 0x200000000000000(node=0|zone=2)
[   27.086709] page_type: f5(slab)
[   27.087035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.087371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.087707] page dumped because: kasan: bad access detected
[   27.088210] 
[   27.088287] Memory state around the buggy address:
[   27.088439]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.088650]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.088993] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.089339]                                      ^
[   27.089590]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.089976]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.090254] ==================================================================
[   27.151077] ==================================================================
[   27.151864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   27.152248] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.152494] 
[   27.152581] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.152636] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.152651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.152675] Call Trace:
[   27.152707]  <TASK>
[   27.152732]  dump_stack_lvl+0x73/0xb0
[   27.152766]  print_report+0xd1/0x610
[   27.152790]  ? __virt_addr_valid+0x1db/0x2d0
[   27.152816]  ? kasan_atomics_helper+0x1148/0x5450
[   27.152839]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.152866]  ? kasan_atomics_helper+0x1148/0x5450
[   27.152889]  kasan_report+0x141/0x180
[   27.152912]  ? kasan_atomics_helper+0x1148/0x5450
[   27.152939]  kasan_check_range+0x10c/0x1c0
[   27.152964]  __kasan_check_write+0x18/0x20
[   27.153011]  kasan_atomics_helper+0x1148/0x5450
[   27.153035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.153058]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.153095]  ? kasan_save_alloc_info+0x3b/0x50
[   27.153124]  kasan_atomics+0x1dc/0x310
[   27.153148]  ? __pfx_kasan_atomics+0x10/0x10
[   27.153173]  ? __pfx_read_tsc+0x10/0x10
[   27.153198]  ? ktime_get_ts64+0x86/0x230
[   27.153226]  kunit_try_run_case+0x1a5/0x480
[   27.153250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.153272]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.153297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.153323]  ? __kthread_parkme+0x82/0x180
[   27.153346]  ? preempt_count_sub+0x50/0x80
[   27.153371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.153394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.153420]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.153447]  kthread+0x337/0x6f0
[   27.153468]  ? trace_preempt_on+0x20/0xc0
[   27.153504]  ? __pfx_kthread+0x10/0x10
[   27.153527]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.153550]  ? calculate_sigpending+0x7b/0xa0
[   27.153587]  ? __pfx_kthread+0x10/0x10
[   27.153610]  ret_from_fork+0x116/0x1d0
[   27.153631]  ? __pfx_kthread+0x10/0x10
[   27.153664]  ret_from_fork_asm+0x1a/0x30
[   27.153707]  </TASK>
[   27.153719] 
[   27.161286] Allocated by task 315:
[   27.161496]  kasan_save_stack+0x45/0x70
[   27.161718]  kasan_save_track+0x18/0x40
[   27.162061]  kasan_save_alloc_info+0x3b/0x50
[   27.162265]  __kasan_kmalloc+0xb7/0xc0
[   27.162395]  __kmalloc_cache_noprof+0x189/0x420
[   27.162547]  kasan_atomics+0x95/0x310
[   27.162677]  kunit_try_run_case+0x1a5/0x480
[   27.163012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.163264]  kthread+0x337/0x6f0
[   27.163428]  ret_from_fork+0x116/0x1d0
[   27.163614]  ret_from_fork_asm+0x1a/0x30
[   27.163854] 
[   27.163932] The buggy address belongs to the object at ffff8881058d6700
[   27.163932]  which belongs to the cache kmalloc-64 of size 64
[   27.164283] The buggy address is located 0 bytes to the right of
[   27.164283]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.164916] 
[   27.165008] The buggy address belongs to the physical page:
[   27.165211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.165450] flags: 0x200000000000000(node=0|zone=2)
[   27.165612] page_type: f5(slab)
[   27.165756] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.166125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.166452] page dumped because: kasan: bad access detected
[   27.166705] 
[   27.166797] Memory state around the buggy address:
[   27.167015]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.167269]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.167478] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.167685]                                      ^
[   27.167964]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.168281]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.168617] ==================================================================
[   27.665994] ==================================================================
[   27.666703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   27.667165] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.667591] 
[   27.667767] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.667837] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.667853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.667876] Call Trace:
[   27.667896]  <TASK>
[   27.667917]  dump_stack_lvl+0x73/0xb0
[   27.667951]  print_report+0xd1/0x610
[   27.667976]  ? __virt_addr_valid+0x1db/0x2d0
[   27.668007]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.668030]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.668057]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.668079]  kasan_report+0x141/0x180
[   27.668102]  ? kasan_atomics_helper+0x1e12/0x5450
[   27.668129]  kasan_check_range+0x10c/0x1c0
[   27.668152]  __kasan_check_write+0x18/0x20
[   27.668176]  kasan_atomics_helper+0x1e12/0x5450
[   27.668200]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.668221]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.668246]  ? kasan_save_alloc_info+0x3b/0x50
[   27.668275]  kasan_atomics+0x1dc/0x310
[   27.668297]  ? __pfx_kasan_atomics+0x10/0x10
[   27.668321]  ? __pfx_read_tsc+0x10/0x10
[   27.668345]  ? ktime_get_ts64+0x86/0x230
[   27.668372]  kunit_try_run_case+0x1a5/0x480
[   27.668396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.668416]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.668441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.668466]  ? __kthread_parkme+0x82/0x180
[   27.668488]  ? preempt_count_sub+0x50/0x80
[   27.668512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.668535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.668561]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.668588]  kthread+0x337/0x6f0
[   27.668608]  ? trace_preempt_on+0x20/0xc0
[   27.668633]  ? __pfx_kthread+0x10/0x10
[   27.668654]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.668677]  ? calculate_sigpending+0x7b/0xa0
[   27.668714]  ? __pfx_kthread+0x10/0x10
[   27.668737]  ret_from_fork+0x116/0x1d0
[   27.668758]  ? __pfx_kthread+0x10/0x10
[   27.668789]  ret_from_fork_asm+0x1a/0x30
[   27.668822]  </TASK>
[   27.668834] 
[   27.675947] Allocated by task 315:
[   27.676124]  kasan_save_stack+0x45/0x70
[   27.676329]  kasan_save_track+0x18/0x40
[   27.676517]  kasan_save_alloc_info+0x3b/0x50
[   27.676735]  __kasan_kmalloc+0xb7/0xc0
[   27.676921]  __kmalloc_cache_noprof+0x189/0x420
[   27.677101]  kasan_atomics+0x95/0x310
[   27.677230]  kunit_try_run_case+0x1a5/0x480
[   27.677426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.677678]  kthread+0x337/0x6f0
[   27.677852]  ret_from_fork+0x116/0x1d0
[   27.677983]  ret_from_fork_asm+0x1a/0x30
[   27.678154] 
[   27.678245] The buggy address belongs to the object at ffff8881058d6700
[   27.678245]  which belongs to the cache kmalloc-64 of size 64
[   27.678746] The buggy address is located 0 bytes to the right of
[   27.678746]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.679223] 
[   27.679293] The buggy address belongs to the physical page:
[   27.679543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.679922] flags: 0x200000000000000(node=0|zone=2)
[   27.680103] page_type: f5(slab)
[   27.680220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.680447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.680666] page dumped because: kasan: bad access detected
[   27.680867] 
[   27.680955] Memory state around the buggy address:
[   27.681177]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.681500]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.681825] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.682039]                                      ^
[   27.682191]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.682400]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.682679] ==================================================================
[   27.804672] ==================================================================
[   27.805430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   27.806014] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.806345] 
[   27.806454] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.806509] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.806525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.806548] Call Trace:
[   27.806570]  <TASK>
[   27.806590]  dump_stack_lvl+0x73/0xb0
[   27.806622]  print_report+0xd1/0x610
[   27.806645]  ? __virt_addr_valid+0x1db/0x2d0
[   27.806671]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.806705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.806732]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.806754]  kasan_report+0x141/0x180
[   27.806777]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.806804]  __asan_report_load8_noabort+0x18/0x20
[   27.806854]  kasan_atomics_helper+0x4fb2/0x5450
[   27.806893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.806918]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.806972]  ? kasan_save_alloc_info+0x3b/0x50
[   27.807000]  kasan_atomics+0x1dc/0x310
[   27.807023]  ? __pfx_kasan_atomics+0x10/0x10
[   27.807048]  ? __pfx_read_tsc+0x10/0x10
[   27.807071]  ? ktime_get_ts64+0x86/0x230
[   27.807098]  kunit_try_run_case+0x1a5/0x480
[   27.807121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.807142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.807167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.807192]  ? __kthread_parkme+0x82/0x180
[   27.807215]  ? preempt_count_sub+0x50/0x80
[   27.807239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.807280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.807319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.807346]  kthread+0x337/0x6f0
[   27.807380]  ? trace_preempt_on+0x20/0xc0
[   27.807417]  ? __pfx_kthread+0x10/0x10
[   27.807439]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.807462]  ? calculate_sigpending+0x7b/0xa0
[   27.807486]  ? __pfx_kthread+0x10/0x10
[   27.807509]  ret_from_fork+0x116/0x1d0
[   27.807530]  ? __pfx_kthread+0x10/0x10
[   27.807551]  ret_from_fork_asm+0x1a/0x30
[   27.807584]  </TASK>
[   27.807597] 
[   27.814836] Allocated by task 315:
[   27.815037]  kasan_save_stack+0x45/0x70
[   27.815244]  kasan_save_track+0x18/0x40
[   27.815424]  kasan_save_alloc_info+0x3b/0x50
[   27.815582]  __kasan_kmalloc+0xb7/0xc0
[   27.815790]  __kmalloc_cache_noprof+0x189/0x420
[   27.816111]  kasan_atomics+0x95/0x310
[   27.816325]  kunit_try_run_case+0x1a5/0x480
[   27.816518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.816753]  kthread+0x337/0x6f0
[   27.816899]  ret_from_fork+0x116/0x1d0
[   27.817025]  ret_from_fork_asm+0x1a/0x30
[   27.817341] 
[   27.817433] The buggy address belongs to the object at ffff8881058d6700
[   27.817433]  which belongs to the cache kmalloc-64 of size 64
[   27.817957] The buggy address is located 0 bytes to the right of
[   27.817957]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.818564] 
[   27.818661] The buggy address belongs to the physical page:
[   27.819127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.819467] flags: 0x200000000000000(node=0|zone=2)
[   27.819646] page_type: f5(slab)
[   27.819772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.819997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.820211] page dumped because: kasan: bad access detected
[   27.820592] 
[   27.820680] Memory state around the buggy address:
[   27.821018]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.821356]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.821702] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.822053]                                      ^
[   27.822419]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.822754]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.823074] ==================================================================
[   26.552370] ==================================================================
[   26.552652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   26.552894] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.553111] 
[   26.553191] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.553238] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.553253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.553276] Call Trace:
[   26.553292]  <TASK>
[   26.553311]  dump_stack_lvl+0x73/0xb0
[   26.553340]  print_report+0xd1/0x610
[   26.553361]  ? __virt_addr_valid+0x1db/0x2d0
[   26.553386]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.553407]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.553433]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.553455]  kasan_report+0x141/0x180
[   26.553476]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.553502]  __asan_report_load4_noabort+0x18/0x20
[   26.553526]  kasan_atomics_helper+0x4b88/0x5450
[   26.553548]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.553572]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.553596]  ? kasan_save_alloc_info+0x3b/0x50
[   26.553624]  kasan_atomics+0x1dc/0x310
[   26.553647]  ? __pfx_kasan_atomics+0x10/0x10
[   26.553671]  ? __pfx_read_tsc+0x10/0x10
[   26.553704]  ? ktime_get_ts64+0x86/0x230
[   26.553732]  kunit_try_run_case+0x1a5/0x480
[   26.553754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.553775]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.553800]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.553824]  ? __kthread_parkme+0x82/0x180
[   26.553845]  ? preempt_count_sub+0x50/0x80
[   26.553868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.553890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.553915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.553941]  kthread+0x337/0x6f0
[   26.553961]  ? trace_preempt_on+0x20/0xc0
[   26.553985]  ? __pfx_kthread+0x10/0x10
[   26.554006]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.554027]  ? calculate_sigpending+0x7b/0xa0
[   26.554105]  ? __pfx_kthread+0x10/0x10
[   26.554132]  ret_from_fork+0x116/0x1d0
[   26.554153]  ? __pfx_kthread+0x10/0x10
[   26.554176]  ret_from_fork_asm+0x1a/0x30
[   26.554208]  </TASK>
[   26.554221] 
[   26.561419] Allocated by task 315:
[   26.561568]  kasan_save_stack+0x45/0x70
[   26.561736]  kasan_save_track+0x18/0x40
[   26.561918]  kasan_save_alloc_info+0x3b/0x50
[   26.562132]  __kasan_kmalloc+0xb7/0xc0
[   26.562265]  __kmalloc_cache_noprof+0x189/0x420
[   26.562417]  kasan_atomics+0x95/0x310
[   26.562549]  kunit_try_run_case+0x1a5/0x480
[   26.562705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.563109]  kthread+0x337/0x6f0
[   26.563283]  ret_from_fork+0x116/0x1d0
[   26.563468]  ret_from_fork_asm+0x1a/0x30
[   26.563660] 
[   26.563761] The buggy address belongs to the object at ffff8881058d6700
[   26.563761]  which belongs to the cache kmalloc-64 of size 64
[   26.564422] The buggy address is located 0 bytes to the right of
[   26.564422]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.564794] 
[   26.564953] The buggy address belongs to the physical page:
[   26.565175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.565413] flags: 0x200000000000000(node=0|zone=2)
[   26.565573] page_type: f5(slab)
[   26.565709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.566342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.566648] page dumped because: kasan: bad access detected
[   26.566931] 
[   26.567004] Memory state around the buggy address:
[   26.567157]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.567368]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.567578] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.567856]                                      ^
[   26.568025]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.568332]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.568649] ==================================================================
[   26.644500] ==================================================================
[   26.644906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   26.645353] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.645598] 
[   26.645679] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.645743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.645757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.645779] Call Trace:
[   26.645793]  <TASK>
[   26.645811]  dump_stack_lvl+0x73/0xb0
[   26.645840]  print_report+0xd1/0x610
[   26.646085]  ? __virt_addr_valid+0x1db/0x2d0
[   26.646116]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.646140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.646167]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.646189]  kasan_report+0x141/0x180
[   26.646212]  ? kasan_atomics_helper+0x4b3a/0x5450
[   26.646239]  __asan_report_store4_noabort+0x1b/0x30
[   26.646264]  kasan_atomics_helper+0x4b3a/0x5450
[   26.646287]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.646310]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.646335]  ? kasan_save_alloc_info+0x3b/0x50
[   26.646363]  kasan_atomics+0x1dc/0x310
[   26.646391]  ? __pfx_kasan_atomics+0x10/0x10
[   26.646418]  ? __pfx_read_tsc+0x10/0x10
[   26.646442]  ? ktime_get_ts64+0x86/0x230
[   26.646468]  kunit_try_run_case+0x1a5/0x480
[   26.646491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.646513]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.646538]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.646563]  ? __kthread_parkme+0x82/0x180
[   26.646585]  ? preempt_count_sub+0x50/0x80
[   26.646611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.646654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.646681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.646718]  kthread+0x337/0x6f0
[   26.646740]  ? trace_preempt_on+0x20/0xc0
[   26.646765]  ? __pfx_kthread+0x10/0x10
[   26.646797]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.646821]  ? calculate_sigpending+0x7b/0xa0
[   26.646846]  ? __pfx_kthread+0x10/0x10
[   26.646869]  ret_from_fork+0x116/0x1d0
[   26.646938]  ? __pfx_kthread+0x10/0x10
[   26.646961]  ret_from_fork_asm+0x1a/0x30
[   26.646993]  </TASK>
[   26.647005] 
[   26.654756] Allocated by task 315:
[   26.655005]  kasan_save_stack+0x45/0x70
[   26.655291]  kasan_save_track+0x18/0x40
[   26.655509]  kasan_save_alloc_info+0x3b/0x50
[   26.655704]  __kasan_kmalloc+0xb7/0xc0
[   26.655973]  __kmalloc_cache_noprof+0x189/0x420
[   26.656368]  kasan_atomics+0x95/0x310
[   26.656503]  kunit_try_run_case+0x1a5/0x480
[   26.656714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.656967]  kthread+0x337/0x6f0
[   26.657195]  ret_from_fork+0x116/0x1d0
[   26.657404]  ret_from_fork_asm+0x1a/0x30
[   26.657546] 
[   26.657614] The buggy address belongs to the object at ffff8881058d6700
[   26.657614]  which belongs to the cache kmalloc-64 of size 64
[   26.658135] The buggy address is located 0 bytes to the right of
[   26.658135]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.658595] 
[   26.658804] The buggy address belongs to the physical page:
[   26.659119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.659481] flags: 0x200000000000000(node=0|zone=2)
[   26.659645] page_type: f5(slab)
[   26.659776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.660008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.660647] page dumped because: kasan: bad access detected
[   26.660890] 
[   26.660958] Memory state around the buggy address:
[   26.661109]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.661423]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.661736] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.662537]                                      ^
[   26.662918]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.663278]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.663520] ==================================================================
[   26.624119] ==================================================================
[   26.624531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   26.625337] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.626012] 
[   26.626143] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.626339] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.626355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.626379] Call Trace:
[   26.626401]  <TASK>
[   26.626418]  dump_stack_lvl+0x73/0xb0
[   26.626449]  print_report+0xd1/0x610
[   26.626471]  ? __virt_addr_valid+0x1db/0x2d0
[   26.626496]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.626519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.626545]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.626568]  kasan_report+0x141/0x180
[   26.626591]  ? kasan_atomics_helper+0x4a0/0x5450
[   26.626617]  kasan_check_range+0x10c/0x1c0
[   26.626641]  __kasan_check_write+0x18/0x20
[   26.626665]  kasan_atomics_helper+0x4a0/0x5450
[   26.626688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.626722]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.626747]  ? kasan_save_alloc_info+0x3b/0x50
[   26.626776]  kasan_atomics+0x1dc/0x310
[   26.626799]  ? __pfx_kasan_atomics+0x10/0x10
[   26.626824]  ? __pfx_read_tsc+0x10/0x10
[   26.626847]  ? ktime_get_ts64+0x86/0x230
[   26.626873]  kunit_try_run_case+0x1a5/0x480
[   26.626905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.626926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.626952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.626977]  ? __kthread_parkme+0x82/0x180
[   26.626999]  ? preempt_count_sub+0x50/0x80
[   26.627023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.627046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.627074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.627100]  kthread+0x337/0x6f0
[   26.627121]  ? trace_preempt_on+0x20/0xc0
[   26.627145]  ? __pfx_kthread+0x10/0x10
[   26.627167]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.627190]  ? calculate_sigpending+0x7b/0xa0
[   26.627215]  ? __pfx_kthread+0x10/0x10
[   26.627238]  ret_from_fork+0x116/0x1d0
[   26.627259]  ? __pfx_kthread+0x10/0x10
[   26.627281]  ret_from_fork_asm+0x1a/0x30
[   26.627313]  </TASK>
[   26.627326] 
[   26.635730] Allocated by task 315:
[   26.636011]  kasan_save_stack+0x45/0x70
[   26.636165]  kasan_save_track+0x18/0x40
[   26.636301]  kasan_save_alloc_info+0x3b/0x50
[   26.636524]  __kasan_kmalloc+0xb7/0xc0
[   26.636714]  __kmalloc_cache_noprof+0x189/0x420
[   26.636867]  kasan_atomics+0x95/0x310
[   26.637212]  kunit_try_run_case+0x1a5/0x480
[   26.637427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.637656]  kthread+0x337/0x6f0
[   26.637786]  ret_from_fork+0x116/0x1d0
[   26.637917]  ret_from_fork_asm+0x1a/0x30
[   26.638056] 
[   26.638139] The buggy address belongs to the object at ffff8881058d6700
[   26.638139]  which belongs to the cache kmalloc-64 of size 64
[   26.638769] The buggy address is located 0 bytes to the right of
[   26.638769]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.639578] 
[   26.639714] The buggy address belongs to the physical page:
[   26.640246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.640532] flags: 0x200000000000000(node=0|zone=2)
[   26.640796] page_type: f5(slab)
[   26.641053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.641281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.641495] page dumped because: kasan: bad access detected
[   26.641657] 
[   26.641752] Memory state around the buggy address:
[   26.641979]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.642302]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.642623] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.643050]                                      ^
[   26.643279]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.643569]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.643939] ==================================================================
[   26.765430] ==================================================================
[   26.765706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   26.766056] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.766368] 
[   26.766455] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.766522] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.766538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.766561] Call Trace:
[   26.766580]  <TASK>
[   26.766599]  dump_stack_lvl+0x73/0xb0
[   26.766630]  print_report+0xd1/0x610
[   26.766655]  ? __virt_addr_valid+0x1db/0x2d0
[   26.766681]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.766717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.766744]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.766765]  kasan_report+0x141/0x180
[   26.766789]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.766817]  kasan_check_range+0x10c/0x1c0
[   26.766852]  __kasan_check_write+0x18/0x20
[   26.766877]  kasan_atomics_helper+0x7c7/0x5450
[   26.766916]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.766940]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.766965]  ? kasan_save_alloc_info+0x3b/0x50
[   26.766993]  kasan_atomics+0x1dc/0x310
[   26.767017]  ? __pfx_kasan_atomics+0x10/0x10
[   26.767041]  ? __pfx_read_tsc+0x10/0x10
[   26.767065]  ? ktime_get_ts64+0x86/0x230
[   26.767091]  kunit_try_run_case+0x1a5/0x480
[   26.767116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.767136]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.767162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.767187]  ? __kthread_parkme+0x82/0x180
[   26.767208]  ? preempt_count_sub+0x50/0x80
[   26.767234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.767256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.767282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.767308]  kthread+0x337/0x6f0
[   26.767328]  ? trace_preempt_on+0x20/0xc0
[   26.767353]  ? __pfx_kthread+0x10/0x10
[   26.767376]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.767399]  ? calculate_sigpending+0x7b/0xa0
[   26.767425]  ? __pfx_kthread+0x10/0x10
[   26.767448]  ret_from_fork+0x116/0x1d0
[   26.767470]  ? __pfx_kthread+0x10/0x10
[   26.767492]  ret_from_fork_asm+0x1a/0x30
[   26.767525]  </TASK>
[   26.767538] 
[   26.778466] Allocated by task 315:
[   26.778607]  kasan_save_stack+0x45/0x70
[   26.778967]  kasan_save_track+0x18/0x40
[   26.780815]  kasan_save_alloc_info+0x3b/0x50
[   26.781510]  __kasan_kmalloc+0xb7/0xc0
[   26.781676]  __kmalloc_cache_noprof+0x189/0x420
[   26.781853]  kasan_atomics+0x95/0x310
[   26.781985]  kunit_try_run_case+0x1a5/0x480
[   26.782126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.782297]  kthread+0x337/0x6f0
[   26.782415]  ret_from_fork+0x116/0x1d0
[   26.782546]  ret_from_fork_asm+0x1a/0x30
[   26.782685] 
[   26.784142] The buggy address belongs to the object at ffff8881058d6700
[   26.784142]  which belongs to the cache kmalloc-64 of size 64
[   26.786138] The buggy address is located 0 bytes to the right of
[   26.786138]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.787852] 
[   26.788269] The buggy address belongs to the physical page:
[   26.789333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.790389] flags: 0x200000000000000(node=0|zone=2)
[   26.791029] page_type: f5(slab)
[   26.791490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.791989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.793030] page dumped because: kasan: bad access detected
[   26.793714] 
[   26.794095] Memory state around the buggy address:
[   26.794602]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.795650]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.796372] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.796605]                                      ^
[   26.797040]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.798032]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.798796] ==================================================================
[   27.823629] ==================================================================
[   27.824096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   27.824485] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.826983] 
[   27.827517] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.827578] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.827594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.827618] Call Trace:
[   27.827638]  <TASK>
[   27.827658]  dump_stack_lvl+0x73/0xb0
[   27.827709]  print_report+0xd1/0x610
[   27.827733]  ? __virt_addr_valid+0x1db/0x2d0
[   27.827892]  ? kasan_atomics_helper+0x218a/0x5450
[   27.827929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.827959]  ? kasan_atomics_helper+0x218a/0x5450
[   27.827982]  kasan_report+0x141/0x180
[   27.828006]  ? kasan_atomics_helper+0x218a/0x5450
[   27.828034]  kasan_check_range+0x10c/0x1c0
[   27.828095]  __kasan_check_write+0x18/0x20
[   27.828160]  kasan_atomics_helper+0x218a/0x5450
[   27.828186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.828221]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.828247]  ? kasan_save_alloc_info+0x3b/0x50
[   27.828279]  kasan_atomics+0x1dc/0x310
[   27.828305]  ? __pfx_kasan_atomics+0x10/0x10
[   27.828330]  ? __pfx_read_tsc+0x10/0x10
[   27.828354]  ? ktime_get_ts64+0x86/0x230
[   27.828382]  kunit_try_run_case+0x1a5/0x480
[   27.828405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.828427]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.828453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.828478]  ? __kthread_parkme+0x82/0x180
[   27.828499]  ? preempt_count_sub+0x50/0x80
[   27.828524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.828547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.828573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.828599]  kthread+0x337/0x6f0
[   27.828619]  ? trace_preempt_on+0x20/0xc0
[   27.828644]  ? __pfx_kthread+0x10/0x10
[   27.828666]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.828689]  ? calculate_sigpending+0x7b/0xa0
[   27.828727]  ? __pfx_kthread+0x10/0x10
[   27.828751]  ret_from_fork+0x116/0x1d0
[   27.828778]  ? __pfx_kthread+0x10/0x10
[   27.828800]  ret_from_fork_asm+0x1a/0x30
[   27.828831]  </TASK>
[   27.828844] 
[   27.841478] Allocated by task 315:
[   27.841648]  kasan_save_stack+0x45/0x70
[   27.841813]  kasan_save_track+0x18/0x40
[   27.841946]  kasan_save_alloc_info+0x3b/0x50
[   27.842091]  __kasan_kmalloc+0xb7/0xc0
[   27.842386]  __kmalloc_cache_noprof+0x189/0x420
[   27.842641]  kasan_atomics+0x95/0x310
[   27.842904]  kunit_try_run_case+0x1a5/0x480
[   27.843053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.843224]  kthread+0x337/0x6f0
[   27.843383]  ret_from_fork+0x116/0x1d0
[   27.843571]  ret_from_fork_asm+0x1a/0x30
[   27.843801] 
[   27.843901] The buggy address belongs to the object at ffff8881058d6700
[   27.843901]  which belongs to the cache kmalloc-64 of size 64
[   27.844385] The buggy address is located 0 bytes to the right of
[   27.844385]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.845065] 
[   27.845143] The buggy address belongs to the physical page:
[   27.845374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.845706] flags: 0x200000000000000(node=0|zone=2)
[   27.845865] page_type: f5(slab)
[   27.845981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.846275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.846865] page dumped because: kasan: bad access detected
[   27.847104] 
[   27.847171] Memory state around the buggy address:
[   27.847316]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.847565]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.848085] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.848459]                                      ^
[   27.848734]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.849049]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.849346] ==================================================================
[   27.466557] ==================================================================
[   27.467333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   27.468072] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.468391] 
[   27.468545] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.468614] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.468629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.468683] Call Trace:
[   27.468723]  <TASK>
[   27.468744]  dump_stack_lvl+0x73/0xb0
[   27.468809]  print_report+0xd1/0x610
[   27.468832]  ? __virt_addr_valid+0x1db/0x2d0
[   27.468870]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.468903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.468929]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.468952]  kasan_report+0x141/0x180
[   27.468974]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.469031]  kasan_check_range+0x10c/0x1c0
[   27.469056]  __kasan_check_write+0x18/0x20
[   27.469089]  kasan_atomics_helper+0x18b1/0x5450
[   27.469113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.469136]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.469161]  ? kasan_save_alloc_info+0x3b/0x50
[   27.469190]  kasan_atomics+0x1dc/0x310
[   27.469214]  ? __pfx_kasan_atomics+0x10/0x10
[   27.469238]  ? __pfx_read_tsc+0x10/0x10
[   27.469262]  ? ktime_get_ts64+0x86/0x230
[   27.469290]  kunit_try_run_case+0x1a5/0x480
[   27.469313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.469335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.469361]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.469387]  ? __kthread_parkme+0x82/0x180
[   27.469409]  ? preempt_count_sub+0x50/0x80
[   27.469433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.469456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.469482]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.469508]  kthread+0x337/0x6f0
[   27.469529]  ? trace_preempt_on+0x20/0xc0
[   27.469554]  ? __pfx_kthread+0x10/0x10
[   27.469576]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.469599]  ? calculate_sigpending+0x7b/0xa0
[   27.469624]  ? __pfx_kthread+0x10/0x10
[   27.469647]  ret_from_fork+0x116/0x1d0
[   27.469668]  ? __pfx_kthread+0x10/0x10
[   27.469700]  ret_from_fork_asm+0x1a/0x30
[   27.469733]  </TASK>
[   27.469746] 
[   27.477272] Allocated by task 315:
[   27.477502]  kasan_save_stack+0x45/0x70
[   27.477717]  kasan_save_track+0x18/0x40
[   27.477942]  kasan_save_alloc_info+0x3b/0x50
[   27.478230]  __kasan_kmalloc+0xb7/0xc0
[   27.478430]  __kmalloc_cache_noprof+0x189/0x420
[   27.478641]  kasan_atomics+0x95/0x310
[   27.478803]  kunit_try_run_case+0x1a5/0x480
[   27.479078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.479311]  kthread+0x337/0x6f0
[   27.479487]  ret_from_fork+0x116/0x1d0
[   27.479679]  ret_from_fork_asm+0x1a/0x30
[   27.479977] 
[   27.480094] The buggy address belongs to the object at ffff8881058d6700
[   27.480094]  which belongs to the cache kmalloc-64 of size 64
[   27.480500] The buggy address is located 0 bytes to the right of
[   27.480500]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.481145] 
[   27.481216] The buggy address belongs to the physical page:
[   27.481386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.481624] flags: 0x200000000000000(node=0|zone=2)
[   27.482008] page_type: f5(slab)
[   27.482224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.482571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.482918] page dumped because: kasan: bad access detected
[   27.483097] 
[   27.483261] Memory state around the buggy address:
[   27.483515]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.483932]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.484214] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.484428]                                      ^
[   27.484579]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.484958]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.485207] ==================================================================
[   27.899289] ==================================================================
[   27.900200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   27.900887] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.901965] 
[   27.902166] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.902224] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.902239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.902263] Call Trace:
[   27.902283]  <TASK>
[   27.902304]  dump_stack_lvl+0x73/0xb0
[   27.902338]  print_report+0xd1/0x610
[   27.902361]  ? __virt_addr_valid+0x1db/0x2d0
[   27.902387]  ? kasan_atomics_helper+0x5115/0x5450
[   27.902409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.902436]  ? kasan_atomics_helper+0x5115/0x5450
[   27.902458]  kasan_report+0x141/0x180
[   27.902481]  ? kasan_atomics_helper+0x5115/0x5450
[   27.902508]  __asan_report_load8_noabort+0x18/0x20
[   27.902533]  kasan_atomics_helper+0x5115/0x5450
[   27.902556]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.902579]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.902605]  ? kasan_save_alloc_info+0x3b/0x50
[   27.902634]  kasan_atomics+0x1dc/0x310
[   27.902657]  ? __pfx_kasan_atomics+0x10/0x10
[   27.902681]  ? __pfx_read_tsc+0x10/0x10
[   27.902716]  ? ktime_get_ts64+0x86/0x230
[   27.902742]  kunit_try_run_case+0x1a5/0x480
[   27.902765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.902804]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.902832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.902856]  ? __kthread_parkme+0x82/0x180
[   27.902879]  ? preempt_count_sub+0x50/0x80
[   27.902904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.902926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.902952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.902978]  kthread+0x337/0x6f0
[   27.902998]  ? trace_preempt_on+0x20/0xc0
[   27.903024]  ? __pfx_kthread+0x10/0x10
[   27.903045]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.903068]  ? calculate_sigpending+0x7b/0xa0
[   27.903094]  ? __pfx_kthread+0x10/0x10
[   27.903116]  ret_from_fork+0x116/0x1d0
[   27.903137]  ? __pfx_kthread+0x10/0x10
[   27.903158]  ret_from_fork_asm+0x1a/0x30
[   27.903190]  </TASK>
[   27.903203] 
[   27.911964] Allocated by task 315:
[   27.912094]  kasan_save_stack+0x45/0x70
[   27.912232]  kasan_save_track+0x18/0x40
[   27.912419]  kasan_save_alloc_info+0x3b/0x50
[   27.912623]  __kasan_kmalloc+0xb7/0xc0
[   27.912839]  __kmalloc_cache_noprof+0x189/0x420
[   27.913056]  kasan_atomics+0x95/0x310
[   27.913236]  kunit_try_run_case+0x1a5/0x480
[   27.913422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.913595]  kthread+0x337/0x6f0
[   27.913726]  ret_from_fork+0x116/0x1d0
[   27.914102]  ret_from_fork_asm+0x1a/0x30
[   27.914299] 
[   27.914394] The buggy address belongs to the object at ffff8881058d6700
[   27.914394]  which belongs to the cache kmalloc-64 of size 64
[   27.914904] The buggy address is located 0 bytes to the right of
[   27.914904]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.915319] 
[   27.915411] The buggy address belongs to the physical page:
[   27.915663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.916035] flags: 0x200000000000000(node=0|zone=2)
[   27.916208] page_type: f5(slab)
[   27.916380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.916686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.917071] page dumped because: kasan: bad access detected
[   27.917237] 
[   27.917301] Memory state around the buggy address:
[   27.917449]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.917660]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.918198] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.918505]                                      ^
[   27.918668]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.919178]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.919388] ==================================================================
[   26.918356] ==================================================================
[   26.918709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   26.918953] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.919492] 
[   26.919604] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.919657] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.919671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.919708] Call Trace:
[   26.919731]  <TASK>
[   26.919767]  dump_stack_lvl+0x73/0xb0
[   26.919802]  print_report+0xd1/0x610
[   26.919834]  ? __virt_addr_valid+0x1db/0x2d0
[   26.919861]  ? kasan_atomics_helper+0xac7/0x5450
[   26.919883]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.919910]  ? kasan_atomics_helper+0xac7/0x5450
[   26.919933]  kasan_report+0x141/0x180
[   26.919955]  ? kasan_atomics_helper+0xac7/0x5450
[   26.920025]  kasan_check_range+0x10c/0x1c0
[   26.920052]  __kasan_check_write+0x18/0x20
[   26.920088]  kasan_atomics_helper+0xac7/0x5450
[   26.920111]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.920134]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.920161]  ? kasan_save_alloc_info+0x3b/0x50
[   26.920190]  kasan_atomics+0x1dc/0x310
[   26.920214]  ? __pfx_kasan_atomics+0x10/0x10
[   26.920239]  ? __pfx_read_tsc+0x10/0x10
[   26.920264]  ? ktime_get_ts64+0x86/0x230
[   26.920292]  kunit_try_run_case+0x1a5/0x480
[   26.920317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.920339]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.920365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.920390]  ? __kthread_parkme+0x82/0x180
[   26.920413]  ? preempt_count_sub+0x50/0x80
[   26.920438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.920460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.920486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.920512]  kthread+0x337/0x6f0
[   26.920534]  ? trace_preempt_on+0x20/0xc0
[   26.920559]  ? __pfx_kthread+0x10/0x10
[   26.920581]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.920604]  ? calculate_sigpending+0x7b/0xa0
[   26.920638]  ? __pfx_kthread+0x10/0x10
[   26.920660]  ret_from_fork+0x116/0x1d0
[   26.920681]  ? __pfx_kthread+0x10/0x10
[   26.920719]  ret_from_fork_asm+0x1a/0x30
[   26.920752]  </TASK>
[   26.920766] 
[   26.928216] Allocated by task 315:
[   26.928345]  kasan_save_stack+0x45/0x70
[   26.928488]  kasan_save_track+0x18/0x40
[   26.928621]  kasan_save_alloc_info+0x3b/0x50
[   26.928956]  __kasan_kmalloc+0xb7/0xc0
[   26.929147]  __kmalloc_cache_noprof+0x189/0x420
[   26.929401]  kasan_atomics+0x95/0x310
[   26.929630]  kunit_try_run_case+0x1a5/0x480
[   26.929959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.930257]  kthread+0x337/0x6f0
[   26.930378]  ret_from_fork+0x116/0x1d0
[   26.930553]  ret_from_fork_asm+0x1a/0x30
[   26.930750] 
[   26.930848] The buggy address belongs to the object at ffff8881058d6700
[   26.930848]  which belongs to the cache kmalloc-64 of size 64
[   26.931440] The buggy address is located 0 bytes to the right of
[   26.931440]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.932011] 
[   26.932091] The buggy address belongs to the physical page:
[   26.932341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.932670] flags: 0x200000000000000(node=0|zone=2)
[   26.932934] page_type: f5(slab)
[   26.933098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.933418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.933672] page dumped because: kasan: bad access detected
[   26.934076] 
[   26.934191] Memory state around the buggy address:
[   26.934391]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.934628]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.935155] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.935458]                                      ^
[   26.935649]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.935985]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.936288] ==================================================================
[   27.369268] ==================================================================
[   27.369505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   27.369796] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.370358] 
[   27.370538] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.370587] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.370615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.370638] Call Trace:
[   27.370657]  <TASK>
[   27.370685]  dump_stack_lvl+0x73/0xb0
[   27.370723]  print_report+0xd1/0x610
[   27.370745]  ? __virt_addr_valid+0x1db/0x2d0
[   27.370770]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.370793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.370819]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.370841]  kasan_report+0x141/0x180
[   27.370863]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.370890]  kasan_check_range+0x10c/0x1c0
[   27.370913]  __kasan_check_write+0x18/0x20
[   27.370936]  kasan_atomics_helper+0x15b6/0x5450
[   27.370959]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.370981]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.371005]  ? kasan_save_alloc_info+0x3b/0x50
[   27.371033]  kasan_atomics+0x1dc/0x310
[   27.371056]  ? __pfx_kasan_atomics+0x10/0x10
[   27.371080]  ? __pfx_read_tsc+0x10/0x10
[   27.371103]  ? ktime_get_ts64+0x86/0x230
[   27.371129]  kunit_try_run_case+0x1a5/0x480
[   27.371152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.371172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.371197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.371221]  ? __kthread_parkme+0x82/0x180
[   27.371241]  ? preempt_count_sub+0x50/0x80
[   27.371266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.371304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.371341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.371367]  kthread+0x337/0x6f0
[   27.371399]  ? trace_preempt_on+0x20/0xc0
[   27.371424]  ? __pfx_kthread+0x10/0x10
[   27.371445]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.371469]  ? calculate_sigpending+0x7b/0xa0
[   27.371494]  ? __pfx_kthread+0x10/0x10
[   27.371516]  ret_from_fork+0x116/0x1d0
[   27.371538]  ? __pfx_kthread+0x10/0x10
[   27.371559]  ret_from_fork_asm+0x1a/0x30
[   27.371592]  </TASK>
[   27.371604] 
[   27.379035] Allocated by task 315:
[   27.379260]  kasan_save_stack+0x45/0x70
[   27.379456]  kasan_save_track+0x18/0x40
[   27.379644]  kasan_save_alloc_info+0x3b/0x50
[   27.379971]  __kasan_kmalloc+0xb7/0xc0
[   27.380147]  __kmalloc_cache_noprof+0x189/0x420
[   27.380415]  kasan_atomics+0x95/0x310
[   27.380617]  kunit_try_run_case+0x1a5/0x480
[   27.380783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.381038]  kthread+0x337/0x6f0
[   27.381263]  ret_from_fork+0x116/0x1d0
[   27.381486]  ret_from_fork_asm+0x1a/0x30
[   27.381626] 
[   27.381703] The buggy address belongs to the object at ffff8881058d6700
[   27.381703]  which belongs to the cache kmalloc-64 of size 64
[   27.382049] The buggy address is located 0 bytes to the right of
[   27.382049]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.382830] 
[   27.382924] The buggy address belongs to the physical page:
[   27.383217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.383563] flags: 0x200000000000000(node=0|zone=2)
[   27.383732] page_type: f5(slab)
[   27.383854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.384135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.384604] page dumped because: kasan: bad access detected
[   27.385115] 
[   27.385209] Memory state around the buggy address:
[   27.385433]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.385806]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.386124] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.386398]                                      ^
[   27.386646]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.386997]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.387298] ==================================================================
[   27.722327] ==================================================================
[   27.722672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   27.723040] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.723303] 
[   27.723393] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.723447] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.723463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.723486] Call Trace:
[   27.723507]  <TASK>
[   27.723529]  dump_stack_lvl+0x73/0xb0
[   27.723561]  print_report+0xd1/0x610
[   27.723584]  ? __virt_addr_valid+0x1db/0x2d0
[   27.723620]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.723642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.723668]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.723702]  kasan_report+0x141/0x180
[   27.723725]  ? kasan_atomics_helper+0x4f71/0x5450
[   27.723752]  __asan_report_load8_noabort+0x18/0x20
[   27.723776]  kasan_atomics_helper+0x4f71/0x5450
[   27.723800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.723826]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.723852]  ? kasan_save_alloc_info+0x3b/0x50
[   27.723881]  kasan_atomics+0x1dc/0x310
[   27.723905]  ? __pfx_kasan_atomics+0x10/0x10
[   27.723930]  ? __pfx_read_tsc+0x10/0x10
[   27.723979]  ? ktime_get_ts64+0x86/0x230
[   27.724019]  kunit_try_run_case+0x1a5/0x480
[   27.724043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.724082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.724108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.724147]  ? __kthread_parkme+0x82/0x180
[   27.724182]  ? preempt_count_sub+0x50/0x80
[   27.724207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.724230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.724255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.724283]  kthread+0x337/0x6f0
[   27.724303]  ? trace_preempt_on+0x20/0xc0
[   27.724328]  ? __pfx_kthread+0x10/0x10
[   27.724351]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.724374]  ? calculate_sigpending+0x7b/0xa0
[   27.724399]  ? __pfx_kthread+0x10/0x10
[   27.724422]  ret_from_fork+0x116/0x1d0
[   27.724444]  ? __pfx_kthread+0x10/0x10
[   27.724466]  ret_from_fork_asm+0x1a/0x30
[   27.724501]  </TASK>
[   27.724514] 
[   27.732772] Allocated by task 315:
[   27.732913]  kasan_save_stack+0x45/0x70
[   27.733060]  kasan_save_track+0x18/0x40
[   27.733191]  kasan_save_alloc_info+0x3b/0x50
[   27.733333]  __kasan_kmalloc+0xb7/0xc0
[   27.733531]  __kmalloc_cache_noprof+0x189/0x420
[   27.733798]  kasan_atomics+0x95/0x310
[   27.734014]  kunit_try_run_case+0x1a5/0x480
[   27.734244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.734521]  kthread+0x337/0x6f0
[   27.734712]  ret_from_fork+0x116/0x1d0
[   27.735077]  ret_from_fork_asm+0x1a/0x30
[   27.735270] 
[   27.735363] The buggy address belongs to the object at ffff8881058d6700
[   27.735363]  which belongs to the cache kmalloc-64 of size 64
[   27.735860] The buggy address is located 0 bytes to the right of
[   27.735860]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.736414] 
[   27.736522] The buggy address belongs to the physical page:
[   27.736728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.737237] flags: 0x200000000000000(node=0|zone=2)
[   27.737462] page_type: f5(slab)
[   27.737630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.737994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.738318] page dumped because: kasan: bad access detected
[   27.738551] 
[   27.738655] Memory state around the buggy address:
[   27.738907]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.739216]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.739516] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.739887]                                      ^
[   27.740100]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.740342]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.740554] ==================================================================
[   27.250445] ==================================================================
[   27.250803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   27.251187] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.251526] 
[   27.251617] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.251669] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.251683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.251718] Call Trace:
[   27.251738]  <TASK>
[   27.251759]  dump_stack_lvl+0x73/0xb0
[   27.251801]  print_report+0xd1/0x610
[   27.251840]  ? __virt_addr_valid+0x1db/0x2d0
[   27.251865]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.251898]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.251926]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.251948]  kasan_report+0x141/0x180
[   27.251971]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.251998]  __asan_report_load4_noabort+0x18/0x20
[   27.252022]  kasan_atomics_helper+0x49ce/0x5450
[   27.252045]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.252068]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.252093]  ? kasan_save_alloc_info+0x3b/0x50
[   27.252122]  kasan_atomics+0x1dc/0x310
[   27.252145]  ? __pfx_kasan_atomics+0x10/0x10
[   27.252170]  ? __pfx_read_tsc+0x10/0x10
[   27.252194]  ? ktime_get_ts64+0x86/0x230
[   27.252221]  kunit_try_run_case+0x1a5/0x480
[   27.252245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.252266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.252301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.252325]  ? __kthread_parkme+0x82/0x180
[   27.252348]  ? preempt_count_sub+0x50/0x80
[   27.252383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.252406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.252432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.252458]  kthread+0x337/0x6f0
[   27.252480]  ? trace_preempt_on+0x20/0xc0
[   27.252507]  ? __pfx_kthread+0x10/0x10
[   27.252529]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.252552]  ? calculate_sigpending+0x7b/0xa0
[   27.252578]  ? __pfx_kthread+0x10/0x10
[   27.252601]  ret_from_fork+0x116/0x1d0
[   27.252631]  ? __pfx_kthread+0x10/0x10
[   27.252653]  ret_from_fork_asm+0x1a/0x30
[   27.252685]  </TASK>
[   27.252713] 
[   27.260382] Allocated by task 315:
[   27.260508]  kasan_save_stack+0x45/0x70
[   27.260650]  kasan_save_track+0x18/0x40
[   27.260841]  kasan_save_alloc_info+0x3b/0x50
[   27.261050]  __kasan_kmalloc+0xb7/0xc0
[   27.261256]  __kmalloc_cache_noprof+0x189/0x420
[   27.261476]  kasan_atomics+0x95/0x310
[   27.261658]  kunit_try_run_case+0x1a5/0x480
[   27.262189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.262475]  kthread+0x337/0x6f0
[   27.262646]  ret_from_fork+0x116/0x1d0
[   27.263559]  ret_from_fork_asm+0x1a/0x30
[   27.263874] 
[   27.264010] The buggy address belongs to the object at ffff8881058d6700
[   27.264010]  which belongs to the cache kmalloc-64 of size 64
[   27.264467] The buggy address is located 0 bytes to the right of
[   27.264467]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.265547] 
[   27.265835] The buggy address belongs to the physical page:
[   27.266227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.266768] flags: 0x200000000000000(node=0|zone=2)
[   27.267021] page_type: f5(slab)
[   27.267182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.267490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.268063] page dumped because: kasan: bad access detected
[   27.268569] 
[   27.268674] Memory state around the buggy address:
[   27.269093]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.269432]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.269733] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.270545]                                      ^
[   27.270794]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271077]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271357] ==================================================================
[   26.739858] ==================================================================
[   26.740182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   26.740492] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.740798] 
[   26.740916] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.740969] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.740984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.741008] Call Trace:
[   26.741028]  <TASK>
[   26.741047]  dump_stack_lvl+0x73/0xb0
[   26.741077]  print_report+0xd1/0x610
[   26.741101]  ? __virt_addr_valid+0x1db/0x2d0
[   26.741136]  ? kasan_atomics_helper+0x72f/0x5450
[   26.741159]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.741186]  ? kasan_atomics_helper+0x72f/0x5450
[   26.741208]  kasan_report+0x141/0x180
[   26.741231]  ? kasan_atomics_helper+0x72f/0x5450
[   26.741258]  kasan_check_range+0x10c/0x1c0
[   26.741283]  __kasan_check_write+0x18/0x20
[   26.741307]  kasan_atomics_helper+0x72f/0x5450
[   26.741332]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.741355]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.741380]  ? kasan_save_alloc_info+0x3b/0x50
[   26.741408]  kasan_atomics+0x1dc/0x310
[   26.741432]  ? __pfx_kasan_atomics+0x10/0x10
[   26.741457]  ? __pfx_read_tsc+0x10/0x10
[   26.741480]  ? ktime_get_ts64+0x86/0x230
[   26.741507]  kunit_try_run_case+0x1a5/0x480
[   26.741531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.741552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.741578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.741603]  ? __kthread_parkme+0x82/0x180
[   26.741624]  ? preempt_count_sub+0x50/0x80
[   26.741649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.741673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.741710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.741736]  kthread+0x337/0x6f0
[   26.741758]  ? trace_preempt_on+0x20/0xc0
[   26.741783]  ? __pfx_kthread+0x10/0x10
[   26.741816]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.741840]  ? calculate_sigpending+0x7b/0xa0
[   26.741866]  ? __pfx_kthread+0x10/0x10
[   26.741889]  ret_from_fork+0x116/0x1d0
[   26.741917]  ? __pfx_kthread+0x10/0x10
[   26.741939]  ret_from_fork_asm+0x1a/0x30
[   26.741972]  </TASK>
[   26.741984] 
[   26.753426] Allocated by task 315:
[   26.753591]  kasan_save_stack+0x45/0x70
[   26.754035]  kasan_save_track+0x18/0x40
[   26.754272]  kasan_save_alloc_info+0x3b/0x50
[   26.754569]  __kasan_kmalloc+0xb7/0xc0
[   26.754772]  __kmalloc_cache_noprof+0x189/0x420
[   26.755171]  kasan_atomics+0x95/0x310
[   26.755381]  kunit_try_run_case+0x1a5/0x480
[   26.755566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.755797]  kthread+0x337/0x6f0
[   26.756295]  ret_from_fork+0x116/0x1d0
[   26.756603]  ret_from_fork_asm+0x1a/0x30
[   26.757042] 
[   26.757295] The buggy address belongs to the object at ffff8881058d6700
[   26.757295]  which belongs to the cache kmalloc-64 of size 64
[   26.757936] The buggy address is located 0 bytes to the right of
[   26.757936]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.758440] 
[   26.758533] The buggy address belongs to the physical page:
[   26.758771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.759446] flags: 0x200000000000000(node=0|zone=2)
[   26.759897] page_type: f5(slab)
[   26.760278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.760850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.761409] page dumped because: kasan: bad access detected
[   26.761773] 
[   26.762025] Memory state around the buggy address:
[   26.762245]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.762530]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.763123] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.763589]                                      ^
[   26.764046]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.764475]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.764933] ==================================================================
[   27.351068] ==================================================================
[   27.351423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   27.351765] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.352089] 
[   27.352194] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.352243] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.352258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.352280] Call Trace:
[   27.352298]  <TASK>
[   27.352316]  dump_stack_lvl+0x73/0xb0
[   27.352346]  print_report+0xd1/0x610
[   27.352368]  ? __virt_addr_valid+0x1db/0x2d0
[   27.352392]  ? kasan_atomics_helper+0x151d/0x5450
[   27.352412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.352438]  ? kasan_atomics_helper+0x151d/0x5450
[   27.352459]  kasan_report+0x141/0x180
[   27.352482]  ? kasan_atomics_helper+0x151d/0x5450
[   27.352508]  kasan_check_range+0x10c/0x1c0
[   27.352532]  __kasan_check_write+0x18/0x20
[   27.352554]  kasan_atomics_helper+0x151d/0x5450
[   27.352577]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.352598]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.352622]  ? kasan_save_alloc_info+0x3b/0x50
[   27.352650]  kasan_atomics+0x1dc/0x310
[   27.352673]  ? __pfx_kasan_atomics+0x10/0x10
[   27.352707]  ? __pfx_read_tsc+0x10/0x10
[   27.352730]  ? ktime_get_ts64+0x86/0x230
[   27.352757]  kunit_try_run_case+0x1a5/0x480
[   27.352779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.352800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.352824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.352848]  ? __kthread_parkme+0x82/0x180
[   27.352869]  ? preempt_count_sub+0x50/0x80
[   27.352911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.352934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.352960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.352989]  kthread+0x337/0x6f0
[   27.353010]  ? trace_preempt_on+0x20/0xc0
[   27.353035]  ? __pfx_kthread+0x10/0x10
[   27.353057]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.353092]  ? calculate_sigpending+0x7b/0xa0
[   27.353117]  ? __pfx_kthread+0x10/0x10
[   27.353151]  ret_from_fork+0x116/0x1d0
[   27.353172]  ? __pfx_kthread+0x10/0x10
[   27.353195]  ret_from_fork_asm+0x1a/0x30
[   27.353227]  </TASK>
[   27.353239] 
[   27.361097] Allocated by task 315:
[   27.361224]  kasan_save_stack+0x45/0x70
[   27.361441]  kasan_save_track+0x18/0x40
[   27.361607]  kasan_save_alloc_info+0x3b/0x50
[   27.361828]  __kasan_kmalloc+0xb7/0xc0
[   27.362004]  __kmalloc_cache_noprof+0x189/0x420
[   27.362226]  kasan_atomics+0x95/0x310
[   27.362393]  kunit_try_run_case+0x1a5/0x480
[   27.362590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.362855]  kthread+0x337/0x6f0
[   27.363024]  ret_from_fork+0x116/0x1d0
[   27.363218]  ret_from_fork_asm+0x1a/0x30
[   27.363395] 
[   27.363474] The buggy address belongs to the object at ffff8881058d6700
[   27.363474]  which belongs to the cache kmalloc-64 of size 64
[   27.364022] The buggy address is located 0 bytes to the right of
[   27.364022]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.364437] 
[   27.364505] The buggy address belongs to the physical page:
[   27.364677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.364926] flags: 0x200000000000000(node=0|zone=2)
[   27.365087] page_type: f5(slab)
[   27.365203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.365903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.366248] page dumped because: kasan: bad access detected
[   27.366493] 
[   27.366582] Memory state around the buggy address:
[   27.366843]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.367153]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.367444] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.367652]                                      ^
[   27.367926]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.368246]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.368587] ==================================================================
[   27.741155] ==================================================================
[   27.741507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   27.742041] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.742333] 
[   27.742422] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.742476] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.742492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.742516] Call Trace:
[   27.742540]  <TASK>
[   27.742561]  dump_stack_lvl+0x73/0xb0
[   27.742594]  print_report+0xd1/0x610
[   27.742617]  ? __virt_addr_valid+0x1db/0x2d0
[   27.742642]  ? kasan_atomics_helper+0x2006/0x5450
[   27.742664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.742690]  ? kasan_atomics_helper+0x2006/0x5450
[   27.742727]  kasan_report+0x141/0x180
[   27.742749]  ? kasan_atomics_helper+0x2006/0x5450
[   27.742776]  kasan_check_range+0x10c/0x1c0
[   27.742800]  __kasan_check_write+0x18/0x20
[   27.742824]  kasan_atomics_helper+0x2006/0x5450
[   27.742848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.742870]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.742895]  ? kasan_save_alloc_info+0x3b/0x50
[   27.742923]  kasan_atomics+0x1dc/0x310
[   27.742947]  ? __pfx_kasan_atomics+0x10/0x10
[   27.742972]  ? __pfx_read_tsc+0x10/0x10
[   27.742995]  ? ktime_get_ts64+0x86/0x230
[   27.743022]  kunit_try_run_case+0x1a5/0x480
[   27.743045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.743067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.743103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.743150]  ? __kthread_parkme+0x82/0x180
[   27.743173]  ? preempt_count_sub+0x50/0x80
[   27.743200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.743223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.743264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.743290]  kthread+0x337/0x6f0
[   27.743325]  ? trace_preempt_on+0x20/0xc0
[   27.743363]  ? __pfx_kthread+0x10/0x10
[   27.743398]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.743421]  ? calculate_sigpending+0x7b/0xa0
[   27.743447]  ? __pfx_kthread+0x10/0x10
[   27.743469]  ret_from_fork+0x116/0x1d0
[   27.743490]  ? __pfx_kthread+0x10/0x10
[   27.743512]  ret_from_fork_asm+0x1a/0x30
[   27.743544]  </TASK>
[   27.743557] 
[   27.751985] Allocated by task 315:
[   27.752207]  kasan_save_stack+0x45/0x70
[   27.752355]  kasan_save_track+0x18/0x40
[   27.752540]  kasan_save_alloc_info+0x3b/0x50
[   27.752718]  __kasan_kmalloc+0xb7/0xc0
[   27.752946]  __kmalloc_cache_noprof+0x189/0x420
[   27.753202]  kasan_atomics+0x95/0x310
[   27.753435]  kunit_try_run_case+0x1a5/0x480
[   27.753659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.754127]  kthread+0x337/0x6f0
[   27.754293]  ret_from_fork+0x116/0x1d0
[   27.754477]  ret_from_fork_asm+0x1a/0x30
[   27.754669] 
[   27.754770] The buggy address belongs to the object at ffff8881058d6700
[   27.754770]  which belongs to the cache kmalloc-64 of size 64
[   27.755302] The buggy address is located 0 bytes to the right of
[   27.755302]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.755956] 
[   27.756045] The buggy address belongs to the physical page:
[   27.756213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.756450] flags: 0x200000000000000(node=0|zone=2)
[   27.756610] page_type: f5(slab)
[   27.756739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.757422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.757771] page dumped because: kasan: bad access detected
[   27.758049] 
[   27.758159] Memory state around the buggy address:
[   27.758551]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.758949]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.759304] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.759610]                                      ^
[   27.759963]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.760276]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.760526] ==================================================================
[   27.091064] ==================================================================
[   27.091497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   27.091985] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.092397] 
[   27.092504] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.092558] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.092584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.092608] Call Trace:
[   27.092628]  <TASK>
[   27.092648]  dump_stack_lvl+0x73/0xb0
[   27.092681]  print_report+0xd1/0x610
[   27.092713]  ? __virt_addr_valid+0x1db/0x2d0
[   27.092739]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.092761]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.092789]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.092812]  kasan_report+0x141/0x180
[   27.092845]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.092872]  __asan_report_load4_noabort+0x18/0x20
[   27.092897]  kasan_atomics_helper+0x4a36/0x5450
[   27.092921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.092954]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.092978]  ? kasan_save_alloc_info+0x3b/0x50
[   27.093017]  kasan_atomics+0x1dc/0x310
[   27.093041]  ? __pfx_kasan_atomics+0x10/0x10
[   27.093067]  ? __pfx_read_tsc+0x10/0x10
[   27.093091]  ? ktime_get_ts64+0x86/0x230
[   27.093118]  kunit_try_run_case+0x1a5/0x480
[   27.093142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.093163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.093189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.093213]  ? __kthread_parkme+0x82/0x180
[   27.093236]  ? preempt_count_sub+0x50/0x80
[   27.093262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.093284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.093311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.093338]  kthread+0x337/0x6f0
[   27.093359]  ? trace_preempt_on+0x20/0xc0
[   27.093384]  ? __pfx_kthread+0x10/0x10
[   27.093415]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.093438]  ? calculate_sigpending+0x7b/0xa0
[   27.093464]  ? __pfx_kthread+0x10/0x10
[   27.093497]  ret_from_fork+0x116/0x1d0
[   27.093518]  ? __pfx_kthread+0x10/0x10
[   27.093539]  ret_from_fork_asm+0x1a/0x30
[   27.093572]  </TASK>
[   27.093584] 
[   27.101252] Allocated by task 315:
[   27.101420]  kasan_save_stack+0x45/0x70
[   27.101568]  kasan_save_track+0x18/0x40
[   27.101767]  kasan_save_alloc_info+0x3b/0x50
[   27.102005]  __kasan_kmalloc+0xb7/0xc0
[   27.102183]  __kmalloc_cache_noprof+0x189/0x420
[   27.102400]  kasan_atomics+0x95/0x310
[   27.102591]  kunit_try_run_case+0x1a5/0x480
[   27.102774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.103033]  kthread+0x337/0x6f0
[   27.103198]  ret_from_fork+0x116/0x1d0
[   27.103352]  ret_from_fork_asm+0x1a/0x30
[   27.103546] 
[   27.103624] The buggy address belongs to the object at ffff8881058d6700
[   27.103624]  which belongs to the cache kmalloc-64 of size 64
[   27.104147] The buggy address is located 0 bytes to the right of
[   27.104147]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.104618] 
[   27.104709] The buggy address belongs to the physical page:
[   27.105007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.105346] flags: 0x200000000000000(node=0|zone=2)
[   27.105570] page_type: f5(slab)
[   27.105705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.106046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.106265] page dumped because: kasan: bad access detected
[   27.106433] 
[   27.106497] Memory state around the buggy address:
[   27.106647]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.107519]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.108115] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.108823]                                      ^
[   27.109225]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.109959]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.110555] ==================================================================
[   26.936850] ==================================================================
[   26.937136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   26.937476] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.937921] 
[   26.938030] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.938079] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.938094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.938117] Call Trace:
[   26.938135]  <TASK>
[   26.938154]  dump_stack_lvl+0x73/0xb0
[   26.938186]  print_report+0xd1/0x610
[   26.938209]  ? __virt_addr_valid+0x1db/0x2d0
[   26.938235]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.938257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.938284]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.938305]  kasan_report+0x141/0x180
[   26.938328]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.938355]  kasan_check_range+0x10c/0x1c0
[   26.938380]  __kasan_check_write+0x18/0x20
[   26.938403]  kasan_atomics_helper+0xb6a/0x5450
[   26.938426]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.938449]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.938475]  ? kasan_save_alloc_info+0x3b/0x50
[   26.938504]  kasan_atomics+0x1dc/0x310
[   26.938528]  ? __pfx_kasan_atomics+0x10/0x10
[   26.938567]  ? __pfx_read_tsc+0x10/0x10
[   26.938591]  ? ktime_get_ts64+0x86/0x230
[   26.938618]  kunit_try_run_case+0x1a5/0x480
[   26.938642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.938663]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.938689]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.938725]  ? __kthread_parkme+0x82/0x180
[   26.938748]  ? preempt_count_sub+0x50/0x80
[   26.938773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.938805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.938832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.938858]  kthread+0x337/0x6f0
[   26.938879]  ? trace_preempt_on+0x20/0xc0
[   26.938903]  ? __pfx_kthread+0x10/0x10
[   26.938925]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.938959]  ? calculate_sigpending+0x7b/0xa0
[   26.938985]  ? __pfx_kthread+0x10/0x10
[   26.939008]  ret_from_fork+0x116/0x1d0
[   26.939040]  ? __pfx_kthread+0x10/0x10
[   26.939062]  ret_from_fork_asm+0x1a/0x30
[   26.939095]  </TASK>
[   26.939107] 
[   26.946931] Allocated by task 315:
[   26.947167]  kasan_save_stack+0x45/0x70
[   26.947309]  kasan_save_track+0x18/0x40
[   26.947440]  kasan_save_alloc_info+0x3b/0x50
[   26.947645]  __kasan_kmalloc+0xb7/0xc0
[   26.947922]  __kmalloc_cache_noprof+0x189/0x420
[   26.948155]  kasan_atomics+0x95/0x310
[   26.948327]  kunit_try_run_case+0x1a5/0x480
[   26.948527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.948826]  kthread+0x337/0x6f0
[   26.948955]  ret_from_fork+0x116/0x1d0
[   26.949149]  ret_from_fork_asm+0x1a/0x30
[   26.949284] 
[   26.949351] The buggy address belongs to the object at ffff8881058d6700
[   26.949351]  which belongs to the cache kmalloc-64 of size 64
[   26.949703] The buggy address is located 0 bytes to the right of
[   26.949703]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.950250] 
[   26.950345] The buggy address belongs to the physical page:
[   26.950595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.951061] flags: 0x200000000000000(node=0|zone=2)
[   26.951296] page_type: f5(slab)
[   26.951414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.951721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.952227] page dumped because: kasan: bad access detected
[   26.952426] 
[   26.952536] Memory state around the buggy address:
[   26.952727]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.953057]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.953376] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.953664]                                      ^
[   26.953966]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.954237]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.954448] ==================================================================
[   26.569090] ==================================================================
[   26.569320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   26.569651] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.569982] 
[   26.570084] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.570134] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.570149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.570171] Call Trace:
[   26.570191]  <TASK>
[   26.570210]  dump_stack_lvl+0x73/0xb0
[   26.570239]  print_report+0xd1/0x610
[   26.570261]  ? __virt_addr_valid+0x1db/0x2d0
[   26.570285]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.570306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.570332]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.570354]  kasan_report+0x141/0x180
[   26.570376]  ? kasan_atomics_helper+0x4b6e/0x5450
[   26.570403]  __asan_report_store4_noabort+0x1b/0x30
[   26.570428]  kasan_atomics_helper+0x4b6e/0x5450
[   26.570451]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.570474]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.570498]  ? kasan_save_alloc_info+0x3b/0x50
[   26.570526]  kasan_atomics+0x1dc/0x310
[   26.570549]  ? __pfx_kasan_atomics+0x10/0x10
[   26.570573]  ? __pfx_read_tsc+0x10/0x10
[   26.570596]  ? ktime_get_ts64+0x86/0x230
[   26.570622]  kunit_try_run_case+0x1a5/0x480
[   26.570644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.570665]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.570690]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.570962]  ? __kthread_parkme+0x82/0x180
[   26.570985]  ? preempt_count_sub+0x50/0x80
[   26.571011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.571034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.571062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.571088]  kthread+0x337/0x6f0
[   26.571109]  ? trace_preempt_on+0x20/0xc0
[   26.571135]  ? __pfx_kthread+0x10/0x10
[   26.571157]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.571181]  ? calculate_sigpending+0x7b/0xa0
[   26.571207]  ? __pfx_kthread+0x10/0x10
[   26.571229]  ret_from_fork+0x116/0x1d0
[   26.571250]  ? __pfx_kthread+0x10/0x10
[   26.571273]  ret_from_fork_asm+0x1a/0x30
[   26.571309]  </TASK>
[   26.571324] 
[   26.578549] Allocated by task 315:
[   26.578752]  kasan_save_stack+0x45/0x70
[   26.578947]  kasan_save_track+0x18/0x40
[   26.579145]  kasan_save_alloc_info+0x3b/0x50
[   26.579354]  __kasan_kmalloc+0xb7/0xc0
[   26.579512]  __kmalloc_cache_noprof+0x189/0x420
[   26.579664]  kasan_atomics+0x95/0x310
[   26.579802]  kunit_try_run_case+0x1a5/0x480
[   26.579947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.580118]  kthread+0x337/0x6f0
[   26.580238]  ret_from_fork+0x116/0x1d0
[   26.580366]  ret_from_fork_asm+0x1a/0x30
[   26.580501] 
[   26.580566] The buggy address belongs to the object at ffff8881058d6700
[   26.580566]  which belongs to the cache kmalloc-64 of size 64
[   26.580921] The buggy address is located 0 bytes to the right of
[   26.580921]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.581277] 
[   26.581346] The buggy address belongs to the physical page:
[   26.581712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.582527] flags: 0x200000000000000(node=0|zone=2)
[   26.582722] page_type: f5(slab)
[   26.582842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.583067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.583285] page dumped because: kasan: bad access detected
[   26.583451] 
[   26.583515] Memory state around the buggy address:
[   26.583665]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.583891]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.584101] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.584307]                                      ^
[   26.584457]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.584671]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.584887] ==================================================================
[   27.486191] ==================================================================
[   27.486540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   27.486863] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.487237] 
[   27.487343] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.487397] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.487413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.487437] Call Trace:
[   27.487459]  <TASK>
[   27.487479]  dump_stack_lvl+0x73/0xb0
[   27.487512]  print_report+0xd1/0x610
[   27.487535]  ? __virt_addr_valid+0x1db/0x2d0
[   27.487597]  ? kasan_atomics_helper+0x194a/0x5450
[   27.487620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.487658]  ? kasan_atomics_helper+0x194a/0x5450
[   27.487715]  kasan_report+0x141/0x180
[   27.487738]  ? kasan_atomics_helper+0x194a/0x5450
[   27.487776]  kasan_check_range+0x10c/0x1c0
[   27.487811]  __kasan_check_write+0x18/0x20
[   27.487840]  kasan_atomics_helper+0x194a/0x5450
[   27.487863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.487886]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.487940]  ? kasan_save_alloc_info+0x3b/0x50
[   27.487990]  kasan_atomics+0x1dc/0x310
[   27.488014]  ? __pfx_kasan_atomics+0x10/0x10
[   27.488039]  ? __pfx_read_tsc+0x10/0x10
[   27.488064]  ? ktime_get_ts64+0x86/0x230
[   27.488091]  kunit_try_run_case+0x1a5/0x480
[   27.488115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.488136]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.488162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.488187]  ? __kthread_parkme+0x82/0x180
[   27.488209]  ? preempt_count_sub+0x50/0x80
[   27.488234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.488257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.488283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.488309]  kthread+0x337/0x6f0
[   27.488330]  ? trace_preempt_on+0x20/0xc0
[   27.488354]  ? __pfx_kthread+0x10/0x10
[   27.488376]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.488399]  ? calculate_sigpending+0x7b/0xa0
[   27.488425]  ? __pfx_kthread+0x10/0x10
[   27.488447]  ret_from_fork+0x116/0x1d0
[   27.488468]  ? __pfx_kthread+0x10/0x10
[   27.488491]  ret_from_fork_asm+0x1a/0x30
[   27.488523]  </TASK>
[   27.488535] 
[   27.496285] Allocated by task 315:
[   27.496509]  kasan_save_stack+0x45/0x70
[   27.496700]  kasan_save_track+0x18/0x40
[   27.496833]  kasan_save_alloc_info+0x3b/0x50
[   27.497025]  __kasan_kmalloc+0xb7/0xc0
[   27.497347]  __kmalloc_cache_noprof+0x189/0x420
[   27.498249]  kasan_atomics+0x95/0x310
[   27.499015]  kunit_try_run_case+0x1a5/0x480
[   27.499184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.499450]  kthread+0x337/0x6f0
[   27.499622]  ret_from_fork+0x116/0x1d0
[   27.499831]  ret_from_fork_asm+0x1a/0x30
[   27.500024] 
[   27.500372] The buggy address belongs to the object at ffff8881058d6700
[   27.500372]  which belongs to the cache kmalloc-64 of size 64
[   27.500998] The buggy address is located 0 bytes to the right of
[   27.500998]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.501421] 
[   27.501534] The buggy address belongs to the physical page:
[   27.501811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.502256] flags: 0x200000000000000(node=0|zone=2)
[   27.502462] page_type: f5(slab)
[   27.502586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.503115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.503397] page dumped because: kasan: bad access detected
[   27.503652] 
[   27.503730] Memory state around the buggy address:
[   27.503913]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.504334]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.504635] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.504969]                                      ^
[   27.505138]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.505455]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.505766] ==================================================================
[   27.620579] ==================================================================
[   27.621259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   27.621676] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.622160] 
[   27.622269] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.622321] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.622336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.622429] Call Trace:
[   27.622448]  <TASK>
[   27.622466]  dump_stack_lvl+0x73/0xb0
[   27.622500]  print_report+0xd1/0x610
[   27.622523]  ? __virt_addr_valid+0x1db/0x2d0
[   27.622548]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.622570]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.622597]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.622619]  kasan_report+0x141/0x180
[   27.622642]  ? kasan_atomics_helper+0x1ce1/0x5450
[   27.622668]  kasan_check_range+0x10c/0x1c0
[   27.622704]  __kasan_check_write+0x18/0x20
[   27.622728]  kasan_atomics_helper+0x1ce1/0x5450
[   27.622752]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.622783]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.622808]  ? kasan_save_alloc_info+0x3b/0x50
[   27.622837]  kasan_atomics+0x1dc/0x310
[   27.622861]  ? __pfx_kasan_atomics+0x10/0x10
[   27.622885]  ? __pfx_read_tsc+0x10/0x10
[   27.622908]  ? ktime_get_ts64+0x86/0x230
[   27.622935]  kunit_try_run_case+0x1a5/0x480
[   27.622958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.622980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.623005]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.623030]  ? __kthread_parkme+0x82/0x180
[   27.623051]  ? preempt_count_sub+0x50/0x80
[   27.623076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.623098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.623124]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.623151]  kthread+0x337/0x6f0
[   27.623171]  ? trace_preempt_on+0x20/0xc0
[   27.623195]  ? __pfx_kthread+0x10/0x10
[   27.623217]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.623240]  ? calculate_sigpending+0x7b/0xa0
[   27.623266]  ? __pfx_kthread+0x10/0x10
[   27.623288]  ret_from_fork+0x116/0x1d0
[   27.623309]  ? __pfx_kthread+0x10/0x10
[   27.623330]  ret_from_fork_asm+0x1a/0x30
[   27.623363]  </TASK>
[   27.623376] 
[   27.632982] Allocated by task 315:
[   27.633179]  kasan_save_stack+0x45/0x70
[   27.633381]  kasan_save_track+0x18/0x40
[   27.633568]  kasan_save_alloc_info+0x3b/0x50
[   27.633768]  __kasan_kmalloc+0xb7/0xc0
[   27.634354]  __kmalloc_cache_noprof+0x189/0x420
[   27.634554]  kasan_atomics+0x95/0x310
[   27.634760]  kunit_try_run_case+0x1a5/0x480
[   27.635145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.635401]  kthread+0x337/0x6f0
[   27.635666]  ret_from_fork+0x116/0x1d0
[   27.635859]  ret_from_fork_asm+0x1a/0x30
[   27.636202] 
[   27.636288] The buggy address belongs to the object at ffff8881058d6700
[   27.636288]  which belongs to the cache kmalloc-64 of size 64
[   27.636968] The buggy address is located 0 bytes to the right of
[   27.636968]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.637579] 
[   27.637684] The buggy address belongs to the physical page:
[   27.637950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.638444] flags: 0x200000000000000(node=0|zone=2)
[   27.638670] page_type: f5(slab)
[   27.638822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.639312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.639677] page dumped because: kasan: bad access detected
[   27.639965] 
[   27.640050] Memory state around the buggy address:
[   27.640262]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.640556]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.640866] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.641429]                                      ^
[   27.641611]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.642122]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.642501] ==================================================================
[   27.546279] ==================================================================
[   27.546744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   27.547470] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.547795] 
[   27.547950] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.548005] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.548020] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.548043] Call Trace:
[   27.548060]  <TASK>
[   27.548081]  dump_stack_lvl+0x73/0xb0
[   27.548114]  print_report+0xd1/0x610
[   27.548138]  ? __virt_addr_valid+0x1db/0x2d0
[   27.548164]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.548186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.548212]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.548235]  kasan_report+0x141/0x180
[   27.548257]  ? kasan_atomics_helper+0x1b22/0x5450
[   27.548284]  kasan_check_range+0x10c/0x1c0
[   27.548309]  __kasan_check_write+0x18/0x20
[   27.548333]  kasan_atomics_helper+0x1b22/0x5450
[   27.548356]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.548379]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.548403]  ? kasan_save_alloc_info+0x3b/0x50
[   27.548433]  kasan_atomics+0x1dc/0x310
[   27.548456]  ? __pfx_kasan_atomics+0x10/0x10
[   27.548481]  ? __pfx_read_tsc+0x10/0x10
[   27.548504]  ? ktime_get_ts64+0x86/0x230
[   27.548530]  kunit_try_run_case+0x1a5/0x480
[   27.548553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.548575]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.548600]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.548625]  ? __kthread_parkme+0x82/0x180
[   27.548646]  ? preempt_count_sub+0x50/0x80
[   27.548671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.548706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.548732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.548758]  kthread+0x337/0x6f0
[   27.548790]  ? trace_preempt_on+0x20/0xc0
[   27.548815]  ? __pfx_kthread+0x10/0x10
[   27.548836]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.548861]  ? calculate_sigpending+0x7b/0xa0
[   27.548888]  ? __pfx_kthread+0x10/0x10
[   27.548911]  ret_from_fork+0x116/0x1d0
[   27.548931]  ? __pfx_kthread+0x10/0x10
[   27.548953]  ret_from_fork_asm+0x1a/0x30
[   27.548985]  </TASK>
[   27.548999] 
[   27.557155] Allocated by task 315:
[   27.557282]  kasan_save_stack+0x45/0x70
[   27.557424]  kasan_save_track+0x18/0x40
[   27.557611]  kasan_save_alloc_info+0x3b/0x50
[   27.557827]  __kasan_kmalloc+0xb7/0xc0
[   27.558189]  __kmalloc_cache_noprof+0x189/0x420
[   27.558410]  kasan_atomics+0x95/0x310
[   27.558589]  kunit_try_run_case+0x1a5/0x480
[   27.558787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.558992]  kthread+0x337/0x6f0
[   27.559111]  ret_from_fork+0x116/0x1d0
[   27.559239]  ret_from_fork_asm+0x1a/0x30
[   27.559374] 
[   27.559441] The buggy address belongs to the object at ffff8881058d6700
[   27.559441]  which belongs to the cache kmalloc-64 of size 64
[   27.560008] The buggy address is located 0 bytes to the right of
[   27.560008]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.560563] 
[   27.560659] The buggy address belongs to the physical page:
[   27.560978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.561276] flags: 0x200000000000000(node=0|zone=2)
[   27.561433] page_type: f5(slab)
[   27.561551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.562649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.563595] page dumped because: kasan: bad access detected
[   27.564415] 
[   27.564591] Memory state around the buggy address:
[   27.565403]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.566125]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.566684] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.567528]                                      ^
[   27.568184]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.568420]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.568632] ==================================================================
[   27.683562] ==================================================================
[   27.684112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   27.684451] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.684774] 
[   27.684869] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.684919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.684933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.684956] Call Trace:
[   27.684973]  <TASK>
[   27.684991]  dump_stack_lvl+0x73/0xb0
[   27.685022]  print_report+0xd1/0x610
[   27.685045]  ? __virt_addr_valid+0x1db/0x2d0
[   27.685070]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.685091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.685118]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.685141]  kasan_report+0x141/0x180
[   27.685164]  ? kasan_atomics_helper+0x1eaa/0x5450
[   27.685190]  kasan_check_range+0x10c/0x1c0
[   27.685214]  __kasan_check_write+0x18/0x20
[   27.685238]  kasan_atomics_helper+0x1eaa/0x5450
[   27.685260]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.685283]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.685307]  ? kasan_save_alloc_info+0x3b/0x50
[   27.685335]  kasan_atomics+0x1dc/0x310
[   27.685359]  ? __pfx_kasan_atomics+0x10/0x10
[   27.685383]  ? __pfx_read_tsc+0x10/0x10
[   27.685406]  ? ktime_get_ts64+0x86/0x230
[   27.685432]  kunit_try_run_case+0x1a5/0x480
[   27.685455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.685476]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.685503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.685530]  ? __kthread_parkme+0x82/0x180
[   27.685552]  ? preempt_count_sub+0x50/0x80
[   27.685576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.685598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.685624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.685649]  kthread+0x337/0x6f0
[   27.685671]  ? trace_preempt_on+0x20/0xc0
[   27.685706]  ? __pfx_kthread+0x10/0x10
[   27.685729]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.685752]  ? calculate_sigpending+0x7b/0xa0
[   27.685777]  ? __pfx_kthread+0x10/0x10
[   27.685800]  ret_from_fork+0x116/0x1d0
[   27.685821]  ? __pfx_kthread+0x10/0x10
[   27.685843]  ret_from_fork_asm+0x1a/0x30
[   27.685874]  </TASK>
[   27.685887] 
[   27.693470] Allocated by task 315:
[   27.693650]  kasan_save_stack+0x45/0x70
[   27.693913]  kasan_save_track+0x18/0x40
[   27.694089]  kasan_save_alloc_info+0x3b/0x50
[   27.694270]  __kasan_kmalloc+0xb7/0xc0
[   27.694430]  __kmalloc_cache_noprof+0x189/0x420
[   27.694580]  kasan_atomics+0x95/0x310
[   27.694720]  kunit_try_run_case+0x1a5/0x480
[   27.694927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.695175]  kthread+0x337/0x6f0
[   27.695338]  ret_from_fork+0x116/0x1d0
[   27.695548]  ret_from_fork_asm+0x1a/0x30
[   27.695749] 
[   27.695891] The buggy address belongs to the object at ffff8881058d6700
[   27.695891]  which belongs to the cache kmalloc-64 of size 64
[   27.696337] The buggy address is located 0 bytes to the right of
[   27.696337]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.696834] 
[   27.696915] The buggy address belongs to the physical page:
[   27.697146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.697449] flags: 0x200000000000000(node=0|zone=2)
[   27.697647] page_type: f5(slab)
[   27.697786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.698089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.698412] page dumped because: kasan: bad access detected
[   27.698613] 
[   27.698714] Memory state around the buggy address:
[   27.698925]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.699210]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.699450] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.699660]                                      ^
[   27.700025]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.700353]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.700608] ==================================================================
[   27.052925] ==================================================================
[   27.053224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   27.053560] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.054190] 
[   27.054288] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.054344] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.054359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.054383] Call Trace:
[   27.054405]  <TASK>
[   27.054425]  dump_stack_lvl+0x73/0xb0
[   27.054474]  print_report+0xd1/0x610
[   27.054499]  ? __virt_addr_valid+0x1db/0x2d0
[   27.054524]  ? kasan_atomics_helper+0xf10/0x5450
[   27.054559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.054586]  ? kasan_atomics_helper+0xf10/0x5450
[   27.054617]  kasan_report+0x141/0x180
[   27.054640]  ? kasan_atomics_helper+0xf10/0x5450
[   27.054666]  kasan_check_range+0x10c/0x1c0
[   27.054720]  __kasan_check_write+0x18/0x20
[   27.054745]  kasan_atomics_helper+0xf10/0x5450
[   27.054768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.054801]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.054827]  ? kasan_save_alloc_info+0x3b/0x50
[   27.054855]  kasan_atomics+0x1dc/0x310
[   27.054879]  ? __pfx_kasan_atomics+0x10/0x10
[   27.054903]  ? __pfx_read_tsc+0x10/0x10
[   27.054927]  ? ktime_get_ts64+0x86/0x230
[   27.054963]  kunit_try_run_case+0x1a5/0x480
[   27.054986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.055008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.055045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.055071]  ? __kthread_parkme+0x82/0x180
[   27.055102]  ? preempt_count_sub+0x50/0x80
[   27.055127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.055149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.055183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.055210]  kthread+0x337/0x6f0
[   27.055230]  ? trace_preempt_on+0x20/0xc0
[   27.055274]  ? __pfx_kthread+0x10/0x10
[   27.055295]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.055318]  ? calculate_sigpending+0x7b/0xa0
[   27.055354]  ? __pfx_kthread+0x10/0x10
[   27.055377]  ret_from_fork+0x116/0x1d0
[   27.055398]  ? __pfx_kthread+0x10/0x10
[   27.055419]  ret_from_fork_asm+0x1a/0x30
[   27.055453]  </TASK>
[   27.055465] 
[   27.062969] Allocated by task 315:
[   27.063104]  kasan_save_stack+0x45/0x70
[   27.063246]  kasan_save_track+0x18/0x40
[   27.063377]  kasan_save_alloc_info+0x3b/0x50
[   27.063520]  __kasan_kmalloc+0xb7/0xc0
[   27.063646]  __kmalloc_cache_noprof+0x189/0x420
[   27.063900]  kasan_atomics+0x95/0x310
[   27.064091]  kunit_try_run_case+0x1a5/0x480
[   27.064301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.064557]  kthread+0x337/0x6f0
[   27.064737]  ret_from_fork+0x116/0x1d0
[   27.064940]  ret_from_fork_asm+0x1a/0x30
[   27.065133] 
[   27.065228] The buggy address belongs to the object at ffff8881058d6700
[   27.065228]  which belongs to the cache kmalloc-64 of size 64
[   27.065841] The buggy address is located 0 bytes to the right of
[   27.065841]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.066276] 
[   27.066347] The buggy address belongs to the physical page:
[   27.066516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.066795] flags: 0x200000000000000(node=0|zone=2)
[   27.067214] page_type: f5(slab)
[   27.067563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.068134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.068480] page dumped because: kasan: bad access detected
[   27.068714] 
[   27.068796] Memory state around the buggy address:
[   27.069050]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.069391]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.069654] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.070148]                                      ^
[   27.070400]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.070728]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.071094] ==================================================================
[   27.570165] ==================================================================
[   27.571606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   27.572461] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.573030] 
[   27.573407] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.573474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.573490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.573514] Call Trace:
[   27.573533]  <TASK>
[   27.573552]  dump_stack_lvl+0x73/0xb0
[   27.573591]  print_report+0xd1/0x610
[   27.573616]  ? __virt_addr_valid+0x1db/0x2d0
[   27.573643]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.573665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.573702]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.573724]  kasan_report+0x141/0x180
[   27.573747]  ? kasan_atomics_helper+0x1c18/0x5450
[   27.573950]  kasan_check_range+0x10c/0x1c0
[   27.574026]  __kasan_check_write+0x18/0x20
[   27.574054]  kasan_atomics_helper+0x1c18/0x5450
[   27.574080]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.574104]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.574132]  ? kasan_save_alloc_info+0x3b/0x50
[   27.574161]  kasan_atomics+0x1dc/0x310
[   27.574184]  ? __pfx_kasan_atomics+0x10/0x10
[   27.574209]  ? __pfx_read_tsc+0x10/0x10
[   27.574234]  ? ktime_get_ts64+0x86/0x230
[   27.574260]  kunit_try_run_case+0x1a5/0x480
[   27.574284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.574305]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.574331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.574356]  ? __kthread_parkme+0x82/0x180
[   27.574378]  ? preempt_count_sub+0x50/0x80
[   27.574403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.574426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.574451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.574478]  kthread+0x337/0x6f0
[   27.574499]  ? trace_preempt_on+0x20/0xc0
[   27.574524]  ? __pfx_kthread+0x10/0x10
[   27.574546]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.574569]  ? calculate_sigpending+0x7b/0xa0
[   27.574594]  ? __pfx_kthread+0x10/0x10
[   27.574617]  ret_from_fork+0x116/0x1d0
[   27.574638]  ? __pfx_kthread+0x10/0x10
[   27.574660]  ret_from_fork_asm+0x1a/0x30
[   27.574704]  </TASK>
[   27.574717] 
[   27.587388] Allocated by task 315:
[   27.587580]  kasan_save_stack+0x45/0x70
[   27.587773]  kasan_save_track+0x18/0x40
[   27.588283]  kasan_save_alloc_info+0x3b/0x50
[   27.588448]  __kasan_kmalloc+0xb7/0xc0
[   27.588752]  __kmalloc_cache_noprof+0x189/0x420
[   27.589067]  kasan_atomics+0x95/0x310
[   27.589299]  kunit_try_run_case+0x1a5/0x480
[   27.589562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.589895]  kthread+0x337/0x6f0
[   27.590077]  ret_from_fork+0x116/0x1d0
[   27.590368]  ret_from_fork_asm+0x1a/0x30
[   27.590561] 
[   27.590654] The buggy address belongs to the object at ffff8881058d6700
[   27.590654]  which belongs to the cache kmalloc-64 of size 64
[   27.591298] The buggy address is located 0 bytes to the right of
[   27.591298]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.591982] 
[   27.592093] The buggy address belongs to the physical page:
[   27.592303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.592637] flags: 0x200000000000000(node=0|zone=2)
[   27.592864] page_type: f5(slab)
[   27.593333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.593622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.594137] page dumped because: kasan: bad access detected
[   27.594454] 
[   27.594529] Memory state around the buggy address:
[   27.594823]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.595284]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.595599] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.596079]                                      ^
[   27.596359]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.596610]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.597039] ==================================================================
[   26.711507] ==================================================================
[   26.712217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   26.712545] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.713152] 
[   26.713281] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.713546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.713564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.713587] Call Trace:
[   26.713611]  <TASK>
[   26.713674]  dump_stack_lvl+0x73/0xb0
[   26.713726]  print_report+0xd1/0x610
[   26.713749]  ? __virt_addr_valid+0x1db/0x2d0
[   26.713783]  ? kasan_atomics_helper+0x697/0x5450
[   26.713805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.713832]  ? kasan_atomics_helper+0x697/0x5450
[   26.713854]  kasan_report+0x141/0x180
[   26.713876]  ? kasan_atomics_helper+0x697/0x5450
[   26.713966]  kasan_check_range+0x10c/0x1c0
[   26.713991]  __kasan_check_write+0x18/0x20
[   26.714015]  kasan_atomics_helper+0x697/0x5450
[   26.714039]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.714062]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.714089]  ? kasan_save_alloc_info+0x3b/0x50
[   26.714120]  kasan_atomics+0x1dc/0x310
[   26.714144]  ? __pfx_kasan_atomics+0x10/0x10
[   26.714170]  ? __pfx_read_tsc+0x10/0x10
[   26.714193]  ? ktime_get_ts64+0x86/0x230
[   26.714221]  kunit_try_run_case+0x1a5/0x480
[   26.714245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.714266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.714293]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.714318]  ? __kthread_parkme+0x82/0x180
[   26.714340]  ? preempt_count_sub+0x50/0x80
[   26.714365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.714389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.714416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.714442]  kthread+0x337/0x6f0
[   26.714463]  ? trace_preempt_on+0x20/0xc0
[   26.714488]  ? __pfx_kthread+0x10/0x10
[   26.714510]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.714533]  ? calculate_sigpending+0x7b/0xa0
[   26.714558]  ? __pfx_kthread+0x10/0x10
[   26.714581]  ret_from_fork+0x116/0x1d0
[   26.714602]  ? __pfx_kthread+0x10/0x10
[   26.714623]  ret_from_fork_asm+0x1a/0x30
[   26.714657]  </TASK>
[   26.714670] 
[   26.727425] Allocated by task 315:
[   26.727620]  kasan_save_stack+0x45/0x70
[   26.727863]  kasan_save_track+0x18/0x40
[   26.728221]  kasan_save_alloc_info+0x3b/0x50
[   26.728585]  __kasan_kmalloc+0xb7/0xc0
[   26.728932]  __kmalloc_cache_noprof+0x189/0x420
[   26.729266]  kasan_atomics+0x95/0x310
[   26.729444]  kunit_try_run_case+0x1a5/0x480
[   26.729635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.730087]  kthread+0x337/0x6f0
[   26.730386]  ret_from_fork+0x116/0x1d0
[   26.730769]  ret_from_fork_asm+0x1a/0x30
[   26.731106] 
[   26.731332] The buggy address belongs to the object at ffff8881058d6700
[   26.731332]  which belongs to the cache kmalloc-64 of size 64
[   26.732133] The buggy address is located 0 bytes to the right of
[   26.732133]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.732958] 
[   26.733195] The buggy address belongs to the physical page:
[   26.733434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.733756] flags: 0x200000000000000(node=0|zone=2)
[   26.734293] page_type: f5(slab)
[   26.734725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.735310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.735629] page dumped because: kasan: bad access detected
[   26.736218] 
[   26.736319] Memory state around the buggy address:
[   26.736748]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.737274]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.737743] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.738059]                                      ^
[   26.738431]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.739072]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.739377] ==================================================================
[   26.800248] ==================================================================
[   26.801160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   26.802038] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.802604] 
[   26.802715] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.802778] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.802794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.802819] Call Trace:
[   26.802837]  <TASK>
[   26.802857]  dump_stack_lvl+0x73/0xb0
[   26.802893]  print_report+0xd1/0x610
[   26.802916]  ? __virt_addr_valid+0x1db/0x2d0
[   26.802942]  ? kasan_atomics_helper+0x860/0x5450
[   26.802964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.802992]  ? kasan_atomics_helper+0x860/0x5450
[   26.803014]  kasan_report+0x141/0x180
[   26.803037]  ? kasan_atomics_helper+0x860/0x5450
[   26.803063]  kasan_check_range+0x10c/0x1c0
[   26.803087]  __kasan_check_write+0x18/0x20
[   26.803111]  kasan_atomics_helper+0x860/0x5450
[   26.803135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.803158]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.803183]  ? kasan_save_alloc_info+0x3b/0x50
[   26.803212]  kasan_atomics+0x1dc/0x310
[   26.803235]  ? __pfx_kasan_atomics+0x10/0x10
[   26.803259]  ? __pfx_read_tsc+0x10/0x10
[   26.803282]  ? ktime_get_ts64+0x86/0x230
[   26.803310]  kunit_try_run_case+0x1a5/0x480
[   26.803333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.803355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.803380]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.803405]  ? __kthread_parkme+0x82/0x180
[   26.803427]  ? preempt_count_sub+0x50/0x80
[   26.803451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.803474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.803500]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.803527]  kthread+0x337/0x6f0
[   26.803547]  ? trace_preempt_on+0x20/0xc0
[   26.803571]  ? __pfx_kthread+0x10/0x10
[   26.803593]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.803616]  ? calculate_sigpending+0x7b/0xa0
[   26.803641]  ? __pfx_kthread+0x10/0x10
[   26.803663]  ret_from_fork+0x116/0x1d0
[   26.803684]  ? __pfx_kthread+0x10/0x10
[   26.803904]  ret_from_fork_asm+0x1a/0x30
[   26.803967]  </TASK>
[   26.803981] 
[   26.820839] Allocated by task 315:
[   26.821121]  kasan_save_stack+0x45/0x70
[   26.821644]  kasan_save_track+0x18/0x40
[   26.821979]  kasan_save_alloc_info+0x3b/0x50
[   26.822441]  __kasan_kmalloc+0xb7/0xc0
[   26.822813]  __kmalloc_cache_noprof+0x189/0x420
[   26.823256]  kasan_atomics+0x95/0x310
[   26.823594]  kunit_try_run_case+0x1a5/0x480
[   26.823943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.824532]  kthread+0x337/0x6f0
[   26.824762]  ret_from_fork+0x116/0x1d0
[   26.825223]  ret_from_fork_asm+0x1a/0x30
[   26.825590] 
[   26.825684] The buggy address belongs to the object at ffff8881058d6700
[   26.825684]  which belongs to the cache kmalloc-64 of size 64
[   26.826767] The buggy address is located 0 bytes to the right of
[   26.826767]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.828033] 
[   26.828151] The buggy address belongs to the physical page:
[   26.828609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.828948] flags: 0x200000000000000(node=0|zone=2)
[   26.829651] page_type: f5(slab)
[   26.830096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.830847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.831416] page dumped because: kasan: bad access detected
[   26.831934] 
[   26.832005] Memory state around the buggy address:
[   26.832156]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.832799]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.833540] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.834269]                                      ^
[   26.834607]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.834984]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.835721] ==================================================================
[   26.688305] ==================================================================
[   26.688611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   26.689057] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.689288] 
[   26.689404] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.689460] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.689476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.689501] Call Trace:
[   26.689524]  <TASK>
[   26.689550]  dump_stack_lvl+0x73/0xb0
[   26.689584]  print_report+0xd1/0x610
[   26.689608]  ? __virt_addr_valid+0x1db/0x2d0
[   26.689633]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.689655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.689683]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.689719]  kasan_report+0x141/0x180
[   26.689742]  ? kasan_atomics_helper+0x5fe/0x5450
[   26.689769]  kasan_check_range+0x10c/0x1c0
[   26.689793]  __kasan_check_write+0x18/0x20
[   26.689834]  kasan_atomics_helper+0x5fe/0x5450
[   26.689856]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.689879]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.689905]  ? kasan_save_alloc_info+0x3b/0x50
[   26.689933]  kasan_atomics+0x1dc/0x310
[   26.689957]  ? __pfx_kasan_atomics+0x10/0x10
[   26.689982]  ? __pfx_read_tsc+0x10/0x10
[   26.690033]  ? ktime_get_ts64+0x86/0x230
[   26.690061]  kunit_try_run_case+0x1a5/0x480
[   26.690086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.690106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.690132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.690157]  ? __kthread_parkme+0x82/0x180
[   26.690180]  ? preempt_count_sub+0x50/0x80
[   26.690205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.690228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.690255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.690281]  kthread+0x337/0x6f0
[   26.690302]  ? trace_preempt_on+0x20/0xc0
[   26.690327]  ? __pfx_kthread+0x10/0x10
[   26.690349]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.690372]  ? calculate_sigpending+0x7b/0xa0
[   26.690399]  ? __pfx_kthread+0x10/0x10
[   26.690422]  ret_from_fork+0x116/0x1d0
[   26.690443]  ? __pfx_kthread+0x10/0x10
[   26.690464]  ret_from_fork_asm+0x1a/0x30
[   26.690497]  </TASK>
[   26.690510] 
[   26.698205] Allocated by task 315:
[   26.698336]  kasan_save_stack+0x45/0x70
[   26.698732]  kasan_save_track+0x18/0x40
[   26.699105]  kasan_save_alloc_info+0x3b/0x50
[   26.699300]  __kasan_kmalloc+0xb7/0xc0
[   26.699477]  __kmalloc_cache_noprof+0x189/0x420
[   26.699702]  kasan_atomics+0x95/0x310
[   26.699911]  kunit_try_run_case+0x1a5/0x480
[   26.700091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.700306]  kthread+0x337/0x6f0
[   26.700502]  ret_from_fork+0x116/0x1d0
[   26.700676]  ret_from_fork_asm+0x1a/0x30
[   26.700853] 
[   26.700920] The buggy address belongs to the object at ffff8881058d6700
[   26.700920]  which belongs to the cache kmalloc-64 of size 64
[   26.702949] The buggy address is located 0 bytes to the right of
[   26.702949]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.703374] 
[   26.703449] The buggy address belongs to the physical page:
[   26.703623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.704611] flags: 0x200000000000000(node=0|zone=2)
[   26.705257] page_type: f5(slab)
[   26.705565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.706163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.706509] page dumped because: kasan: bad access detected
[   26.706955] 
[   26.707191] Memory state around the buggy address:
[   26.707655]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.708313]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.708599] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.709154]                                      ^
[   26.709611]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.710270]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.710685] ==================================================================
[   27.188150] ==================================================================
[   27.188509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   27.189021] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.189631] 
[   27.189785] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.189862] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.189878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.189902] Call Trace:
[   27.189936]  <TASK>
[   27.189959]  dump_stack_lvl+0x73/0xb0
[   27.190004]  print_report+0xd1/0x610
[   27.190028]  ? __virt_addr_valid+0x1db/0x2d0
[   27.190065]  ? kasan_atomics_helper+0x1217/0x5450
[   27.190087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.190114]  ? kasan_atomics_helper+0x1217/0x5450
[   27.190137]  kasan_report+0x141/0x180
[   27.190159]  ? kasan_atomics_helper+0x1217/0x5450
[   27.190186]  kasan_check_range+0x10c/0x1c0
[   27.190211]  __kasan_check_write+0x18/0x20
[   27.190235]  kasan_atomics_helper+0x1217/0x5450
[   27.190258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.190281]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.190306]  ? kasan_save_alloc_info+0x3b/0x50
[   27.190336]  kasan_atomics+0x1dc/0x310
[   27.190369]  ? __pfx_kasan_atomics+0x10/0x10
[   27.190394]  ? __pfx_read_tsc+0x10/0x10
[   27.190418]  ? ktime_get_ts64+0x86/0x230
[   27.190455]  kunit_try_run_case+0x1a5/0x480
[   27.190480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.190501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.190527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.190561]  ? __kthread_parkme+0x82/0x180
[   27.190583]  ? preempt_count_sub+0x50/0x80
[   27.190609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.190641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.190668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.190702]  kthread+0x337/0x6f0
[   27.190722]  ? trace_preempt_on+0x20/0xc0
[   27.190756]  ? __pfx_kthread+0x10/0x10
[   27.190778]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.190812]  ? calculate_sigpending+0x7b/0xa0
[   27.190850]  ? __pfx_kthread+0x10/0x10
[   27.190873]  ret_from_fork+0x116/0x1d0
[   27.190894]  ? __pfx_kthread+0x10/0x10
[   27.190916]  ret_from_fork_asm+0x1a/0x30
[   27.190958]  </TASK>
[   27.190972] 
[   27.198748] Allocated by task 315:
[   27.198993]  kasan_save_stack+0x45/0x70
[   27.199167]  kasan_save_track+0x18/0x40
[   27.199359]  kasan_save_alloc_info+0x3b/0x50
[   27.199541]  __kasan_kmalloc+0xb7/0xc0
[   27.199753]  __kmalloc_cache_noprof+0x189/0x420
[   27.200198]  kasan_atomics+0x95/0x310
[   27.200383]  kunit_try_run_case+0x1a5/0x480
[   27.200575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.201804]  kthread+0x337/0x6f0
[   27.202051]  ret_from_fork+0x116/0x1d0
[   27.202206]  ret_from_fork_asm+0x1a/0x30
[   27.202348] 
[   27.202419] The buggy address belongs to the object at ffff8881058d6700
[   27.202419]  which belongs to the cache kmalloc-64 of size 64
[   27.203473] The buggy address is located 0 bytes to the right of
[   27.203473]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.204544] 
[   27.204748] The buggy address belongs to the physical page:
[   27.205284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.205788] flags: 0x200000000000000(node=0|zone=2)
[   27.206225] page_type: f5(slab)
[   27.206526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.207565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.208056] page dumped because: kasan: bad access detected
[   27.208305] 
[   27.208393] Memory state around the buggy address:
[   27.208603]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.209357]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.209912] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.210213]                                      ^
[   27.210424]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.210730]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.210942] ==================================================================
[   27.506468] ==================================================================
[   27.506841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   27.507130] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.507572] 
[   27.507711] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.507764] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.507779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.507802] Call Trace:
[   27.507831]  <TASK>
[   27.507871]  dump_stack_lvl+0x73/0xb0
[   27.507904]  print_report+0xd1/0x610
[   27.507938]  ? __virt_addr_valid+0x1db/0x2d0
[   27.507963]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.507987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.508013]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.508036]  kasan_report+0x141/0x180
[   27.508068]  ? kasan_atomics_helper+0x19e3/0x5450
[   27.508094]  kasan_check_range+0x10c/0x1c0
[   27.508129]  __kasan_check_write+0x18/0x20
[   27.508152]  kasan_atomics_helper+0x19e3/0x5450
[   27.508176]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.508198]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.508224]  ? kasan_save_alloc_info+0x3b/0x50
[   27.508253]  kasan_atomics+0x1dc/0x310
[   27.508275]  ? __pfx_kasan_atomics+0x10/0x10
[   27.508300]  ? __pfx_read_tsc+0x10/0x10
[   27.508325]  ? ktime_get_ts64+0x86/0x230
[   27.508352]  kunit_try_run_case+0x1a5/0x480
[   27.508375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.508397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.508423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.508448]  ? __kthread_parkme+0x82/0x180
[   27.508471]  ? preempt_count_sub+0x50/0x80
[   27.508496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.508519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.508545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.508571]  kthread+0x337/0x6f0
[   27.508591]  ? trace_preempt_on+0x20/0xc0
[   27.508616]  ? __pfx_kthread+0x10/0x10
[   27.508638]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.508662]  ? calculate_sigpending+0x7b/0xa0
[   27.508688]  ? __pfx_kthread+0x10/0x10
[   27.508719]  ret_from_fork+0x116/0x1d0
[   27.508749]  ? __pfx_kthread+0x10/0x10
[   27.508771]  ret_from_fork_asm+0x1a/0x30
[   27.508804]  </TASK>
[   27.508827] 
[   27.516331] Allocated by task 315:
[   27.516505]  kasan_save_stack+0x45/0x70
[   27.516744]  kasan_save_track+0x18/0x40
[   27.516944]  kasan_save_alloc_info+0x3b/0x50
[   27.517137]  __kasan_kmalloc+0xb7/0xc0
[   27.517328]  __kmalloc_cache_noprof+0x189/0x420
[   27.517529]  kasan_atomics+0x95/0x310
[   27.517713]  kunit_try_run_case+0x1a5/0x480
[   27.518017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.518256]  kthread+0x337/0x6f0
[   27.518424]  ret_from_fork+0x116/0x1d0
[   27.518607]  ret_from_fork_asm+0x1a/0x30
[   27.518856] 
[   27.518936] The buggy address belongs to the object at ffff8881058d6700
[   27.518936]  which belongs to the cache kmalloc-64 of size 64
[   27.519437] The buggy address is located 0 bytes to the right of
[   27.519437]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.520040] 
[   27.520113] The buggy address belongs to the physical page:
[   27.520397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.520726] flags: 0x200000000000000(node=0|zone=2)
[   27.521030] page_type: f5(slab)
[   27.521181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.521526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.521762] page dumped because: kasan: bad access detected
[   27.521939] 
[   27.522005] Memory state around the buggy address:
[   27.522196]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.522628]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.523141] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.523352]                                      ^
[   27.523503]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.523736]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.524288] ==================================================================
[   26.955053] ==================================================================
[   26.955392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   26.955728] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.956052] 
[   26.956154] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.956201] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.956216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.956237] Call Trace:
[   26.956254]  <TASK>
[   26.956271]  dump_stack_lvl+0x73/0xb0
[   26.956300]  print_report+0xd1/0x610
[   26.956323]  ? __virt_addr_valid+0x1db/0x2d0
[   26.956347]  ? kasan_atomics_helper+0xc70/0x5450
[   26.956368]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.956394]  ? kasan_atomics_helper+0xc70/0x5450
[   26.956415]  kasan_report+0x141/0x180
[   26.956437]  ? kasan_atomics_helper+0xc70/0x5450
[   26.956463]  kasan_check_range+0x10c/0x1c0
[   26.956486]  __kasan_check_write+0x18/0x20
[   26.956509]  kasan_atomics_helper+0xc70/0x5450
[   26.956531]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.956553]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.956577]  ? kasan_save_alloc_info+0x3b/0x50
[   26.956605]  kasan_atomics+0x1dc/0x310
[   26.956630]  ? __pfx_kasan_atomics+0x10/0x10
[   26.956654]  ? __pfx_read_tsc+0x10/0x10
[   26.956713]  ? ktime_get_ts64+0x86/0x230
[   26.956741]  kunit_try_run_case+0x1a5/0x480
[   26.956765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.956787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.956812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.956837]  ? __kthread_parkme+0x82/0x180
[   26.956859]  ? preempt_count_sub+0x50/0x80
[   26.956884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.956908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.956934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.956960]  kthread+0x337/0x6f0
[   26.956981]  ? trace_preempt_on+0x20/0xc0
[   26.957006]  ? __pfx_kthread+0x10/0x10
[   26.957028]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.957051]  ? calculate_sigpending+0x7b/0xa0
[   26.957077]  ? __pfx_kthread+0x10/0x10
[   26.957100]  ret_from_fork+0x116/0x1d0
[   26.957133]  ? __pfx_kthread+0x10/0x10
[   26.957154]  ret_from_fork_asm+0x1a/0x30
[   26.957186]  </TASK>
[   26.957199] 
[   26.964954] Allocated by task 315:
[   26.965127]  kasan_save_stack+0x45/0x70
[   26.965326]  kasan_save_track+0x18/0x40
[   26.965513]  kasan_save_alloc_info+0x3b/0x50
[   26.965724]  __kasan_kmalloc+0xb7/0xc0
[   26.965975]  __kmalloc_cache_noprof+0x189/0x420
[   26.966174]  kasan_atomics+0x95/0x310
[   26.966365]  kunit_try_run_case+0x1a5/0x480
[   26.966543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.966820]  kthread+0x337/0x6f0
[   26.966986]  ret_from_fork+0x116/0x1d0
[   26.967161]  ret_from_fork_asm+0x1a/0x30
[   26.967297] 
[   26.967364] The buggy address belongs to the object at ffff8881058d6700
[   26.967364]  which belongs to the cache kmalloc-64 of size 64
[   26.967714] The buggy address is located 0 bytes to the right of
[   26.967714]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.968080] 
[   26.968150] The buggy address belongs to the physical page:
[   26.968332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.968708] flags: 0x200000000000000(node=0|zone=2)
[   26.968939] page_type: f5(slab)
[   26.969101] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.969434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.969771] page dumped because: kasan: bad access detected
[   26.970020] 
[   26.970109] Memory state around the buggy address:
[   26.970457]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.970746]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.971038] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.971249]                                      ^
[   26.971403]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.971612]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.972080] ==================================================================
[   26.895412] ==================================================================
[   26.896092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   26.896748] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.897398] 
[   26.897590] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.897646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.897661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.897685] Call Trace:
[   26.897710]  <TASK>
[   26.897743]  dump_stack_lvl+0x73/0xb0
[   26.897776]  print_report+0xd1/0x610
[   26.897799]  ? __virt_addr_valid+0x1db/0x2d0
[   26.897837]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.897859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.897886]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.897909]  kasan_report+0x141/0x180
[   26.897933]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.897959]  kasan_check_range+0x10c/0x1c0
[   26.897984]  __kasan_check_write+0x18/0x20
[   26.898008]  kasan_atomics_helper+0xa2b/0x5450
[   26.898043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.898068]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.898095]  ? kasan_save_alloc_info+0x3b/0x50
[   26.898124]  kasan_atomics+0x1dc/0x310
[   26.898148]  ? __pfx_kasan_atomics+0x10/0x10
[   26.898172]  ? __pfx_read_tsc+0x10/0x10
[   26.898197]  ? ktime_get_ts64+0x86/0x230
[   26.898224]  kunit_try_run_case+0x1a5/0x480
[   26.898248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.898269]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.898296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.898320]  ? __kthread_parkme+0x82/0x180
[   26.898343]  ? preempt_count_sub+0x50/0x80
[   26.898368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.898390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.898417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.898443]  kthread+0x337/0x6f0
[   26.898464]  ? trace_preempt_on+0x20/0xc0
[   26.898490]  ? __pfx_kthread+0x10/0x10
[   26.898513]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.898536]  ? calculate_sigpending+0x7b/0xa0
[   26.898562]  ? __pfx_kthread+0x10/0x10
[   26.898585]  ret_from_fork+0x116/0x1d0
[   26.898606]  ? __pfx_kthread+0x10/0x10
[   26.898628]  ret_from_fork_asm+0x1a/0x30
[   26.898662]  </TASK>
[   26.898675] 
[   26.910184] Allocated by task 315:
[   26.910507]  kasan_save_stack+0x45/0x70
[   26.910842]  kasan_save_track+0x18/0x40
[   26.910981]  kasan_save_alloc_info+0x3b/0x50
[   26.911127]  __kasan_kmalloc+0xb7/0xc0
[   26.911254]  __kmalloc_cache_noprof+0x189/0x420
[   26.911405]  kasan_atomics+0x95/0x310
[   26.911533]  kunit_try_run_case+0x1a5/0x480
[   26.911672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.911915]  kthread+0x337/0x6f0
[   26.912114]  ret_from_fork+0x116/0x1d0
[   26.912305]  ret_from_fork_asm+0x1a/0x30
[   26.912458] 
[   26.912526] The buggy address belongs to the object at ffff8881058d6700
[   26.912526]  which belongs to the cache kmalloc-64 of size 64
[   26.913000] The buggy address is located 0 bytes to the right of
[   26.913000]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.913418] 
[   26.913526] The buggy address belongs to the physical page:
[   26.913845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.914263] flags: 0x200000000000000(node=0|zone=2)
[   26.914509] page_type: f5(slab)
[   26.914667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.915028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.915343] page dumped because: kasan: bad access detected
[   26.915582] 
[   26.915672] Memory state around the buggy address:
[   26.915905]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.916201]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.916460] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.916759]                                      ^
[   26.916999]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.917286]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.917592] ==================================================================
[   27.290446] ==================================================================
[   27.291154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   27.291501] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.291860] 
[   27.291951] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.292006] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.292021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.292045] Call Trace:
[   27.292066]  <TASK>
[   27.292088]  dump_stack_lvl+0x73/0xb0
[   27.292121]  print_report+0xd1/0x610
[   27.292146]  ? __virt_addr_valid+0x1db/0x2d0
[   27.292172]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.292195]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.292222]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.292244]  kasan_report+0x141/0x180
[   27.292267]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.292294]  __asan_report_load8_noabort+0x18/0x20
[   27.292331]  kasan_atomics_helper+0x4eae/0x5450
[   27.292354]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.292377]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.292422]  ? kasan_save_alloc_info+0x3b/0x50
[   27.292452]  kasan_atomics+0x1dc/0x310
[   27.292475]  ? __pfx_kasan_atomics+0x10/0x10
[   27.292511]  ? __pfx_read_tsc+0x10/0x10
[   27.292537]  ? ktime_get_ts64+0x86/0x230
[   27.292564]  kunit_try_run_case+0x1a5/0x480
[   27.292588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.292610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.292635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.292660]  ? __kthread_parkme+0x82/0x180
[   27.292683]  ? preempt_count_sub+0x50/0x80
[   27.292723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.292746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.292772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.292819]  kthread+0x337/0x6f0
[   27.292840]  ? trace_preempt_on+0x20/0xc0
[   27.292866]  ? __pfx_kthread+0x10/0x10
[   27.292897]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.292920]  ? calculate_sigpending+0x7b/0xa0
[   27.292946]  ? __pfx_kthread+0x10/0x10
[   27.292968]  ret_from_fork+0x116/0x1d0
[   27.292989]  ? __pfx_kthread+0x10/0x10
[   27.293011]  ret_from_fork_asm+0x1a/0x30
[   27.293043]  </TASK>
[   27.293056] 
[   27.300547] Allocated by task 315:
[   27.300745]  kasan_save_stack+0x45/0x70
[   27.300937]  kasan_save_track+0x18/0x40
[   27.301071]  kasan_save_alloc_info+0x3b/0x50
[   27.301308]  __kasan_kmalloc+0xb7/0xc0
[   27.301508]  __kmalloc_cache_noprof+0x189/0x420
[   27.301702]  kasan_atomics+0x95/0x310
[   27.302006]  kunit_try_run_case+0x1a5/0x480
[   27.302178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.302397]  kthread+0x337/0x6f0
[   27.302563]  ret_from_fork+0x116/0x1d0
[   27.303880]  ret_from_fork_asm+0x1a/0x30
[   27.304084] 
[   27.304179] The buggy address belongs to the object at ffff8881058d6700
[   27.304179]  which belongs to the cache kmalloc-64 of size 64
[   27.305902] The buggy address is located 0 bytes to the right of
[   27.305902]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.306284] 
[   27.306359] The buggy address belongs to the physical page:
[   27.306528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.306812] flags: 0x200000000000000(node=0|zone=2)
[   27.307045] page_type: f5(slab)
[   27.307209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.307541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.307934] page dumped because: kasan: bad access detected
[   27.308200] 
[   27.308270] Memory state around the buggy address:
[   27.308416]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.309456]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.310933] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.311995]                                      ^
[   27.312172]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.312392]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.312603] ==================================================================
[   27.427191] ==================================================================
[   27.427539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   27.428333] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.428749] 
[   27.428871] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.428957] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.428973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.428995] Call Trace:
[   27.429023]  <TASK>
[   27.429043]  dump_stack_lvl+0x73/0xb0
[   27.429076]  print_report+0xd1/0x610
[   27.429099]  ? __virt_addr_valid+0x1db/0x2d0
[   27.429125]  ? kasan_atomics_helper+0x177f/0x5450
[   27.429147]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.429173]  ? kasan_atomics_helper+0x177f/0x5450
[   27.429198]  kasan_report+0x141/0x180
[   27.429221]  ? kasan_atomics_helper+0x177f/0x5450
[   27.429277]  kasan_check_range+0x10c/0x1c0
[   27.429302]  __kasan_check_write+0x18/0x20
[   27.429336]  kasan_atomics_helper+0x177f/0x5450
[   27.429360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.429382]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.429408]  ? kasan_save_alloc_info+0x3b/0x50
[   27.429437]  kasan_atomics+0x1dc/0x310
[   27.429461]  ? __pfx_kasan_atomics+0x10/0x10
[   27.429486]  ? __pfx_read_tsc+0x10/0x10
[   27.429539]  ? ktime_get_ts64+0x86/0x230
[   27.429577]  kunit_try_run_case+0x1a5/0x480
[   27.429613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.429636]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.429663]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.429689]  ? __kthread_parkme+0x82/0x180
[   27.429721]  ? preempt_count_sub+0x50/0x80
[   27.429746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.429770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.429808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.429835]  kthread+0x337/0x6f0
[   27.429856]  ? trace_preempt_on+0x20/0xc0
[   27.429881]  ? __pfx_kthread+0x10/0x10
[   27.429904]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.429928]  ? calculate_sigpending+0x7b/0xa0
[   27.429954]  ? __pfx_kthread+0x10/0x10
[   27.429978]  ret_from_fork+0x116/0x1d0
[   27.429999]  ? __pfx_kthread+0x10/0x10
[   27.430021]  ret_from_fork_asm+0x1a/0x30
[   27.430055]  </TASK>
[   27.430068] 
[   27.438022] Allocated by task 315:
[   27.438378]  kasan_save_stack+0x45/0x70
[   27.438622]  kasan_save_track+0x18/0x40
[   27.438873]  kasan_save_alloc_info+0x3b/0x50
[   27.439085]  __kasan_kmalloc+0xb7/0xc0
[   27.439303]  __kmalloc_cache_noprof+0x189/0x420
[   27.439474]  kasan_atomics+0x95/0x310
[   27.439610]  kunit_try_run_case+0x1a5/0x480
[   27.439878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.440158]  kthread+0x337/0x6f0
[   27.440280]  ret_from_fork+0x116/0x1d0
[   27.440410]  ret_from_fork_asm+0x1a/0x30
[   27.440650] 
[   27.440752] The buggy address belongs to the object at ffff8881058d6700
[   27.440752]  which belongs to the cache kmalloc-64 of size 64
[   27.441322] The buggy address is located 0 bytes to the right of
[   27.441322]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.441687] 
[   27.441785] The buggy address belongs to the physical page:
[   27.442087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.442577] flags: 0x200000000000000(node=0|zone=2)
[   27.442828] page_type: f5(slab)
[   27.443044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.443340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.443571] page dumped because: kasan: bad access detected
[   27.443909] 
[   27.444048] Memory state around the buggy address:
[   27.444243]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.444540]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.445004] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.445351]                                      ^
[   27.445581]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.445902]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.446113] ==================================================================
[   26.995871] ==================================================================
[   26.996135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   26.996498] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.996774] 
[   26.996877] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.996927] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.996942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.996974] Call Trace:
[   26.996992]  <TASK>
[   26.997011]  dump_stack_lvl+0x73/0xb0
[   26.997054]  print_report+0xd1/0x610
[   26.997078]  ? __virt_addr_valid+0x1db/0x2d0
[   26.997125]  ? kasan_atomics_helper+0xd47/0x5450
[   26.997147]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.997174]  ? kasan_atomics_helper+0xd47/0x5450
[   26.997207]  kasan_report+0x141/0x180
[   26.997229]  ? kasan_atomics_helper+0xd47/0x5450
[   26.997256]  kasan_check_range+0x10c/0x1c0
[   26.997280]  __kasan_check_write+0x18/0x20
[   26.997304]  kasan_atomics_helper+0xd47/0x5450
[   26.997327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.997350]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.997374]  ? kasan_save_alloc_info+0x3b/0x50
[   26.997403]  kasan_atomics+0x1dc/0x310
[   26.997426]  ? __pfx_kasan_atomics+0x10/0x10
[   26.997451]  ? __pfx_read_tsc+0x10/0x10
[   26.997483]  ? ktime_get_ts64+0x86/0x230
[   26.997509]  kunit_try_run_case+0x1a5/0x480
[   26.997543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.997564]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.997589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.997614]  ? __kthread_parkme+0x82/0x180
[   26.997635]  ? preempt_count_sub+0x50/0x80
[   26.997660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.997682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.997717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.997743]  kthread+0x337/0x6f0
[   26.997764]  ? trace_preempt_on+0x20/0xc0
[   26.997788]  ? __pfx_kthread+0x10/0x10
[   26.997810]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.997833]  ? calculate_sigpending+0x7b/0xa0
[   26.997858]  ? __pfx_kthread+0x10/0x10
[   26.997890]  ret_from_fork+0x116/0x1d0
[   26.997921]  ? __pfx_kthread+0x10/0x10
[   26.997943]  ret_from_fork_asm+0x1a/0x30
[   26.997986]  </TASK>
[   26.997998] 
[   27.005771] Allocated by task 315:
[   27.006020]  kasan_save_stack+0x45/0x70
[   27.006229]  kasan_save_track+0x18/0x40
[   27.006396]  kasan_save_alloc_info+0x3b/0x50
[   27.006611]  __kasan_kmalloc+0xb7/0xc0
[   27.006817]  __kmalloc_cache_noprof+0x189/0x420
[   27.007003]  kasan_atomics+0x95/0x310
[   27.007134]  kunit_try_run_case+0x1a5/0x480
[   27.007316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.007590]  kthread+0x337/0x6f0
[   27.007762]  ret_from_fork+0x116/0x1d0
[   27.007902]  ret_from_fork_asm+0x1a/0x30
[   27.008038] 
[   27.008114] The buggy address belongs to the object at ffff8881058d6700
[   27.008114]  which belongs to the cache kmalloc-64 of size 64
[   27.008656] The buggy address is located 0 bytes to the right of
[   27.008656]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.009081] 
[   27.009151] The buggy address belongs to the physical page:
[   27.009320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.009818] flags: 0x200000000000000(node=0|zone=2)
[   27.010051] page_type: f5(slab)
[   27.010215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.010549] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.010911] page dumped because: kasan: bad access detected
[   27.011079] 
[   27.011144] Memory state around the buggy address:
[   27.011297]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.011542]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.011994] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.012337]                                      ^
[   27.012535]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.012907]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.013187] ==================================================================
[   27.597543] ==================================================================
[   27.597828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   27.598105] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.599219] 
[   27.599459] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.599518] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.599590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.599614] Call Trace:
[   27.599634]  <TASK>
[   27.599657]  dump_stack_lvl+0x73/0xb0
[   27.599704]  print_report+0xd1/0x610
[   27.599728]  ? __virt_addr_valid+0x1db/0x2d0
[   27.599753]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.599788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.599819]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.599842]  kasan_report+0x141/0x180
[   27.599865]  ? kasan_atomics_helper+0x4f30/0x5450
[   27.599892]  __asan_report_load8_noabort+0x18/0x20
[   27.599917]  kasan_atomics_helper+0x4f30/0x5450
[   27.599940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.599963]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.599987]  ? kasan_save_alloc_info+0x3b/0x50
[   27.600016]  kasan_atomics+0x1dc/0x310
[   27.600040]  ? __pfx_kasan_atomics+0x10/0x10
[   27.600065]  ? __pfx_read_tsc+0x10/0x10
[   27.600089]  ? ktime_get_ts64+0x86/0x230
[   27.600116]  kunit_try_run_case+0x1a5/0x480
[   27.600138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.600160]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.600185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.600210]  ? __kthread_parkme+0x82/0x180
[   27.600232]  ? preempt_count_sub+0x50/0x80
[   27.600257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.600280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.600305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.600332]  kthread+0x337/0x6f0
[   27.600353]  ? trace_preempt_on+0x20/0xc0
[   27.600378]  ? __pfx_kthread+0x10/0x10
[   27.600400]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.600423]  ? calculate_sigpending+0x7b/0xa0
[   27.600449]  ? __pfx_kthread+0x10/0x10
[   27.600472]  ret_from_fork+0x116/0x1d0
[   27.600492]  ? __pfx_kthread+0x10/0x10
[   27.600516]  ret_from_fork_asm+0x1a/0x30
[   27.600551]  </TASK>
[   27.600564] 
[   27.610084] Allocated by task 315:
[   27.610260]  kasan_save_stack+0x45/0x70
[   27.610430]  kasan_save_track+0x18/0x40
[   27.610594]  kasan_save_alloc_info+0x3b/0x50
[   27.611193]  __kasan_kmalloc+0xb7/0xc0
[   27.611380]  __kmalloc_cache_noprof+0x189/0x420
[   27.611549]  kasan_atomics+0x95/0x310
[   27.611834]  kunit_try_run_case+0x1a5/0x480
[   27.612074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.612432]  kthread+0x337/0x6f0
[   27.612580]  ret_from_fork+0x116/0x1d0
[   27.613000]  ret_from_fork_asm+0x1a/0x30
[   27.613260] 
[   27.613361] The buggy address belongs to the object at ffff8881058d6700
[   27.613361]  which belongs to the cache kmalloc-64 of size 64
[   27.614048] The buggy address is located 0 bytes to the right of
[   27.614048]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.614624] 
[   27.614723] The buggy address belongs to the physical page:
[   27.615199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.615597] flags: 0x200000000000000(node=0|zone=2)
[   27.615937] page_type: f5(slab)
[   27.616073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.616523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.616969] page dumped because: kasan: bad access detected
[   27.617230] 
[   27.617388] Memory state around the buggy address:
[   27.617713]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.618106]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.618399] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.618685]                                      ^
[   27.619103]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.619462]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.619747] ==================================================================
[   27.032477] ==================================================================
[   27.032866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   27.033142] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.033362] 
[   27.033444] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.033493] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.033507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.033531] Call Trace:
[   27.033549]  <TASK>
[   27.033566]  dump_stack_lvl+0x73/0xb0
[   27.033610]  print_report+0xd1/0x610
[   27.033633]  ? __virt_addr_valid+0x1db/0x2d0
[   27.033658]  ? kasan_atomics_helper+0xe78/0x5450
[   27.033701]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.033728]  ? kasan_atomics_helper+0xe78/0x5450
[   27.033752]  kasan_report+0x141/0x180
[   27.033775]  ? kasan_atomics_helper+0xe78/0x5450
[   27.033821]  kasan_check_range+0x10c/0x1c0
[   27.033845]  __kasan_check_write+0x18/0x20
[   27.033869]  kasan_atomics_helper+0xe78/0x5450
[   27.033903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.033926]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.033951]  ? kasan_save_alloc_info+0x3b/0x50
[   27.033980]  kasan_atomics+0x1dc/0x310
[   27.034012]  ? __pfx_kasan_atomics+0x10/0x10
[   27.034037]  ? __pfx_read_tsc+0x10/0x10
[   27.034060]  ? ktime_get_ts64+0x86/0x230
[   27.034097]  kunit_try_run_case+0x1a5/0x480
[   27.034120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.034143]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.034171]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.034197]  ? __kthread_parkme+0x82/0x180
[   27.034220]  ? preempt_count_sub+0x50/0x80
[   27.034245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.034268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.034294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.034319]  kthread+0x337/0x6f0
[   27.034340]  ? trace_preempt_on+0x20/0xc0
[   27.034365]  ? __pfx_kthread+0x10/0x10
[   27.034387]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.034410]  ? calculate_sigpending+0x7b/0xa0
[   27.034435]  ? __pfx_kthread+0x10/0x10
[   27.034457]  ret_from_fork+0x116/0x1d0
[   27.034477]  ? __pfx_kthread+0x10/0x10
[   27.034499]  ret_from_fork_asm+0x1a/0x30
[   27.034531]  </TASK>
[   27.034543] 
[   27.041323] Allocated by task 315:
[   27.041502]  kasan_save_stack+0x45/0x70
[   27.041710]  kasan_save_track+0x18/0x40
[   27.042064]  kasan_save_alloc_info+0x3b/0x50
[   27.042274]  __kasan_kmalloc+0xb7/0xc0
[   27.042455]  __kmalloc_cache_noprof+0x189/0x420
[   27.042682]  kasan_atomics+0x95/0x310
[   27.043020]  kunit_try_run_case+0x1a5/0x480
[   27.043228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.043478]  kthread+0x337/0x6f0
[   27.043645]  ret_from_fork+0x116/0x1d0
[   27.043927]  ret_from_fork_asm+0x1a/0x30
[   27.044125] 
[   27.044218] The buggy address belongs to the object at ffff8881058d6700
[   27.044218]  which belongs to the cache kmalloc-64 of size 64
[   27.044572] The buggy address is located 0 bytes to the right of
[   27.044572]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.045480] 
[   27.045572] The buggy address belongs to the physical page:
[   27.045760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.046988] flags: 0x200000000000000(node=0|zone=2)
[   27.047157] page_type: f5(slab)
[   27.047283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.047556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.048666] page dumped because: kasan: bad access detected
[   27.048865] 
[   27.048934] Memory state around the buggy address:
[   27.049083]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.049359]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.049613] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.050213]                                      ^
[   27.050445]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.050829]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.051147] ==================================================================
[   27.407435] ==================================================================
[   27.407796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   27.408437] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.408784] 
[   27.408899] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.408983] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.408999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.409024] Call Trace:
[   27.409046]  <TASK>
[   27.409092]  dump_stack_lvl+0x73/0xb0
[   27.409137]  print_report+0xd1/0x610
[   27.409188]  ? __virt_addr_valid+0x1db/0x2d0
[   27.409225]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.409259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.409314]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.409349]  kasan_report+0x141/0x180
[   27.409382]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.409410]  kasan_check_range+0x10c/0x1c0
[   27.409434]  __kasan_check_write+0x18/0x20
[   27.409458]  kasan_atomics_helper+0x16e7/0x5450
[   27.409482]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.409505]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.409531]  ? kasan_save_alloc_info+0x3b/0x50
[   27.409560]  kasan_atomics+0x1dc/0x310
[   27.409584]  ? __pfx_kasan_atomics+0x10/0x10
[   27.409608]  ? __pfx_read_tsc+0x10/0x10
[   27.409633]  ? ktime_get_ts64+0x86/0x230
[   27.409660]  kunit_try_run_case+0x1a5/0x480
[   27.409684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.409714]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.409740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.409765]  ? __kthread_parkme+0x82/0x180
[   27.409798]  ? preempt_count_sub+0x50/0x80
[   27.409824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.409847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.409873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.409913]  kthread+0x337/0x6f0
[   27.409934]  ? trace_preempt_on+0x20/0xc0
[   27.409960]  ? __pfx_kthread+0x10/0x10
[   27.409982]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.410004]  ? calculate_sigpending+0x7b/0xa0
[   27.410030]  ? __pfx_kthread+0x10/0x10
[   27.410053]  ret_from_fork+0x116/0x1d0
[   27.410074]  ? __pfx_kthread+0x10/0x10
[   27.410096]  ret_from_fork_asm+0x1a/0x30
[   27.410130]  </TASK>
[   27.410144] 
[   27.418259] Allocated by task 315:
[   27.418482]  kasan_save_stack+0x45/0x70
[   27.418648]  kasan_save_track+0x18/0x40
[   27.418890]  kasan_save_alloc_info+0x3b/0x50
[   27.419132]  __kasan_kmalloc+0xb7/0xc0
[   27.419263]  __kmalloc_cache_noprof+0x189/0x420
[   27.419415]  kasan_atomics+0x95/0x310
[   27.419544]  kunit_try_run_case+0x1a5/0x480
[   27.419760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.420138]  kthread+0x337/0x6f0
[   27.420322]  ret_from_fork+0x116/0x1d0
[   27.420559]  ret_from_fork_asm+0x1a/0x30
[   27.420890] 
[   27.420977] The buggy address belongs to the object at ffff8881058d6700
[   27.420977]  which belongs to the cache kmalloc-64 of size 64
[   27.421389] The buggy address is located 0 bytes to the right of
[   27.421389]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.421956] 
[   27.422063] The buggy address belongs to the physical page:
[   27.422367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.422720] flags: 0x200000000000000(node=0|zone=2)
[   27.422880] page_type: f5(slab)
[   27.423082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.423408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.423629] page dumped because: kasan: bad access detected
[   27.423807] 
[   27.423896] Memory state around the buggy address:
[   27.424193]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.424559]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.424886] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.425202]                                      ^
[   27.425362]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.425907]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.426179] ==================================================================
[   27.850192] ==================================================================
[   27.850598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   27.851384] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.851690] 
[   27.851993] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.852052] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.852068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.852092] Call Trace:
[   27.852112]  <TASK>
[   27.852133]  dump_stack_lvl+0x73/0xb0
[   27.852169]  print_report+0xd1/0x610
[   27.852195]  ? __virt_addr_valid+0x1db/0x2d0
[   27.852220]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.852243]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.852271]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.852293]  kasan_report+0x141/0x180
[   27.852316]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.852343]  __asan_report_load8_noabort+0x18/0x20
[   27.852368]  kasan_atomics_helper+0x4fa5/0x5450
[   27.852392]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.852416]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.852441]  ? kasan_save_alloc_info+0x3b/0x50
[   27.852470]  kasan_atomics+0x1dc/0x310
[   27.852494]  ? __pfx_kasan_atomics+0x10/0x10
[   27.852518]  ? __pfx_read_tsc+0x10/0x10
[   27.852541]  ? ktime_get_ts64+0x86/0x230
[   27.852568]  kunit_try_run_case+0x1a5/0x480
[   27.852590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.852612]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.852637]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.852662]  ? __kthread_parkme+0x82/0x180
[   27.852683]  ? preempt_count_sub+0x50/0x80
[   27.852721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.852744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.852769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.853210]  kthread+0x337/0x6f0
[   27.853234]  ? trace_preempt_on+0x20/0xc0
[   27.853261]  ? __pfx_kthread+0x10/0x10
[   27.853287]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.853351]  ? calculate_sigpending+0x7b/0xa0
[   27.853380]  ? __pfx_kthread+0x10/0x10
[   27.853404]  ret_from_fork+0x116/0x1d0
[   27.853425]  ? __pfx_kthread+0x10/0x10
[   27.853447]  ret_from_fork_asm+0x1a/0x30
[   27.853480]  </TASK>
[   27.853494] 
[   27.864532] Allocated by task 315:
[   27.864842]  kasan_save_stack+0x45/0x70
[   27.865216]  kasan_save_track+0x18/0x40
[   27.865502]  kasan_save_alloc_info+0x3b/0x50
[   27.865726]  __kasan_kmalloc+0xb7/0xc0
[   27.866222]  __kmalloc_cache_noprof+0x189/0x420
[   27.866467]  kasan_atomics+0x95/0x310
[   27.866782]  kunit_try_run_case+0x1a5/0x480
[   27.867109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.867348]  kthread+0x337/0x6f0
[   27.867495]  ret_from_fork+0x116/0x1d0
[   27.867667]  ret_from_fork_asm+0x1a/0x30
[   27.867822] 
[   27.867894] The buggy address belongs to the object at ffff8881058d6700
[   27.867894]  which belongs to the cache kmalloc-64 of size 64
[   27.868497] The buggy address is located 0 bytes to the right of
[   27.868497]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.869152] 
[   27.869245] The buggy address belongs to the physical page:
[   27.869462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.869843] flags: 0x200000000000000(node=0|zone=2)
[   27.870059] page_type: f5(slab)
[   27.870226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.870531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.870898] page dumped because: kasan: bad access detected
[   27.871099] 
[   27.871165] Memory state around the buggy address:
[   27.871311]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.871515]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.871867] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.872186]                                      ^
[   27.872431]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.873336]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.873714] ==================================================================
[   27.211598] ==================================================================
[   27.212525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   27.212972] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.213341] 
[   27.213459] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.213514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.213530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.213656] Call Trace:
[   27.213681]  <TASK>
[   27.213713]  dump_stack_lvl+0x73/0xb0
[   27.213747]  print_report+0xd1/0x610
[   27.213793]  ? __virt_addr_valid+0x1db/0x2d0
[   27.213821]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.213854]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.213881]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.213904]  kasan_report+0x141/0x180
[   27.213927]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.213954]  __asan_report_load4_noabort+0x18/0x20
[   27.213988]  kasan_atomics_helper+0x49e8/0x5450
[   27.214012]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.214035]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.214070]  ? kasan_save_alloc_info+0x3b/0x50
[   27.214099]  kasan_atomics+0x1dc/0x310
[   27.214122]  ? __pfx_kasan_atomics+0x10/0x10
[   27.214147]  ? __pfx_read_tsc+0x10/0x10
[   27.214171]  ? ktime_get_ts64+0x86/0x230
[   27.214197]  kunit_try_run_case+0x1a5/0x480
[   27.214221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.214243]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.214268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.214293]  ? __kthread_parkme+0x82/0x180
[   27.214315]  ? preempt_count_sub+0x50/0x80
[   27.214350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.214372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.214398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.214435]  kthread+0x337/0x6f0
[   27.214455]  ? trace_preempt_on+0x20/0xc0
[   27.214482]  ? __pfx_kthread+0x10/0x10
[   27.214504]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.214527]  ? calculate_sigpending+0x7b/0xa0
[   27.214561]  ? __pfx_kthread+0x10/0x10
[   27.214584]  ret_from_fork+0x116/0x1d0
[   27.214605]  ? __pfx_kthread+0x10/0x10
[   27.214638]  ret_from_fork_asm+0x1a/0x30
[   27.214671]  </TASK>
[   27.214683] 
[   27.222414] Allocated by task 315:
[   27.222560]  kasan_save_stack+0x45/0x70
[   27.222716]  kasan_save_track+0x18/0x40
[   27.223055]  kasan_save_alloc_info+0x3b/0x50
[   27.223261]  __kasan_kmalloc+0xb7/0xc0
[   27.223452]  __kmalloc_cache_noprof+0x189/0x420
[   27.223606]  kasan_atomics+0x95/0x310
[   27.223768]  kunit_try_run_case+0x1a5/0x480
[   27.223980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.224246]  kthread+0x337/0x6f0
[   27.224445]  ret_from_fork+0x116/0x1d0
[   27.224631]  ret_from_fork_asm+0x1a/0x30
[   27.224782] 
[   27.224851] The buggy address belongs to the object at ffff8881058d6700
[   27.224851]  which belongs to the cache kmalloc-64 of size 64
[   27.225418] The buggy address is located 0 bytes to the right of
[   27.225418]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.225999] 
[   27.226072] The buggy address belongs to the physical page:
[   27.226294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.226645] flags: 0x200000000000000(node=0|zone=2)
[   27.226940] page_type: f5(slab)
[   27.227097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.227425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.227753] page dumped because: kasan: bad access detected
[   27.227959] 
[   27.228026] Memory state around the buggy address:
[   27.228176]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.228389]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.228684] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.229003]                                      ^
[   27.229378]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.229701]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.230160] ==================================================================
[   27.387829] ==================================================================
[   27.388069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   27.388298] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.388831] 
[   27.389097] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.389154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.389168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.389192] Call Trace:
[   27.389246]  <TASK>
[   27.389278]  dump_stack_lvl+0x73/0xb0
[   27.389325]  print_report+0xd1/0x610
[   27.389377]  ? __virt_addr_valid+0x1db/0x2d0
[   27.389424]  ? kasan_atomics_helper+0x164f/0x5450
[   27.389448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.389501]  ? kasan_atomics_helper+0x164f/0x5450
[   27.389525]  kasan_report+0x141/0x180
[   27.389569]  ? kasan_atomics_helper+0x164f/0x5450
[   27.389596]  kasan_check_range+0x10c/0x1c0
[   27.389645]  __kasan_check_write+0x18/0x20
[   27.389669]  kasan_atomics_helper+0x164f/0x5450
[   27.389709]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.389733]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.389758]  ? kasan_save_alloc_info+0x3b/0x50
[   27.389799]  kasan_atomics+0x1dc/0x310
[   27.389823]  ? __pfx_kasan_atomics+0x10/0x10
[   27.389848]  ? __pfx_read_tsc+0x10/0x10
[   27.389872]  ? ktime_get_ts64+0x86/0x230
[   27.389900]  kunit_try_run_case+0x1a5/0x480
[   27.389924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.389945]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.389972]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.389997]  ? __kthread_parkme+0x82/0x180
[   27.390020]  ? preempt_count_sub+0x50/0x80
[   27.390044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.390068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.390095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.390120]  kthread+0x337/0x6f0
[   27.390141]  ? trace_preempt_on+0x20/0xc0
[   27.390166]  ? __pfx_kthread+0x10/0x10
[   27.390188]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.390212]  ? calculate_sigpending+0x7b/0xa0
[   27.390238]  ? __pfx_kthread+0x10/0x10
[   27.390261]  ret_from_fork+0x116/0x1d0
[   27.390281]  ? __pfx_kthread+0x10/0x10
[   27.390303]  ret_from_fork_asm+0x1a/0x30
[   27.390336]  </TASK>
[   27.390349] 
[   27.398150] Allocated by task 315:
[   27.398444]  kasan_save_stack+0x45/0x70
[   27.398716]  kasan_save_track+0x18/0x40
[   27.399097]  kasan_save_alloc_info+0x3b/0x50
[   27.399272]  __kasan_kmalloc+0xb7/0xc0
[   27.399401]  __kmalloc_cache_noprof+0x189/0x420
[   27.399665]  kasan_atomics+0x95/0x310
[   27.400073]  kunit_try_run_case+0x1a5/0x480
[   27.400328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.400543]  kthread+0x337/0x6f0
[   27.400664]  ret_from_fork+0x116/0x1d0
[   27.400981]  ret_from_fork_asm+0x1a/0x30
[   27.401256] 
[   27.401388] The buggy address belongs to the object at ffff8881058d6700
[   27.401388]  which belongs to the cache kmalloc-64 of size 64
[   27.401927] The buggy address is located 0 bytes to the right of
[   27.401927]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.402497] 
[   27.402596] The buggy address belongs to the physical page:
[   27.402807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.403202] flags: 0x200000000000000(node=0|zone=2)
[   27.403487] page_type: f5(slab)
[   27.403644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.404022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.404305] page dumped because: kasan: bad access detected
[   27.404556] 
[   27.404640] Memory state around the buggy address:
[   27.404890]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.405217]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.405480] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.405829]                                      ^
[   27.406037]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.406338]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.406564] ==================================================================
[   27.761118] ==================================================================
[   27.761503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   27.761906] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.762122] 
[   27.762204] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.762256] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.762271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.762294] Call Trace:
[   27.762312]  <TASK>
[   27.762331]  dump_stack_lvl+0x73/0xb0
[   27.762361]  print_report+0xd1/0x610
[   27.762384]  ? __virt_addr_valid+0x1db/0x2d0
[   27.762410]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.762432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.762460]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.762481]  kasan_report+0x141/0x180
[   27.762504]  ? kasan_atomics_helper+0x4f98/0x5450
[   27.762530]  __asan_report_load8_noabort+0x18/0x20
[   27.762554]  kasan_atomics_helper+0x4f98/0x5450
[   27.762578]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.762601]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.762625]  ? kasan_save_alloc_info+0x3b/0x50
[   27.762654]  kasan_atomics+0x1dc/0x310
[   27.762678]  ? __pfx_kasan_atomics+0x10/0x10
[   27.762716]  ? __pfx_read_tsc+0x10/0x10
[   27.762740]  ? ktime_get_ts64+0x86/0x230
[   27.762790]  kunit_try_run_case+0x1a5/0x480
[   27.762814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.762849]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.762877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.762915]  ? __kthread_parkme+0x82/0x180
[   27.762950]  ? preempt_count_sub+0x50/0x80
[   27.762975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.763011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.763049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.763101]  kthread+0x337/0x6f0
[   27.763132]  ? trace_preempt_on+0x20/0xc0
[   27.763157]  ? __pfx_kthread+0x10/0x10
[   27.763180]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.763203]  ? calculate_sigpending+0x7b/0xa0
[   27.763230]  ? __pfx_kthread+0x10/0x10
[   27.763253]  ret_from_fork+0x116/0x1d0
[   27.763273]  ? __pfx_kthread+0x10/0x10
[   27.763296]  ret_from_fork_asm+0x1a/0x30
[   27.763329]  </TASK>
[   27.763342] 
[   27.772819] Allocated by task 315:
[   27.773122]  kasan_save_stack+0x45/0x70
[   27.773460]  kasan_save_track+0x18/0x40
[   27.773649]  kasan_save_alloc_info+0x3b/0x50
[   27.774130]  __kasan_kmalloc+0xb7/0xc0
[   27.774382]  __kmalloc_cache_noprof+0x189/0x420
[   27.774737]  kasan_atomics+0x95/0x310
[   27.775011]  kunit_try_run_case+0x1a5/0x480
[   27.775317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.775548]  kthread+0x337/0x6f0
[   27.775707]  ret_from_fork+0x116/0x1d0
[   27.775868]  ret_from_fork_asm+0x1a/0x30
[   27.776111] 
[   27.776205] The buggy address belongs to the object at ffff8881058d6700
[   27.776205]  which belongs to the cache kmalloc-64 of size 64
[   27.776639] The buggy address is located 0 bytes to the right of
[   27.776639]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.777301] 
[   27.777400] The buggy address belongs to the physical page:
[   27.777631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.778012] flags: 0x200000000000000(node=0|zone=2)
[   27.778230] page_type: f5(slab)
[   27.778345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.778890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.779239] page dumped because: kasan: bad access detected
[   27.779481] 
[   27.779574] Memory state around the buggy address:
[   27.779790]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.780130]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.780444] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.780726]                                      ^
[   27.781026]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.781269]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.781496] ==================================================================
[   26.972529] ==================================================================
[   26.973177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   26.973519] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.973754] 
[   26.973963] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.974024] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.974039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.974073] Call Trace:
[   26.974089]  <TASK>
[   26.974106]  dump_stack_lvl+0x73/0xb0
[   26.974135]  print_report+0xd1/0x610
[   26.974159]  ? __virt_addr_valid+0x1db/0x2d0
[   26.974182]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.974204]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.974231]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.974254]  kasan_report+0x141/0x180
[   26.974276]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.974302]  __asan_report_load4_noabort+0x18/0x20
[   26.974327]  kasan_atomics_helper+0x4a84/0x5450
[   26.974350]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.974372]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.974397]  ? kasan_save_alloc_info+0x3b/0x50
[   26.974426]  kasan_atomics+0x1dc/0x310
[   26.974449]  ? __pfx_kasan_atomics+0x10/0x10
[   26.974474]  ? __pfx_read_tsc+0x10/0x10
[   26.974500]  ? ktime_get_ts64+0x86/0x230
[   26.974527]  kunit_try_run_case+0x1a5/0x480
[   26.974550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.974572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.974597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.974621]  ? __kthread_parkme+0x82/0x180
[   26.974650]  ? preempt_count_sub+0x50/0x80
[   26.974676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.974715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.974742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.974768]  kthread+0x337/0x6f0
[   26.974797]  ? trace_preempt_on+0x20/0xc0
[   26.974822]  ? __pfx_kthread+0x10/0x10
[   26.974844]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.974867]  ? calculate_sigpending+0x7b/0xa0
[   26.974892]  ? __pfx_kthread+0x10/0x10
[   26.974915]  ret_from_fork+0x116/0x1d0
[   26.974936]  ? __pfx_kthread+0x10/0x10
[   26.974957]  ret_from_fork_asm+0x1a/0x30
[   26.974990]  </TASK>
[   26.975003] 
[   26.982232] Allocated by task 315:
[   26.982406]  kasan_save_stack+0x45/0x70
[   26.982601]  kasan_save_track+0x18/0x40
[   26.983032]  kasan_save_alloc_info+0x3b/0x50
[   26.983259]  __kasan_kmalloc+0xb7/0xc0
[   26.983416]  __kmalloc_cache_noprof+0x189/0x420
[   26.983568]  kasan_atomics+0x95/0x310
[   26.983709]  kunit_try_run_case+0x1a5/0x480
[   26.985108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.985385]  kthread+0x337/0x6f0
[   26.985555]  ret_from_fork+0x116/0x1d0
[   26.986078]  ret_from_fork_asm+0x1a/0x30
[   26.986503] 
[   26.986752] The buggy address belongs to the object at ffff8881058d6700
[   26.986752]  which belongs to the cache kmalloc-64 of size 64
[   26.987285] The buggy address is located 0 bytes to the right of
[   26.987285]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.988023] 
[   26.988276] The buggy address belongs to the physical page:
[   26.988537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.989156] flags: 0x200000000000000(node=0|zone=2)
[   26.989517] page_type: f5(slab)
[   26.989919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.990438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.991292] page dumped because: kasan: bad access detected
[   26.991927] 
[   26.992171] Memory state around the buggy address:
[   26.992486]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.992982]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.993462] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.993981]                                      ^
[   26.994413]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.994974]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.995289] ==================================================================
[   27.782288] ==================================================================
[   27.782605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   27.782949] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.783340] 
[   27.783431] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.783507] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.783523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.783563] Call Trace:
[   27.783583]  <TASK>
[   27.783615]  dump_stack_lvl+0x73/0xb0
[   27.783661]  print_report+0xd1/0x610
[   27.783684]  ? __virt_addr_valid+0x1db/0x2d0
[   27.783721]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.783757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.783784]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.783806]  kasan_report+0x141/0x180
[   27.783834]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.783861]  kasan_check_range+0x10c/0x1c0
[   27.783886]  __kasan_check_write+0x18/0x20
[   27.783909]  kasan_atomics_helper+0x20c8/0x5450
[   27.783932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.783956]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.783980]  ? kasan_save_alloc_info+0x3b/0x50
[   27.784010]  kasan_atomics+0x1dc/0x310
[   27.784035]  ? __pfx_kasan_atomics+0x10/0x10
[   27.784060]  ? __pfx_read_tsc+0x10/0x10
[   27.784094]  ? ktime_get_ts64+0x86/0x230
[   27.784122]  kunit_try_run_case+0x1a5/0x480
[   27.784145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.784167]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.784192]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.784217]  ? __kthread_parkme+0x82/0x180
[   27.784239]  ? preempt_count_sub+0x50/0x80
[   27.784263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.784286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.784313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.784339]  kthread+0x337/0x6f0
[   27.784359]  ? trace_preempt_on+0x20/0xc0
[   27.784383]  ? __pfx_kthread+0x10/0x10
[   27.784405]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.784447]  ? calculate_sigpending+0x7b/0xa0
[   27.784474]  ? __pfx_kthread+0x10/0x10
[   27.784496]  ret_from_fork+0x116/0x1d0
[   27.784517]  ? __pfx_kthread+0x10/0x10
[   27.784538]  ret_from_fork_asm+0x1a/0x30
[   27.784571]  </TASK>
[   27.784584] 
[   27.792747] Allocated by task 315:
[   27.793043]  kasan_save_stack+0x45/0x70
[   27.793226]  kasan_save_track+0x18/0x40
[   27.793399]  kasan_save_alloc_info+0x3b/0x50
[   27.793579]  __kasan_kmalloc+0xb7/0xc0
[   27.793756]  __kmalloc_cache_noprof+0x189/0x420
[   27.793952]  kasan_atomics+0x95/0x310
[   27.794122]  kunit_try_run_case+0x1a5/0x480
[   27.794302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.794524]  kthread+0x337/0x6f0
[   27.794670]  ret_from_fork+0x116/0x1d0
[   27.795869]  ret_from_fork_asm+0x1a/0x30
[   27.796295] 
[   27.796372] The buggy address belongs to the object at ffff8881058d6700
[   27.796372]  which belongs to the cache kmalloc-64 of size 64
[   27.796792] The buggy address is located 0 bytes to the right of
[   27.796792]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.798007] 
[   27.798126] The buggy address belongs to the physical page:
[   27.798589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.799142] flags: 0x200000000000000(node=0|zone=2)
[   27.799357] page_type: f5(slab)
[   27.799524] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.800106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.800385] page dumped because: kasan: bad access detected
[   27.800611] 
[   27.800712] Memory state around the buggy address:
[   27.801411]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.801955]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.802263] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.802557]                                      ^
[   27.802770]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.803349]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.803612] ==================================================================
[   26.530655] ==================================================================
[   26.531439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   26.532143] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.532889] 
[   26.533048] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.533104] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.533119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.533144] Call Trace:
[   26.533158]  <TASK>
[   26.533179]  dump_stack_lvl+0x73/0xb0
[   26.533214]  print_report+0xd1/0x610
[   26.533239]  ? __virt_addr_valid+0x1db/0x2d0
[   26.533265]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.533287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.533314]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.533336]  kasan_report+0x141/0x180
[   26.533359]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.533385]  __asan_report_store4_noabort+0x1b/0x30
[   26.533410]  kasan_atomics_helper+0x4ba2/0x5450
[   26.533434]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.533456]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.533482]  ? kasan_save_alloc_info+0x3b/0x50
[   26.533511]  kasan_atomics+0x1dc/0x310
[   26.533534]  ? __pfx_kasan_atomics+0x10/0x10
[   26.533559]  ? __pfx_read_tsc+0x10/0x10
[   26.533583]  ? ktime_get_ts64+0x86/0x230
[   26.533610]  kunit_try_run_case+0x1a5/0x480
[   26.533633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.533655]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.533680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.533719]  ? __kthread_parkme+0x82/0x180
[   26.533742]  ? preempt_count_sub+0x50/0x80
[   26.533767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.533789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.533815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.533842]  kthread+0x337/0x6f0
[   26.533862]  ? trace_preempt_on+0x20/0xc0
[   26.533887]  ? __pfx_kthread+0x10/0x10
[   26.533909]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.533932]  ? calculate_sigpending+0x7b/0xa0
[   26.533957]  ? __pfx_kthread+0x10/0x10
[   26.533980]  ret_from_fork+0x116/0x1d0
[   26.534000]  ? __pfx_kthread+0x10/0x10
[   26.534021]  ret_from_fork_asm+0x1a/0x30
[   26.534054]  </TASK>
[   26.534113] 
[   26.544342] Allocated by task 315:
[   26.544519]  kasan_save_stack+0x45/0x70
[   26.544731]  kasan_save_track+0x18/0x40
[   26.544969]  kasan_save_alloc_info+0x3b/0x50
[   26.545112]  __kasan_kmalloc+0xb7/0xc0
[   26.545240]  __kmalloc_cache_noprof+0x189/0x420
[   26.545390]  kasan_atomics+0x95/0x310
[   26.545516]  kunit_try_run_case+0x1a5/0x480
[   26.545653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.545970]  kthread+0x337/0x6f0
[   26.546093]  ret_from_fork+0x116/0x1d0
[   26.546226]  ret_from_fork_asm+0x1a/0x30
[   26.546361] 
[   26.546429] The buggy address belongs to the object at ffff8881058d6700
[   26.546429]  which belongs to the cache kmalloc-64 of size 64
[   26.547133] The buggy address is located 0 bytes to the right of
[   26.547133]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.547719] 
[   26.547790] The buggy address belongs to the physical page:
[   26.548113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.548405] flags: 0x200000000000000(node=0|zone=2)
[   26.548564] page_type: f5(slab)
[   26.548684] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.549217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.549525] page dumped because: kasan: bad access detected
[   26.549734] 
[   26.549800] Memory state around the buggy address:
[   26.549954]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.550386]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.550732] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.551052]                                      ^
[   26.551246]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.551457]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.551666] ==================================================================
[   27.231258] ==================================================================
[   27.231598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   27.231956] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.232337] 
[   27.232447] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.232514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.232541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.232565] Call Trace:
[   27.232587]  <TASK>
[   27.232611]  dump_stack_lvl+0x73/0xb0
[   27.232651]  print_report+0xd1/0x610
[   27.232674]  ? __virt_addr_valid+0x1db/0x2d0
[   27.232718]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.232740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.232767]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.232799]  kasan_report+0x141/0x180
[   27.232822]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.232858]  kasan_check_range+0x10c/0x1c0
[   27.232882]  __kasan_check_write+0x18/0x20
[   27.232906]  kasan_atomics_helper+0x12e6/0x5450
[   27.232940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.232963]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.232989]  ? kasan_save_alloc_info+0x3b/0x50
[   27.233028]  kasan_atomics+0x1dc/0x310
[   27.233052]  ? __pfx_kasan_atomics+0x10/0x10
[   27.233078]  ? __pfx_read_tsc+0x10/0x10
[   27.233114]  ? ktime_get_ts64+0x86/0x230
[   27.233142]  kunit_try_run_case+0x1a5/0x480
[   27.233166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.233196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.233222]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.233247]  ? __kthread_parkme+0x82/0x180
[   27.233280]  ? preempt_count_sub+0x50/0x80
[   27.233305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.233328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.233356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.233392]  kthread+0x337/0x6f0
[   27.233413]  ? trace_preempt_on+0x20/0xc0
[   27.233448]  ? __pfx_kthread+0x10/0x10
[   27.233471]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.233495]  ? calculate_sigpending+0x7b/0xa0
[   27.233521]  ? __pfx_kthread+0x10/0x10
[   27.233544]  ret_from_fork+0x116/0x1d0
[   27.233565]  ? __pfx_kthread+0x10/0x10
[   27.233590]  ret_from_fork_asm+0x1a/0x30
[   27.233625]  </TASK>
[   27.233646] 
[   27.241038] Allocated by task 315:
[   27.241169]  kasan_save_stack+0x45/0x70
[   27.241398]  kasan_save_track+0x18/0x40
[   27.241752]  kasan_save_alloc_info+0x3b/0x50
[   27.242212]  __kasan_kmalloc+0xb7/0xc0
[   27.242406]  __kmalloc_cache_noprof+0x189/0x420
[   27.242659]  kasan_atomics+0x95/0x310
[   27.243016]  kunit_try_run_case+0x1a5/0x480
[   27.243236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.243513]  kthread+0x337/0x6f0
[   27.243661]  ret_from_fork+0x116/0x1d0
[   27.243857]  ret_from_fork_asm+0x1a/0x30
[   27.244007] 
[   27.244073] The buggy address belongs to the object at ffff8881058d6700
[   27.244073]  which belongs to the cache kmalloc-64 of size 64
[   27.244414] The buggy address is located 0 bytes to the right of
[   27.244414]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.245183] 
[   27.245279] The buggy address belongs to the physical page:
[   27.245538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.245975] flags: 0x200000000000000(node=0|zone=2)
[   27.246143] page_type: f5(slab)
[   27.246263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.246491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.246721] page dumped because: kasan: bad access detected
[   27.247226] 
[   27.247317] Memory state around the buggy address:
[   27.247551]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.247924]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.248268] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.248545]                                      ^
[   27.248717]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.249298]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.249599] ==================================================================
[   27.271996] ==================================================================
[   27.272502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   27.272832] Read of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.273284] 
[   27.273408] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.273472] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.273488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.273523] Call Trace:
[   27.273545]  <TASK>
[   27.273570]  dump_stack_lvl+0x73/0xb0
[   27.273603]  print_report+0xd1/0x610
[   27.273627]  ? __virt_addr_valid+0x1db/0x2d0
[   27.273653]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.273684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.273723]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.273746]  kasan_report+0x141/0x180
[   27.273780]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.273817]  kasan_check_range+0x10c/0x1c0
[   27.273841]  __kasan_check_read+0x15/0x20
[   27.273865]  kasan_atomics_helper+0x13b5/0x5450
[   27.273888]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.273920]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.273946]  ? kasan_save_alloc_info+0x3b/0x50
[   27.273985]  kasan_atomics+0x1dc/0x310
[   27.274009]  ? __pfx_kasan_atomics+0x10/0x10
[   27.274033]  ? __pfx_read_tsc+0x10/0x10
[   27.274058]  ? ktime_get_ts64+0x86/0x230
[   27.274094]  kunit_try_run_case+0x1a5/0x480
[   27.274117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.274141]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.274177]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.274202]  ? __kthread_parkme+0x82/0x180
[   27.274225]  ? preempt_count_sub+0x50/0x80
[   27.274259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.274281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.274308]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.274344]  kthread+0x337/0x6f0
[   27.274364]  ? trace_preempt_on+0x20/0xc0
[   27.274390]  ? __pfx_kthread+0x10/0x10
[   27.274412]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.274435]  ? calculate_sigpending+0x7b/0xa0
[   27.274462]  ? __pfx_kthread+0x10/0x10
[   27.274484]  ret_from_fork+0x116/0x1d0
[   27.274506]  ? __pfx_kthread+0x10/0x10
[   27.274527]  ret_from_fork_asm+0x1a/0x30
[   27.274561]  </TASK>
[   27.274575] 
[   27.282440] Allocated by task 315:
[   27.282611]  kasan_save_stack+0x45/0x70
[   27.282819]  kasan_save_track+0x18/0x40
[   27.282995]  kasan_save_alloc_info+0x3b/0x50
[   27.283142]  __kasan_kmalloc+0xb7/0xc0
[   27.283270]  __kmalloc_cache_noprof+0x189/0x420
[   27.283506]  kasan_atomics+0x95/0x310
[   27.283688]  kunit_try_run_case+0x1a5/0x480
[   27.283899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.284188]  kthread+0x337/0x6f0
[   27.284308]  ret_from_fork+0x116/0x1d0
[   27.284495]  ret_from_fork_asm+0x1a/0x30
[   27.284686] 
[   27.284798] The buggy address belongs to the object at ffff8881058d6700
[   27.284798]  which belongs to the cache kmalloc-64 of size 64
[   27.285291] The buggy address is located 0 bytes to the right of
[   27.285291]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.285830] 
[   27.285944] The buggy address belongs to the physical page:
[   27.286182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.286512] flags: 0x200000000000000(node=0|zone=2)
[   27.286737] page_type: f5(slab)
[   27.286968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.287289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.287571] page dumped because: kasan: bad access detected
[   27.287752] 
[   27.287823] Memory state around the buggy address:
[   27.287973]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.288184]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.288843] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.289158]                                      ^
[   27.289362]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.289572]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.289838] ==================================================================
[   27.333172] ==================================================================
[   27.333573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   27.333936] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.334172] 
[   27.334255] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.334316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.334332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.334356] Call Trace:
[   27.334373]  <TASK>
[   27.334402]  dump_stack_lvl+0x73/0xb0
[   27.334432]  print_report+0xd1/0x610
[   27.334456]  ? __virt_addr_valid+0x1db/0x2d0
[   27.334480]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.334502]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.334528]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.334551]  kasan_report+0x141/0x180
[   27.334573]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.334599]  __asan_report_store8_noabort+0x1b/0x30
[   27.334624]  kasan_atomics_helper+0x50d4/0x5450
[   27.334647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.334670]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.334705]  ? kasan_save_alloc_info+0x3b/0x50
[   27.334734]  kasan_atomics+0x1dc/0x310
[   27.334756]  ? __pfx_kasan_atomics+0x10/0x10
[   27.334790]  ? __pfx_read_tsc+0x10/0x10
[   27.334814]  ? ktime_get_ts64+0x86/0x230
[   27.334841]  kunit_try_run_case+0x1a5/0x480
[   27.334887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.334908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.334945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.334969]  ? __kthread_parkme+0x82/0x180
[   27.335000]  ? preempt_count_sub+0x50/0x80
[   27.335025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.335057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.335083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.335108]  kthread+0x337/0x6f0
[   27.335129]  ? trace_preempt_on+0x20/0xc0
[   27.335154]  ? __pfx_kthread+0x10/0x10
[   27.335175]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.335198]  ? calculate_sigpending+0x7b/0xa0
[   27.335223]  ? __pfx_kthread+0x10/0x10
[   27.335245]  ret_from_fork+0x116/0x1d0
[   27.335266]  ? __pfx_kthread+0x10/0x10
[   27.335288]  ret_from_fork_asm+0x1a/0x30
[   27.335319]  </TASK>
[   27.335331] 
[   27.342918] Allocated by task 315:
[   27.343081]  kasan_save_stack+0x45/0x70
[   27.343257]  kasan_save_track+0x18/0x40
[   27.343390]  kasan_save_alloc_info+0x3b/0x50
[   27.343534]  __kasan_kmalloc+0xb7/0xc0
[   27.343661]  __kmalloc_cache_noprof+0x189/0x420
[   27.343892]  kasan_atomics+0x95/0x310
[   27.344103]  kunit_try_run_case+0x1a5/0x480
[   27.344307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.344526]  kthread+0x337/0x6f0
[   27.344644]  ret_from_fork+0x116/0x1d0
[   27.344784]  ret_from_fork_asm+0x1a/0x30
[   27.344920] 
[   27.344987] The buggy address belongs to the object at ffff8881058d6700
[   27.344987]  which belongs to the cache kmalloc-64 of size 64
[   27.345525] The buggy address is located 0 bytes to the right of
[   27.345525]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.346345] 
[   27.346438] The buggy address belongs to the physical page:
[   27.346717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.347148] flags: 0x200000000000000(node=0|zone=2)
[   27.347361] page_type: f5(slab)
[   27.347504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.347871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.348188] page dumped because: kasan: bad access detected
[   27.348438] 
[   27.348526] Memory state around the buggy address:
[   27.348748]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.349056]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.349371] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.349679]                                      ^
[   27.349921]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.350233]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.350479] ==================================================================
[   27.446618] ==================================================================
[   27.447153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   27.447826] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.448189] 
[   27.448284] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.448364] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.448380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.448414] Call Trace:
[   27.448431]  <TASK>
[   27.448450]  dump_stack_lvl+0x73/0xb0
[   27.448483]  print_report+0xd1/0x610
[   27.448507]  ? __virt_addr_valid+0x1db/0x2d0
[   27.448532]  ? kasan_atomics_helper+0x1818/0x5450
[   27.448554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.448581]  ? kasan_atomics_helper+0x1818/0x5450
[   27.448635]  kasan_report+0x141/0x180
[   27.448659]  ? kasan_atomics_helper+0x1818/0x5450
[   27.448717]  kasan_check_range+0x10c/0x1c0
[   27.448769]  __kasan_check_write+0x18/0x20
[   27.448805]  kasan_atomics_helper+0x1818/0x5450
[   27.448867]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.448890]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.448925]  ? kasan_save_alloc_info+0x3b/0x50
[   27.448955]  kasan_atomics+0x1dc/0x310
[   27.448978]  ? __pfx_kasan_atomics+0x10/0x10
[   27.449003]  ? __pfx_read_tsc+0x10/0x10
[   27.449028]  ? ktime_get_ts64+0x86/0x230
[   27.449053]  kunit_try_run_case+0x1a5/0x480
[   27.449076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.449098]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.449123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.449149]  ? __kthread_parkme+0x82/0x180
[   27.449170]  ? preempt_count_sub+0x50/0x80
[   27.449195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.449218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.449244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.449271]  kthread+0x337/0x6f0
[   27.449320]  ? trace_preempt_on+0x20/0xc0
[   27.449346]  ? __pfx_kthread+0x10/0x10
[   27.449368]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.449429]  ? calculate_sigpending+0x7b/0xa0
[   27.449455]  ? __pfx_kthread+0x10/0x10
[   27.449488]  ret_from_fork+0x116/0x1d0
[   27.449509]  ? __pfx_kthread+0x10/0x10
[   27.449531]  ret_from_fork_asm+0x1a/0x30
[   27.449564]  </TASK>
[   27.449577] 
[   27.457846] Allocated by task 315:
[   27.458074]  kasan_save_stack+0x45/0x70
[   27.458274]  kasan_save_track+0x18/0x40
[   27.458437]  kasan_save_alloc_info+0x3b/0x50
[   27.458581]  __kasan_kmalloc+0xb7/0xc0
[   27.458814]  __kmalloc_cache_noprof+0x189/0x420
[   27.459033]  kasan_atomics+0x95/0x310
[   27.459202]  kunit_try_run_case+0x1a5/0x480
[   27.459345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.459560]  kthread+0x337/0x6f0
[   27.459735]  ret_from_fork+0x116/0x1d0
[   27.460126]  ret_from_fork_asm+0x1a/0x30
[   27.460327] 
[   27.460398] The buggy address belongs to the object at ffff8881058d6700
[   27.460398]  which belongs to the cache kmalloc-64 of size 64
[   27.460854] The buggy address is located 0 bytes to the right of
[   27.460854]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.461618] 
[   27.461741] The buggy address belongs to the physical page:
[   27.461914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.462159] flags: 0x200000000000000(node=0|zone=2)
[   27.462489] page_type: f5(slab)
[   27.462720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.463060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.463296] page dumped because: kasan: bad access detected
[   27.463592] 
[   27.463724] Memory state around the buggy address:
[   27.464008]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.464226]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.464438] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.464719]                                      ^
[   27.464993]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.465315]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.465713] ==================================================================
[   27.701219] ==================================================================
[   27.701563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   27.701986] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.702267] 
[   27.702359] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.702407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.702421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.702444] Call Trace:
[   27.702460]  <TASK>
[   27.702477]  dump_stack_lvl+0x73/0xb0
[   27.702508]  print_report+0xd1/0x610
[   27.702530]  ? __virt_addr_valid+0x1db/0x2d0
[   27.702556]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.702577]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.702604]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.702627]  kasan_report+0x141/0x180
[   27.702650]  ? kasan_atomics_helper+0x1f43/0x5450
[   27.702677]  kasan_check_range+0x10c/0x1c0
[   27.702713]  __kasan_check_write+0x18/0x20
[   27.702736]  kasan_atomics_helper+0x1f43/0x5450
[   27.702759]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.702782]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.702806]  ? kasan_save_alloc_info+0x3b/0x50
[   27.702843]  kasan_atomics+0x1dc/0x310
[   27.702867]  ? __pfx_kasan_atomics+0x10/0x10
[   27.702891]  ? __pfx_read_tsc+0x10/0x10
[   27.702915]  ? ktime_get_ts64+0x86/0x230
[   27.702941]  kunit_try_run_case+0x1a5/0x480
[   27.702964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.702985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.703011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.703037]  ? __kthread_parkme+0x82/0x180
[   27.703058]  ? preempt_count_sub+0x50/0x80
[   27.703083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.703106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.703132]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.703157]  kthread+0x337/0x6f0
[   27.703178]  ? trace_preempt_on+0x20/0xc0
[   27.703202]  ? __pfx_kthread+0x10/0x10
[   27.703226]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.703248]  ? calculate_sigpending+0x7b/0xa0
[   27.703274]  ? __pfx_kthread+0x10/0x10
[   27.703297]  ret_from_fork+0x116/0x1d0
[   27.703318]  ? __pfx_kthread+0x10/0x10
[   27.703339]  ret_from_fork_asm+0x1a/0x30
[   27.703371]  </TASK>
[   27.703383] 
[   27.713582] Allocated by task 315:
[   27.713811]  kasan_save_stack+0x45/0x70
[   27.713991]  kasan_save_track+0x18/0x40
[   27.714126]  kasan_save_alloc_info+0x3b/0x50
[   27.714270]  __kasan_kmalloc+0xb7/0xc0
[   27.714447]  __kmalloc_cache_noprof+0x189/0x420
[   27.714666]  kasan_atomics+0x95/0x310
[   27.714897]  kunit_try_run_case+0x1a5/0x480
[   27.715129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.715489]  kthread+0x337/0x6f0
[   27.715686]  ret_from_fork+0x116/0x1d0
[   27.715914]  ret_from_fork_asm+0x1a/0x30
[   27.716053] 
[   27.716120] The buggy address belongs to the object at ffff8881058d6700
[   27.716120]  which belongs to the cache kmalloc-64 of size 64
[   27.716593] The buggy address is located 0 bytes to the right of
[   27.716593]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.717354] 
[   27.717455] The buggy address belongs to the physical page:
[   27.717717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.718144] flags: 0x200000000000000(node=0|zone=2)
[   27.718331] page_type: f5(slab)
[   27.718498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.718937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.719278] page dumped because: kasan: bad access detected
[   27.719520] 
[   27.719599] Memory state around the buggy address:
[   27.719774]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.720117]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.720450] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.720680]                                      ^
[   27.720941]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.721277]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.721538] ==================================================================
[   27.525180] ==================================================================
[   27.525529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   27.526072] Write of size 8 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.526501] 
[   27.526614] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.526713] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.526729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.526753] Call Trace:
[   27.526778]  <TASK>
[   27.526801]  dump_stack_lvl+0x73/0xb0
[   27.526834]  print_report+0xd1/0x610
[   27.526859]  ? __virt_addr_valid+0x1db/0x2d0
[   27.526916]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.526961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.526987]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.527010]  kasan_report+0x141/0x180
[   27.527034]  ? kasan_atomics_helper+0x1a7f/0x5450
[   27.527061]  kasan_check_range+0x10c/0x1c0
[   27.527085]  __kasan_check_write+0x18/0x20
[   27.527109]  kasan_atomics_helper+0x1a7f/0x5450
[   27.527133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.527155]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.527181]  ? kasan_save_alloc_info+0x3b/0x50
[   27.527210]  kasan_atomics+0x1dc/0x310
[   27.527234]  ? __pfx_kasan_atomics+0x10/0x10
[   27.527259]  ? __pfx_read_tsc+0x10/0x10
[   27.527283]  ? ktime_get_ts64+0x86/0x230
[   27.527310]  kunit_try_run_case+0x1a5/0x480
[   27.527334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.527355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.527381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.527406]  ? __kthread_parkme+0x82/0x180
[   27.527429]  ? preempt_count_sub+0x50/0x80
[   27.527454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.527477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.527503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.527559]  kthread+0x337/0x6f0
[   27.527581]  ? trace_preempt_on+0x20/0xc0
[   27.527617]  ? __pfx_kthread+0x10/0x10
[   27.527638]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.527661]  ? calculate_sigpending+0x7b/0xa0
[   27.527687]  ? __pfx_kthread+0x10/0x10
[   27.527719]  ret_from_fork+0x116/0x1d0
[   27.527740]  ? __pfx_kthread+0x10/0x10
[   27.527761]  ret_from_fork_asm+0x1a/0x30
[   27.527806]  </TASK>
[   27.527826] 
[   27.536027] Allocated by task 315:
[   27.536213]  kasan_save_stack+0x45/0x70
[   27.536418]  kasan_save_track+0x18/0x40
[   27.536612]  kasan_save_alloc_info+0x3b/0x50
[   27.536884]  __kasan_kmalloc+0xb7/0xc0
[   27.537085]  __kmalloc_cache_noprof+0x189/0x420
[   27.537284]  kasan_atomics+0x95/0x310
[   27.537505]  kunit_try_run_case+0x1a5/0x480
[   27.537686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.537992]  kthread+0x337/0x6f0
[   27.538114]  ret_from_fork+0x116/0x1d0
[   27.538267]  ret_from_fork_asm+0x1a/0x30
[   27.538497] 
[   27.538606] The buggy address belongs to the object at ffff8881058d6700
[   27.538606]  which belongs to the cache kmalloc-64 of size 64
[   27.539417] The buggy address is located 0 bytes to the right of
[   27.539417]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.540021] 
[   27.540095] The buggy address belongs to the physical page:
[   27.540289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.540706] flags: 0x200000000000000(node=0|zone=2)
[   27.541026] page_type: f5(slab)
[   27.541258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.541571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.541892] page dumped because: kasan: bad access detected
[   27.542176] 
[   27.542279] Memory state around the buggy address:
[   27.542506]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.542760]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.543123] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.543396]                                      ^
[   27.543548]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.543804]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.544140] ==================================================================
[   26.664037] ==================================================================
[   26.664289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   26.664578] Write of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   26.665136] 
[   26.665236] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   26.665288] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   26.665303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.665326] Call Trace:
[   26.665343]  <TASK>
[   26.665360]  dump_stack_lvl+0x73/0xb0
[   26.665393]  print_report+0xd1/0x610
[   26.665416]  ? __virt_addr_valid+0x1db/0x2d0
[   26.665441]  ? kasan_atomics_helper+0x565/0x5450
[   26.665462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.665489]  ? kasan_atomics_helper+0x565/0x5450
[   26.665512]  kasan_report+0x141/0x180
[   26.665535]  ? kasan_atomics_helper+0x565/0x5450
[   26.665562]  kasan_check_range+0x10c/0x1c0
[   26.665586]  __kasan_check_write+0x18/0x20
[   26.665611]  kasan_atomics_helper+0x565/0x5450
[   26.665633]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.665656]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.665680]  ? kasan_save_alloc_info+0x3b/0x50
[   26.665725]  kasan_atomics+0x1dc/0x310
[   26.665748]  ? __pfx_kasan_atomics+0x10/0x10
[   26.665773]  ? __pfx_read_tsc+0x10/0x10
[   26.665833]  ? ktime_get_ts64+0x86/0x230
[   26.665861]  kunit_try_run_case+0x1a5/0x480
[   26.665884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.665962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.665989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.666015]  ? __kthread_parkme+0x82/0x180
[   26.666060]  ? preempt_count_sub+0x50/0x80
[   26.666084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.666107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.666134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.666161]  kthread+0x337/0x6f0
[   26.666182]  ? trace_preempt_on+0x20/0xc0
[   26.666224]  ? __pfx_kthread+0x10/0x10
[   26.666246]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.666269]  ? calculate_sigpending+0x7b/0xa0
[   26.666294]  ? __pfx_kthread+0x10/0x10
[   26.666318]  ret_from_fork+0x116/0x1d0
[   26.666339]  ? __pfx_kthread+0x10/0x10
[   26.666361]  ret_from_fork_asm+0x1a/0x30
[   26.666392]  </TASK>
[   26.666405] 
[   26.675309] Allocated by task 315:
[   26.675451]  kasan_save_stack+0x45/0x70
[   26.675633]  kasan_save_track+0x18/0x40
[   26.675827]  kasan_save_alloc_info+0x3b/0x50
[   26.676421]  __kasan_kmalloc+0xb7/0xc0
[   26.676731]  __kmalloc_cache_noprof+0x189/0x420
[   26.677165]  kasan_atomics+0x95/0x310
[   26.677344]  kunit_try_run_case+0x1a5/0x480
[   26.677551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.678124]  kthread+0x337/0x6f0
[   26.678546]  ret_from_fork+0x116/0x1d0
[   26.678833]  ret_from_fork_asm+0x1a/0x30
[   26.679160] 
[   26.679385] The buggy address belongs to the object at ffff8881058d6700
[   26.679385]  which belongs to the cache kmalloc-64 of size 64
[   26.680415] The buggy address is located 0 bytes to the right of
[   26.680415]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   26.681219] 
[   26.681312] The buggy address belongs to the physical page:
[   26.681793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   26.682313] flags: 0x200000000000000(node=0|zone=2)
[   26.682552] page_type: f5(slab)
[   26.682728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.683303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.683952] page dumped because: kasan: bad access detected
[   26.684209] 
[   26.684296] Memory state around the buggy address:
[   26.684497]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.685110]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.685472] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.686120]                                      ^
[   26.686465]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.687214]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.687502] ==================================================================
[   27.169534] ==================================================================
[   27.169982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   27.170223] Read of size 4 at addr ffff8881058d6730 by task kunit_try_catch/315
[   27.170596] 
[   27.170735] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) 
[   27.170811] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   27.170827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.170851] Call Trace:
[   27.170879]  <TASK>
[   27.170903]  dump_stack_lvl+0x73/0xb0
[   27.170936]  print_report+0xd1/0x610
[   27.170960]  ? __virt_addr_valid+0x1db/0x2d0
[   27.170986]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.171008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.171035]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.171057]  kasan_report+0x141/0x180
[   27.171080]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.171107]  __asan_report_load4_noabort+0x18/0x20
[   27.171132]  kasan_atomics_helper+0x4a02/0x5450
[   27.171155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.171178]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.171203]  ? kasan_save_alloc_info+0x3b/0x50
[   27.171232]  kasan_atomics+0x1dc/0x310
[   27.171255]  ? __pfx_kasan_atomics+0x10/0x10
[   27.171280]  ? __pfx_read_tsc+0x10/0x10
[   27.171304]  ? ktime_get_ts64+0x86/0x230
[   27.171330]  kunit_try_run_case+0x1a5/0x480
[   27.171354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.171375]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.171402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.171427]  ? __kthread_parkme+0x82/0x180
[   27.171450]  ? preempt_count_sub+0x50/0x80
[   27.171475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.171498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.171524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.171550]  kthread+0x337/0x6f0
[   27.171571]  ? trace_preempt_on+0x20/0xc0
[   27.171596]  ? __pfx_kthread+0x10/0x10
[   27.171618]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.171642]  ? calculate_sigpending+0x7b/0xa0
[   27.171668]  ? __pfx_kthread+0x10/0x10
[   27.171690]  ret_from_fork+0x116/0x1d0
[   27.171722]  ? __pfx_kthread+0x10/0x10
[   27.171744]  ret_from_fork_asm+0x1a/0x30
[   27.171777]  </TASK>
[   27.171791] 
[   27.179129] Allocated by task 315:
[   27.179316]  kasan_save_stack+0x45/0x70
[   27.179514]  kasan_save_track+0x18/0x40
[   27.179710]  kasan_save_alloc_info+0x3b/0x50
[   27.180117]  __kasan_kmalloc+0xb7/0xc0
[   27.180256]  __kmalloc_cache_noprof+0x189/0x420
[   27.180409]  kasan_atomics+0x95/0x310
[   27.180538]  kunit_try_run_case+0x1a5/0x480
[   27.180679]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.181181]  kthread+0x337/0x6f0
[   27.181360]  ret_from_fork+0x116/0x1d0
[   27.181574]  ret_from_fork_asm+0x1a/0x30
[   27.181797] 
[   27.181889] The buggy address belongs to the object at ffff8881058d6700
[   27.181889]  which belongs to the cache kmalloc-64 of size 64
[   27.182385] The buggy address is located 0 bytes to the right of
[   27.182385]  allocated 48-byte region [ffff8881058d6700, ffff8881058d6730)
[   27.182949] 
[   27.183037] The buggy address belongs to the physical page:
[   27.183292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d6
[   27.183640] flags: 0x200000000000000(node=0|zone=2)
[   27.183863] page_type: f5(slab)
[   27.184043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.184270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.184491] page dumped because: kasan: bad access detected
[   27.184658] 
[   27.184748] Memory state around the buggy address:
[   27.185037]  ffff8881058d6600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.185352]  ffff8881058d6680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.185667] >ffff8881058d6700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.186112]                                      ^
[   27.186411]  ffff8881058d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.186626]  ffff8881058d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.186845] ==================================================================