Hay
Date
July 18, 2025, 1:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   34.289131] ==================================================================
[   34.289184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   34.289237] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.289288] 
[   34.289319] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.289403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.289582] Hardware name: linux,dummy-virt (DT)
[   34.289650] Call trace:
[   34.289677]  show_stack+0x20/0x38 (C)
[   34.289963]  dump_stack_lvl+0x8c/0xd0
[   34.290017]  print_report+0x118/0x5e8
[   34.290230]  kasan_report+0xdc/0x128
[   34.290284]  kasan_check_range+0x100/0x1a8
[   34.290423]  __kasan_check_read+0x20/0x30
[   34.290475]  kasan_atomics_helper+0xdd4/0x4858
[   34.290526]  kasan_atomics+0x198/0x2e0
[   34.290580]  kunit_try_run_case+0x170/0x3f0
[   34.290627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.290681]  kthread+0x328/0x630
[   34.290725]  ret_from_fork+0x10/0x20
[   34.290987] 
[   34.291174] Allocated by task 296:
[   34.291212]  kasan_save_stack+0x3c/0x68
[   34.291256]  kasan_save_track+0x20/0x40
[   34.291294]  kasan_save_alloc_info+0x40/0x58
[   34.291407]  __kasan_kmalloc+0xd4/0xd8
[   34.291447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.291489]  kasan_atomics+0xb8/0x2e0
[   34.291554]  kunit_try_run_case+0x170/0x3f0
[   34.291733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.291821]  kthread+0x328/0x630
[   34.292021]  ret_from_fork+0x10/0x20
[   34.292320] 
[   34.292451] The buggy address belongs to the object at fff00000c9708480
[   34.292451]  which belongs to the cache kmalloc-64 of size 64
[   34.292532] The buggy address is located 0 bytes to the right of
[   34.292532]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.292599] 
[   34.292855] The buggy address belongs to the physical page:
[   34.292958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.293045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.293171] page_type: f5(slab)
[   34.293247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.293495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.293646] page dumped because: kasan: bad access detected
[   34.293713] 
[   34.293764] Memory state around the buggy address:
[   34.293887]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.293954]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.294018] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.294093]                                      ^
[   34.294129]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.294173]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.294420] ==================================================================
[   34.388983] ==================================================================
[   34.389035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   34.389342] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.389507] 
[   34.389614] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.389699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.389727] Hardware name: linux,dummy-virt (DT)
[   34.389760] Call trace:
[   34.389784]  show_stack+0x20/0x38 (C)
[   34.389836]  dump_stack_lvl+0x8c/0xd0
[   34.389884]  print_report+0x118/0x5e8
[   34.389940]  kasan_report+0xdc/0x128
[   34.390107]  __asan_report_load8_noabort+0x20/0x30
[   34.390155]  kasan_atomics_helper+0x3f04/0x4858
[   34.390207]  kasan_atomics+0x198/0x2e0
[   34.390255]  kunit_try_run_case+0x170/0x3f0
[   34.390650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.391128]  kthread+0x328/0x630
[   34.391270]  ret_from_fork+0x10/0x20
[   34.391442] 
[   34.391538] Allocated by task 296:
[   34.391678]  kasan_save_stack+0x3c/0x68
[   34.391799]  kasan_save_track+0x20/0x40
[   34.391836]  kasan_save_alloc_info+0x40/0x58
[   34.391876]  __kasan_kmalloc+0xd4/0xd8
[   34.391912]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.391954]  kasan_atomics+0xb8/0x2e0
[   34.392117]  kunit_try_run_case+0x170/0x3f0
[   34.392157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.392202]  kthread+0x328/0x630
[   34.392236]  ret_from_fork+0x10/0x20
[   34.392273] 
[   34.392296] The buggy address belongs to the object at fff00000c9708480
[   34.392296]  which belongs to the cache kmalloc-64 of size 64
[   34.392355] The buggy address is located 0 bytes to the right of
[   34.392355]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.392761] 
[   34.393033] The buggy address belongs to the physical page:
[   34.393070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.393137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.393580] page_type: f5(slab)
[   34.393817] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.393908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.393978] page dumped because: kasan: bad access detected
[   34.394159] 
[   34.394296] Memory state around the buggy address:
[   34.394344]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.394739]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.394788] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.394828]                                      ^
[   34.394979]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.395112]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.395153] ==================================================================
[   34.416888] ==================================================================
[   34.417065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   34.417347] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.417404] 
[   34.417436] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.417929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.417984] Hardware name: linux,dummy-virt (DT)
[   34.418121] Call trace:
[   34.418336]  show_stack+0x20/0x38 (C)
[   34.418497]  dump_stack_lvl+0x8c/0xd0
[   34.418546]  print_report+0x118/0x5e8
[   34.418592]  kasan_report+0xdc/0x128
[   34.418636]  kasan_check_range+0x100/0x1a8
[   34.418681]  __kasan_check_write+0x20/0x30
[   34.418728]  kasan_atomics_helper+0x154c/0x4858
[   34.418778]  kasan_atomics+0x198/0x2e0
[   34.418826]  kunit_try_run_case+0x170/0x3f0
[   34.418873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.418935]  kthread+0x328/0x630
[   34.418979]  ret_from_fork+0x10/0x20
[   34.419143] 
[   34.419323] Allocated by task 296:
[   34.419636]  kasan_save_stack+0x3c/0x68
[   34.419763]  kasan_save_track+0x20/0x40
[   34.419802]  kasan_save_alloc_info+0x40/0x58
[   34.419878]  __kasan_kmalloc+0xd4/0xd8
[   34.419952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.419994]  kasan_atomics+0xb8/0x2e0
[   34.420034]  kunit_try_run_case+0x170/0x3f0
[   34.420815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.420886]  kthread+0x328/0x630
[   34.420921]  ret_from_fork+0x10/0x20
[   34.421089] 
[   34.421114] The buggy address belongs to the object at fff00000c9708480
[   34.421114]  which belongs to the cache kmalloc-64 of size 64
[   34.421242] The buggy address is located 0 bytes to the right of
[   34.421242]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.421417] 
[   34.421509] The buggy address belongs to the physical page:
[   34.421903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.422014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.422171] page_type: f5(slab)
[   34.422251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.422405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.422475] page dumped because: kasan: bad access detected
[   34.422592] 
[   34.422614] Memory state around the buggy address:
[   34.422712]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.422818]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.422896] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.423063]                                      ^
[   34.423385]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.423559]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.423602] ==================================================================
[   34.295071] ==================================================================
[   34.295147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   34.295201] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.295253] 
[   34.295282] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.295475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.295535] Hardware name: linux,dummy-virt (DT)
[   34.295569] Call trace:
[   34.295600]  show_stack+0x20/0x38 (C)
[   34.295893]  dump_stack_lvl+0x8c/0xd0
[   34.295975]  print_report+0x118/0x5e8
[   34.296150]  kasan_report+0xdc/0x128
[   34.296212]  __asan_report_load8_noabort+0x20/0x30
[   34.296274]  kasan_atomics_helper+0x3f58/0x4858
[   34.296326]  kasan_atomics+0x198/0x2e0
[   34.296437]  kunit_try_run_case+0x170/0x3f0
[   34.296487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.296541]  kthread+0x328/0x630
[   34.296585]  ret_from_fork+0x10/0x20
[   34.296827] 
[   34.296865] Allocated by task 296:
[   34.297065]  kasan_save_stack+0x3c/0x68
[   34.297357]  kasan_save_track+0x20/0x40
[   34.297413]  kasan_save_alloc_info+0x40/0x58
[   34.297461]  __kasan_kmalloc+0xd4/0xd8
[   34.297498]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.297564]  kasan_atomics+0xb8/0x2e0
[   34.297800]  kunit_try_run_case+0x170/0x3f0
[   34.297881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.298061]  kthread+0x328/0x630
[   34.298143]  ret_from_fork+0x10/0x20
[   34.298434] 
[   34.298529] The buggy address belongs to the object at fff00000c9708480
[   34.298529]  which belongs to the cache kmalloc-64 of size 64
[   34.298630] The buggy address is located 0 bytes to the right of
[   34.298630]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.298699] 
[   34.298720] The buggy address belongs to the physical page:
[   34.298789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.299034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.299225] page_type: f5(slab)
[   34.299292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.299559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.299607] page dumped because: kasan: bad access detected
[   34.299649] 
[   34.299695] Memory state around the buggy address:
[   34.299753]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.299915]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.299969] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.300088]                                      ^
[   34.300137]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.300182]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.300222] ==================================================================
[   34.507295] ==================================================================
[   34.507353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   34.507409] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.507461] 
[   34.507496] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.507584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.507616] Hardware name: linux,dummy-virt (DT)
[   34.507650] Call trace:
[   34.507675]  show_stack+0x20/0x38 (C)
[   34.507732]  dump_stack_lvl+0x8c/0xd0
[   34.510851]  print_report+0x118/0x5e8
[   34.511179]  kasan_report+0xdc/0x128
[   34.511230]  kasan_check_range+0x100/0x1a8
[   34.511277]  __kasan_check_write+0x20/0x30
[   34.511327]  kasan_atomics_helper+0x175c/0x4858
[   34.512254]  kasan_atomics+0x198/0x2e0
[   34.512595]  kunit_try_run_case+0x170/0x3f0
[   34.512671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.512726]  kthread+0x328/0x630
[   34.513387]  ret_from_fork+0x10/0x20
[   34.513822] 
[   34.513848] Allocated by task 296:
[   34.514283]  kasan_save_stack+0x3c/0x68
[   34.514329]  kasan_save_track+0x20/0x40
[   34.514366]  kasan_save_alloc_info+0x40/0x58
[   34.514407]  __kasan_kmalloc+0xd4/0xd8
[   34.514445]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.514489]  kasan_atomics+0xb8/0x2e0
[   34.515650]  kunit_try_run_case+0x170/0x3f0
[   34.515711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.517700]  kthread+0x328/0x630
[   34.517802]  ret_from_fork+0x10/0x20
[   34.518005] 
[   34.518053] The buggy address belongs to the object at fff00000c9708480
[   34.518053]  which belongs to the cache kmalloc-64 of size 64
[   34.518196] The buggy address is located 0 bytes to the right of
[   34.518196]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.518314] 
[   34.518466] The buggy address belongs to the physical page:
[   34.518575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.519141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.519621] page_type: f5(slab)
[   34.520619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.520700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.520770] page dumped because: kasan: bad access detected
[   34.520890] 
[   34.520911] Memory state around the buggy address:
[   34.521051]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.521774]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.521980] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.522198]                                      ^
[   34.522473]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.522635]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.523030] ==================================================================
[   34.439434] ==================================================================
[   34.439679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   34.439801] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.439851] 
[   34.440093] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.440220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.440416] Hardware name: linux,dummy-virt (DT)
[   34.440508] Call trace:
[   34.440533]  show_stack+0x20/0x38 (C)
[   34.440672]  dump_stack_lvl+0x8c/0xd0
[   34.440782]  print_report+0x118/0x5e8
[   34.440826]  kasan_report+0xdc/0x128
[   34.440872]  kasan_check_range+0x100/0x1a8
[   34.441267]  __kasan_check_write+0x20/0x30
[   34.441415]  kasan_atomics_helper+0x1644/0x4858
[   34.441468]  kasan_atomics+0x198/0x2e0
[   34.441555]  kunit_try_run_case+0x170/0x3f0
[   34.441797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.441886]  kthread+0x328/0x630
[   34.441950]  ret_from_fork+0x10/0x20
[   34.442106] 
[   34.442127] Allocated by task 296:
[   34.442157]  kasan_save_stack+0x3c/0x68
[   34.442199]  kasan_save_track+0x20/0x40
[   34.442237]  kasan_save_alloc_info+0x40/0x58
[   34.442277]  __kasan_kmalloc+0xd4/0xd8
[   34.442593]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.442696]  kasan_atomics+0xb8/0x2e0
[   34.442900]  kunit_try_run_case+0x170/0x3f0
[   34.442943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.443213]  kthread+0x328/0x630
[   34.443351]  ret_from_fork+0x10/0x20
[   34.443390] 
[   34.443413] The buggy address belongs to the object at fff00000c9708480
[   34.443413]  which belongs to the cache kmalloc-64 of size 64
[   34.443474] The buggy address is located 0 bytes to the right of
[   34.443474]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.443539] 
[   34.443560] The buggy address belongs to the physical page:
[   34.443593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.443646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.443736] page_type: f5(slab)
[   34.443778] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.443827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.443869] page dumped because: kasan: bad access detected
[   34.444177] 
[   34.444200] Memory state around the buggy address:
[   34.444236]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.444280]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.444324] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.444363]                                      ^
[   34.444398]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.444443]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.444482] ==================================================================
[   34.541037] ==================================================================
[   34.541121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   34.541196] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.541247] 
[   34.541302] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.541405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.541459] Hardware name: linux,dummy-virt (DT)
[   34.541522] Call trace:
[   34.541547]  show_stack+0x20/0x38 (C)
[   34.541614]  dump_stack_lvl+0x8c/0xd0
[   34.541684]  print_report+0x118/0x5e8
[   34.541737]  kasan_report+0xdc/0x128
[   34.541781]  kasan_check_range+0x100/0x1a8
[   34.541828]  __kasan_check_write+0x20/0x30
[   34.541875]  kasan_atomics_helper+0x17ec/0x4858
[   34.541925]  kasan_atomics+0x198/0x2e0
[   34.541971]  kunit_try_run_case+0x170/0x3f0
[   34.542273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.542378]  kthread+0x328/0x630
[   34.542438]  ret_from_fork+0x10/0x20
[   34.542504] 
[   34.542542] Allocated by task 296:
[   34.542608]  kasan_save_stack+0x3c/0x68
[   34.542654]  kasan_save_track+0x20/0x40
[   34.542700]  kasan_save_alloc_info+0x40/0x58
[   34.542746]  __kasan_kmalloc+0xd4/0xd8
[   34.542914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.542960]  kasan_atomics+0xb8/0x2e0
[   34.542999]  kunit_try_run_case+0x170/0x3f0
[   34.543051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.543122]  kthread+0x328/0x630
[   34.543159]  ret_from_fork+0x10/0x20
[   34.543242] 
[   34.543281] The buggy address belongs to the object at fff00000c9708480
[   34.543281]  which belongs to the cache kmalloc-64 of size 64
[   34.543342] The buggy address is located 0 bytes to the right of
[   34.543342]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.543425] 
[   34.543472] The buggy address belongs to the physical page:
[   34.543506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.543558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.543608] page_type: f5(slab)
[   34.543647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.543720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.544006] page dumped because: kasan: bad access detected
[   34.544094] 
[   34.544164] Memory state around the buggy address:
[   34.544221]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.544267]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.544311] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.544351]                                      ^
[   34.544398]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.544445]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.544498] ==================================================================
[   34.153520] ==================================================================
[   34.153584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   34.153636] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.153688] 
[   34.153718] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.153803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.153831] Hardware name: linux,dummy-virt (DT)
[   34.153862] Call trace:
[   34.153887]  show_stack+0x20/0x38 (C)
[   34.153934]  dump_stack_lvl+0x8c/0xd0
[   34.153983]  print_report+0x118/0x5e8
[   34.154034]  kasan_report+0xdc/0x128
[   34.154091]  kasan_check_range+0x100/0x1a8
[   34.154276]  __kasan_check_write+0x20/0x30
[   34.154330]  kasan_atomics_helper+0x760/0x4858
[   34.154735]  kasan_atomics+0x198/0x2e0
[   34.154829]  kunit_try_run_case+0x170/0x3f0
[   34.155133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.155225]  kthread+0x328/0x630
[   34.155283]  ret_from_fork+0x10/0x20
[   34.155340] 
[   34.155362] Allocated by task 296:
[   34.155393]  kasan_save_stack+0x3c/0x68
[   34.155440]  kasan_save_track+0x20/0x40
[   34.155479]  kasan_save_alloc_info+0x40/0x58
[   34.155525]  __kasan_kmalloc+0xd4/0xd8
[   34.155562]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.155603]  kasan_atomics+0xb8/0x2e0
[   34.155643]  kunit_try_run_case+0x170/0x3f0
[   34.155690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.155979]  kthread+0x328/0x630
[   34.156069]  ret_from_fork+0x10/0x20
[   34.156321] 
[   34.156355] The buggy address belongs to the object at fff00000c9708480
[   34.156355]  which belongs to the cache kmalloc-64 of size 64
[   34.156761] The buggy address is located 0 bytes to the right of
[   34.156761]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.156925] 
[   34.157117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.157635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.158475]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.158534]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.158866] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.159027]                                      ^
[   34.159115]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.159244]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.159298] ==================================================================
[   34.348159] ==================================================================
[   34.348256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   34.348357] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.348432] 
[   34.348743] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.348871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.349030] Hardware name: linux,dummy-virt (DT)
[   34.349093] Call trace:
[   34.349117]  show_stack+0x20/0x38 (C)
[   34.349175]  dump_stack_lvl+0x8c/0xd0
[   34.349225]  print_report+0x118/0x5e8
[   34.349494]  kasan_report+0xdc/0x128
[   34.349617]  kasan_check_range+0x100/0x1a8
[   34.349710]  __kasan_check_write+0x20/0x30
[   34.349885]  kasan_atomics_helper+0x1128/0x4858
[   34.350105]  kasan_atomics+0x198/0x2e0
[   34.350185]  kunit_try_run_case+0x170/0x3f0
[   34.350349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.350444]  kthread+0x328/0x630
[   34.350579]  ret_from_fork+0x10/0x20
[   34.350855] 
[   34.350987] Allocated by task 296:
[   34.351046]  kasan_save_stack+0x3c/0x68
[   34.351174]  kasan_save_track+0x20/0x40
[   34.351262]  kasan_save_alloc_info+0x40/0x58
[   34.351503]  __kasan_kmalloc+0xd4/0xd8
[   34.351643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.351721]  kasan_atomics+0xb8/0x2e0
[   34.351807]  kunit_try_run_case+0x170/0x3f0
[   34.352092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.352151]  kthread+0x328/0x630
[   34.352279]  ret_from_fork+0x10/0x20
[   34.352347] 
[   34.352468] The buggy address belongs to the object at fff00000c9708480
[   34.352468]  which belongs to the cache kmalloc-64 of size 64
[   34.352597] The buggy address is located 0 bytes to the right of
[   34.352597]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.352846] 
[   34.352916] The buggy address belongs to the physical page:
[   34.352997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.353219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.353387] page_type: f5(slab)
[   34.353447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.353540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.353621] page dumped because: kasan: bad access detected
[   34.353833] 
[   34.353924] Memory state around the buggy address:
[   34.354057]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.354242]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.354337] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.354445]                                      ^
[   34.354533]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.354598]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.354782] ==================================================================
[   34.282320] ==================================================================
[   34.282371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   34.282423] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.282473] 
[   34.282532] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.282627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.282657] Hardware name: linux,dummy-virt (DT)
[   34.282689] Call trace:
[   34.282722]  show_stack+0x20/0x38 (C)
[   34.282781]  dump_stack_lvl+0x8c/0xd0
[   34.282830]  print_report+0x118/0x5e8
[   34.282877]  kasan_report+0xdc/0x128
[   34.282923]  __asan_report_load4_noabort+0x20/0x30
[   34.282981]  kasan_atomics_helper+0x3e04/0x4858
[   34.283041]  kasan_atomics+0x198/0x2e0
[   34.283484]  kunit_try_run_case+0x170/0x3f0
[   34.283636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.283715]  kthread+0x328/0x630
[   34.283961]  ret_from_fork+0x10/0x20
[   34.284035] 
[   34.284058] Allocated by task 296:
[   34.284295]  kasan_save_stack+0x3c/0x68
[   34.284491]  kasan_save_track+0x20/0x40
[   34.284572]  kasan_save_alloc_info+0x40/0x58
[   34.284667]  __kasan_kmalloc+0xd4/0xd8
[   34.284954]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.285053]  kasan_atomics+0xb8/0x2e0
[   34.285221]  kunit_try_run_case+0x170/0x3f0
[   34.285265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.285317]  kthread+0x328/0x630
[   34.285548]  ret_from_fork+0x10/0x20
[   34.285633] 
[   34.285743] The buggy address belongs to the object at fff00000c9708480
[   34.285743]  which belongs to the cache kmalloc-64 of size 64
[   34.285833] The buggy address is located 0 bytes to the right of
[   34.285833]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.286066] 
[   34.286104] The buggy address belongs to the physical page:
[   34.286138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.286330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.286420] page_type: f5(slab)
[   34.286572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.286670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.286953] page dumped because: kasan: bad access detected
[   34.287146] 
[   34.287228] Memory state around the buggy address:
[   34.287304]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.287443]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.287517] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.287566]                                      ^
[   34.287602]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288007]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288102] ==================================================================
[   34.342465] ==================================================================
[   34.342544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   34.342596] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.342727] 
[   34.342759] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.342850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.343055] Hardware name: linux,dummy-virt (DT)
[   34.343126] Call trace:
[   34.343201]  show_stack+0x20/0x38 (C)
[   34.343254]  dump_stack_lvl+0x8c/0xd0
[   34.343321]  print_report+0x118/0x5e8
[   34.343375]  kasan_report+0xdc/0x128
[   34.343418]  kasan_check_range+0x100/0x1a8
[   34.343463]  __kasan_check_write+0x20/0x30
[   34.343510]  kasan_atomics_helper+0x10c0/0x4858
[   34.343677]  kasan_atomics+0x198/0x2e0
[   34.343857]  kunit_try_run_case+0x170/0x3f0
[   34.343943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.344091]  kthread+0x328/0x630
[   34.344160]  ret_from_fork+0x10/0x20
[   34.344255] 
[   34.344277] Allocated by task 296:
[   34.344307]  kasan_save_stack+0x3c/0x68
[   34.344347]  kasan_save_track+0x20/0x40
[   34.344693]  kasan_save_alloc_info+0x40/0x58
[   34.344770]  __kasan_kmalloc+0xd4/0xd8
[   34.344860]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.345016]  kasan_atomics+0xb8/0x2e0
[   34.345242]  kunit_try_run_case+0x170/0x3f0
[   34.345336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.345468]  kthread+0x328/0x630
[   34.345554]  ret_from_fork+0x10/0x20
[   34.345600] 
[   34.345623] The buggy address belongs to the object at fff00000c9708480
[   34.345623]  which belongs to the cache kmalloc-64 of size 64
[   34.345859] The buggy address is located 0 bytes to the right of
[   34.345859]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.346025] 
[   34.346077] The buggy address belongs to the physical page:
[   34.346502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.346596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.346720] page_type: f5(slab)
[   34.346760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.346814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.346865] page dumped because: kasan: bad access detected
[   34.346897] 
[   34.346937] Memory state around the buggy address:
[   34.346991]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.347037]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.347091] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.347130]                                      ^
[   34.347166]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.347210]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.347250] ==================================================================
[   34.272413] ==================================================================
[   34.272464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   34.272518] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.272570] 
[   34.272602] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.272687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.272717] Hardware name: linux,dummy-virt (DT)
[   34.272750] Call trace:
[   34.272774]  show_stack+0x20/0x38 (C)
[   34.272823]  dump_stack_lvl+0x8c/0xd0
[   34.272872]  print_report+0x118/0x5e8
[   34.272919]  kasan_report+0xdc/0x128
[   34.272963]  __asan_report_load4_noabort+0x20/0x30
[   34.273015]  kasan_atomics_helper+0x3dd8/0x4858
[   34.273066]  kasan_atomics+0x198/0x2e0
[   34.273129]  kunit_try_run_case+0x170/0x3f0
[   34.273177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.273230]  kthread+0x328/0x630
[   34.273274]  ret_from_fork+0x10/0x20
[   34.273419] 
[   34.273462] Allocated by task 296:
[   34.273499]  kasan_save_stack+0x3c/0x68
[   34.273546]  kasan_save_track+0x20/0x40
[   34.273903]  kasan_save_alloc_info+0x40/0x58
[   34.274065]  __kasan_kmalloc+0xd4/0xd8
[   34.274134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.274177]  kasan_atomics+0xb8/0x2e0
[   34.274381]  kunit_try_run_case+0x170/0x3f0
[   34.274420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.274472]  kthread+0x328/0x630
[   34.274682]  ret_from_fork+0x10/0x20
[   34.274753] 
[   34.274776] The buggy address belongs to the object at fff00000c9708480
[   34.274776]  which belongs to the cache kmalloc-64 of size 64
[   34.274907] The buggy address is located 0 bytes to the right of
[   34.274907]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.274990] 
[   34.275175] The buggy address belongs to the physical page:
[   34.275221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.275388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.275444] page_type: f5(slab)
[   34.275501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.275571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.275615] page dumped because: kasan: bad access detected
[   34.275648] 
[   34.275670] Memory state around the buggy address:
[   34.275702]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.275944]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.276101] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.276146]                                      ^
[   34.276206]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.276258]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.276308] ==================================================================
[   34.487095] ==================================================================
[   34.487147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   34.487989] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.488343] 
[   34.488378] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.488522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.488582] Hardware name: linux,dummy-virt (DT)
[   34.488629] Call trace:
[   34.489371]  show_stack+0x20/0x38 (C)
[   34.489705]  dump_stack_lvl+0x8c/0xd0
[   34.490280]  print_report+0x118/0x5e8
[   34.490955]  kasan_report+0xdc/0x128
[   34.491088]  __asan_report_load8_noabort+0x20/0x30
[   34.491143]  kasan_atomics_helper+0x3e10/0x4858
[   34.491195]  kasan_atomics+0x198/0x2e0
[   34.491242]  kunit_try_run_case+0x170/0x3f0
[   34.492382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.492614]  kthread+0x328/0x630
[   34.493609]  ret_from_fork+0x10/0x20
[   34.493817] 
[   34.493877] Allocated by task 296:
[   34.494047]  kasan_save_stack+0x3c/0x68
[   34.494227]  kasan_save_track+0x20/0x40
[   34.494894]  kasan_save_alloc_info+0x40/0x58
[   34.495013]  __kasan_kmalloc+0xd4/0xd8
[   34.495254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.495692]  kasan_atomics+0xb8/0x2e0
[   34.496120]  kunit_try_run_case+0x170/0x3f0
[   34.496192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.496237]  kthread+0x328/0x630
[   34.496958]  ret_from_fork+0x10/0x20
[   34.497065] 
[   34.497329] The buggy address belongs to the object at fff00000c9708480
[   34.497329]  which belongs to the cache kmalloc-64 of size 64
[   34.497502] The buggy address is located 0 bytes to the right of
[   34.497502]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.497779] 
[   34.497838] The buggy address belongs to the physical page:
[   34.498453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.498611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.498756] page_type: f5(slab)
[   34.498853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.499984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.500123] page dumped because: kasan: bad access detected
[   34.500187] 
[   34.500207] Memory state around the buggy address:
[   34.500426]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.500475]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.500521] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.501462]                                      ^
[   34.501584]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.501769]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.501857] ==================================================================
[   34.305777] ==================================================================
[   34.305825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   34.305884] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.305943] 
[   34.305983] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.306698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.306750] Hardware name: linux,dummy-virt (DT)
[   34.306785] Call trace:
[   34.307199]  show_stack+0x20/0x38 (C)
[   34.307271]  dump_stack_lvl+0x8c/0xd0
[   34.307322]  print_report+0x118/0x5e8
[   34.307565]  kasan_report+0xdc/0x128
[   34.307633]  __asan_report_store8_noabort+0x20/0x30
[   34.307748]  kasan_atomics_helper+0x3e5c/0x4858
[   34.307817]  kasan_atomics+0x198/0x2e0
[   34.307949]  kunit_try_run_case+0x170/0x3f0
[   34.308040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.308149]  kthread+0x328/0x630
[   34.308194]  ret_from_fork+0x10/0x20
[   34.308257] 
[   34.308517] Allocated by task 296:
[   34.308585]  kasan_save_stack+0x3c/0x68
[   34.308693]  kasan_save_track+0x20/0x40
[   34.308772]  kasan_save_alloc_info+0x40/0x58
[   34.309047]  __kasan_kmalloc+0xd4/0xd8
[   34.309130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.309218]  kasan_atomics+0xb8/0x2e0
[   34.309304]  kunit_try_run_case+0x170/0x3f0
[   34.309374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.309620]  kthread+0x328/0x630
[   34.309718]  ret_from_fork+0x10/0x20
[   34.309796] 
[   34.310049] The buggy address belongs to the object at fff00000c9708480
[   34.310049]  which belongs to the cache kmalloc-64 of size 64
[   34.310206] The buggy address is located 0 bytes to the right of
[   34.310206]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.310302] 
[   34.310385] The buggy address belongs to the physical page:
[   34.310465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.310565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.310618] page_type: f5(slab)
[   34.310657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.310716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.310991] page dumped because: kasan: bad access detected
[   34.311312] 
[   34.311384] Memory state around the buggy address:
[   34.311606]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.311704]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.311806] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.311873]                                      ^
[   34.311965]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.312012]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.312160] ==================================================================
[   34.318844] ==================================================================
[   34.318911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   34.319055] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.319121] 
[   34.319160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.319252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.319310] Hardware name: linux,dummy-virt (DT)
[   34.319343] Call trace:
[   34.319367]  show_stack+0x20/0x38 (C)
[   34.319415]  dump_stack_lvl+0x8c/0xd0
[   34.319464]  print_report+0x118/0x5e8
[   34.319509]  kasan_report+0xdc/0x128
[   34.319554]  kasan_check_range+0x100/0x1a8
[   34.319602]  __kasan_check_write+0x20/0x30
[   34.319649]  kasan_atomics_helper+0xf20/0x4858
[   34.319699]  kasan_atomics+0x198/0x2e0
[   34.320303]  kunit_try_run_case+0x170/0x3f0
[   34.320383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.320521]  kthread+0x328/0x630
[   34.320673]  ret_from_fork+0x10/0x20
[   34.320728] 
[   34.320750] Allocated by task 296:
[   34.321055]  kasan_save_stack+0x3c/0x68
[   34.321222]  kasan_save_track+0x20/0x40
[   34.321323]  kasan_save_alloc_info+0x40/0x58
[   34.321401]  __kasan_kmalloc+0xd4/0xd8
[   34.321648]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.321790]  kasan_atomics+0xb8/0x2e0
[   34.321851]  kunit_try_run_case+0x170/0x3f0
[   34.321930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.322074]  kthread+0x328/0x630
[   34.322182]  ret_from_fork+0x10/0x20
[   34.322221] 
[   34.322266] The buggy address belongs to the object at fff00000c9708480
[   34.322266]  which belongs to the cache kmalloc-64 of size 64
[   34.322548] The buggy address is located 0 bytes to the right of
[   34.322548]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.322700] 
[   34.322750] The buggy address belongs to the physical page:
[   34.322988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.323148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.323236] page_type: f5(slab)
[   34.323348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.323402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.323488] page dumped because: kasan: bad access detected
[   34.323568] 
[   34.323848] Memory state around the buggy address:
[   34.324059]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.324210]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.324287] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.324398]                                      ^
[   34.324443]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.324558]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.324624] ==================================================================
[   34.445667] ==================================================================
[   34.445820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   34.445876] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.445932] 
[   34.446372] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.446724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.446818] Hardware name: linux,dummy-virt (DT)
[   34.447123] Call trace:
[   34.447441]  show_stack+0x20/0x38 (C)
[   34.448067]  dump_stack_lvl+0x8c/0xd0
[   34.448201]  print_report+0x118/0x5e8
[   34.448246]  kasan_report+0xdc/0x128
[   34.448293]  __asan_report_load8_noabort+0x20/0x30
[   34.449271]  kasan_atomics_helper+0x3df4/0x4858
[   34.449935]  kasan_atomics+0x198/0x2e0
[   34.450072]  kunit_try_run_case+0x170/0x3f0
[   34.450132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450188]  kthread+0x328/0x630
[   34.451582]  ret_from_fork+0x10/0x20
[   34.451942] 
[   34.452001] Allocated by task 296:
[   34.452033]  kasan_save_stack+0x3c/0x68
[   34.452076]  kasan_save_track+0x20/0x40
[   34.452125]  kasan_save_alloc_info+0x40/0x58
[   34.452167]  __kasan_kmalloc+0xd4/0xd8
[   34.452922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.453618]  kasan_atomics+0xb8/0x2e0
[   34.453939]  kunit_try_run_case+0x170/0x3f0
[   34.454209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.454851]  kthread+0x328/0x630
[   34.454896]  ret_from_fork+0x10/0x20
[   34.455108] 
[   34.455626] The buggy address belongs to the object at fff00000c9708480
[   34.455626]  which belongs to the cache kmalloc-64 of size 64
[   34.455983] The buggy address is located 0 bytes to the right of
[   34.455983]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.456052] 
[   34.456075] The buggy address belongs to the physical page:
[   34.456829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.457115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.457175] page_type: f5(slab)
[   34.458046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.459115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.459247] page dumped because: kasan: bad access detected
[   34.459320] 
[   34.459353] Memory state around the buggy address:
[   34.459455]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.459757]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.460300] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.460511]                                      ^
[   34.460557]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.461116]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.463076] ==================================================================
[   34.355649] ==================================================================
[   34.355750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   34.355840] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.355972] 
[   34.356029] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.356284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.356410] Hardware name: linux,dummy-virt (DT)
[   34.356482] Call trace:
[   34.356541]  show_stack+0x20/0x38 (C)
[   34.356710]  dump_stack_lvl+0x8c/0xd0
[   34.356805]  print_report+0x118/0x5e8
[   34.356931]  kasan_report+0xdc/0x128
[   34.356986]  kasan_check_range+0x100/0x1a8
[   34.357051]  __kasan_check_write+0x20/0x30
[   34.357107]  kasan_atomics_helper+0x1190/0x4858
[   34.357157]  kasan_atomics+0x198/0x2e0
[   34.357204]  kunit_try_run_case+0x170/0x3f0
[   34.357252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.357359]  kthread+0x328/0x630
[   34.357404]  ret_from_fork+0x10/0x20
[   34.357469] 
[   34.357490] Allocated by task 296:
[   34.357530]  kasan_save_stack+0x3c/0x68
[   34.357590]  kasan_save_track+0x20/0x40
[   34.357628]  kasan_save_alloc_info+0x40/0x58
[   34.357668]  __kasan_kmalloc+0xd4/0xd8
[   34.357706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.357749]  kasan_atomics+0xb8/0x2e0
[   34.357788]  kunit_try_run_case+0x170/0x3f0
[   34.357833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.357888]  kthread+0x328/0x630
[   34.357922]  ret_from_fork+0x10/0x20
[   34.357960] 
[   34.357990] The buggy address belongs to the object at fff00000c9708480
[   34.357990]  which belongs to the cache kmalloc-64 of size 64
[   34.358053] The buggy address is located 0 bytes to the right of
[   34.358053]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.358654] 
[   34.358695] The buggy address belongs to the physical page:
[   34.358818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.358916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.359213] page_type: f5(slab)
[   34.359280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.359419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.359490] page dumped because: kasan: bad access detected
[   34.359530] 
[   34.359550] Memory state around the buggy address:
[   34.359900]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.360000]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.360269] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.360314]                                      ^
[   34.360380]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.360443]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.360550] ==================================================================
[   34.368787] ==================================================================
[   34.368838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   34.368891] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.368967] 
[   34.368998] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.369550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.369610] Hardware name: linux,dummy-virt (DT)
[   34.369644] Call trace:
[   34.369868]  show_stack+0x20/0x38 (C)
[   34.369943]  dump_stack_lvl+0x8c/0xd0
[   34.370002]  print_report+0x118/0x5e8
[   34.370165]  kasan_report+0xdc/0x128
[   34.370221]  kasan_check_range+0x100/0x1a8
[   34.370340]  __kasan_check_write+0x20/0x30
[   34.370395]  kasan_atomics_helper+0x126c/0x4858
[   34.370447]  kasan_atomics+0x198/0x2e0
[   34.370501]  kunit_try_run_case+0x170/0x3f0
[   34.370624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.370681]  kthread+0x328/0x630
[   34.370724]  ret_from_fork+0x10/0x20
[   34.370910] 
[   34.371043] Allocated by task 296:
[   34.371094]  kasan_save_stack+0x3c/0x68
[   34.371138]  kasan_save_track+0x20/0x40
[   34.371378]  kasan_save_alloc_info+0x40/0x58
[   34.371583]  __kasan_kmalloc+0xd4/0xd8
[   34.371628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.371753]  kasan_atomics+0xb8/0x2e0
[   34.371815]  kunit_try_run_case+0x170/0x3f0
[   34.371878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.371932]  kthread+0x328/0x630
[   34.371966]  ret_from_fork+0x10/0x20
[   34.372219] 
[   34.372353] The buggy address belongs to the object at fff00000c9708480
[   34.372353]  which belongs to the cache kmalloc-64 of size 64
[   34.372438] The buggy address is located 0 bytes to the right of
[   34.372438]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.372701] 
[   34.372771] The buggy address belongs to the physical page:
[   34.372867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.372940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.373048] page_type: f5(slab)
[   34.373102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.373337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.373524] page dumped because: kasan: bad access detected
[   34.373598] 
[   34.373657] Memory state around the buggy address:
[   34.373907]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.374169]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.374235] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.374299]                                      ^
[   34.374408]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.374653]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.374735] ==================================================================
[   34.431891] ==================================================================
[   34.432025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   34.432110] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.432160] 
[   34.432192] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.432552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.432675] Hardware name: linux,dummy-virt (DT)
[   34.432710] Call trace:
[   34.432733]  show_stack+0x20/0x38 (C)
[   34.432786]  dump_stack_lvl+0x8c/0xd0
[   34.432835]  print_report+0x118/0x5e8
[   34.432882]  kasan_report+0xdc/0x128
[   34.433276]  __asan_report_load8_noabort+0x20/0x30
[   34.433402]  kasan_atomics_helper+0x3db0/0x4858
[   34.433591]  kasan_atomics+0x198/0x2e0
[   34.433641]  kunit_try_run_case+0x170/0x3f0
[   34.434074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.434144]  kthread+0x328/0x630
[   34.434190]  ret_from_fork+0x10/0x20
[   34.434240] 
[   34.434508] Allocated by task 296:
[   34.434642]  kasan_save_stack+0x3c/0x68
[   34.434703]  kasan_save_track+0x20/0x40
[   34.434791]  kasan_save_alloc_info+0x40/0x58
[   34.434851]  __kasan_kmalloc+0xd4/0xd8
[   34.434995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.435090]  kasan_atomics+0xb8/0x2e0
[   34.435129]  kunit_try_run_case+0x170/0x3f0
[   34.435168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.435213]  kthread+0x328/0x630
[   34.435246]  ret_from_fork+0x10/0x20
[   34.435284] 
[   34.435307] The buggy address belongs to the object at fff00000c9708480
[   34.435307]  which belongs to the cache kmalloc-64 of size 64
[   34.435397] The buggy address is located 0 bytes to the right of
[   34.435397]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.435847] 
[   34.436057] The buggy address belongs to the physical page:
[   34.436294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.436490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.436539] page_type: f5(slab)
[   34.436578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.436833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.436882] page dumped because: kasan: bad access detected
[   34.436915] 
[   34.436935] Memory state around the buggy address:
[   34.437354]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.437418]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.437779] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.437902]                                      ^
[   34.437940]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.437985]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.438029] ==================================================================
[   34.424852] ==================================================================
[   34.424946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   34.425297] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.425355] 
[   34.425385] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.425470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.425498] Hardware name: linux,dummy-virt (DT)
[   34.425530] Call trace:
[   34.425553]  show_stack+0x20/0x38 (C)
[   34.425613]  dump_stack_lvl+0x8c/0xd0
[   34.425744]  print_report+0x118/0x5e8
[   34.425832]  kasan_report+0xdc/0x128
[   34.426028]  kasan_check_range+0x100/0x1a8
[   34.426179]  __kasan_check_write+0x20/0x30
[   34.426354]  kasan_atomics_helper+0x15b4/0x4858
[   34.426582]  kasan_atomics+0x198/0x2e0
[   34.426738]  kunit_try_run_case+0x170/0x3f0
[   34.426786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.426847]  kthread+0x328/0x630
[   34.427047]  ret_from_fork+0x10/0x20
[   34.427466] 
[   34.427571] Allocated by task 296:
[   34.427671]  kasan_save_stack+0x3c/0x68
[   34.428511]  kasan_save_track+0x20/0x40
[   34.428741]  kasan_save_alloc_info+0x40/0x58
[   34.428785]  __kasan_kmalloc+0xd4/0xd8
[   34.428822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.428864]  kasan_atomics+0xb8/0x2e0
[   34.428905]  kunit_try_run_case+0x170/0x3f0
[   34.428946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.429137]  kthread+0x328/0x630
[   34.429187]  ret_from_fork+0x10/0x20
[   34.429226] 
[   34.429250] The buggy address belongs to the object at fff00000c9708480
[   34.429250]  which belongs to the cache kmalloc-64 of size 64
[   34.429311] The buggy address is located 0 bytes to the right of
[   34.429311]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.429385] 
[   34.429408] The buggy address belongs to the physical page:
[   34.429441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.429753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.429869] page_type: f5(slab)
[   34.429908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.430056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.430204] page dumped because: kasan: bad access detected
[   34.430343] 
[   34.430365] Memory state around the buggy address:
[   34.430420]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.430487]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.430531] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.430571]                                      ^
[   34.431021]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.431141]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.431209] ==================================================================
[   34.145697] ==================================================================
[   34.145757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   34.145823] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.145875] 
[   34.145906] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.145992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.146030] Hardware name: linux,dummy-virt (DT)
[   34.146061] Call trace:
[   34.146100]  show_stack+0x20/0x38 (C)
[   34.146148]  dump_stack_lvl+0x8c/0xd0
[   34.146196]  print_report+0x118/0x5e8
[   34.146240]  kasan_report+0xdc/0x128
[   34.146296]  kasan_check_range+0x100/0x1a8
[   34.146342]  __kasan_check_write+0x20/0x30
[   34.146389]  kasan_atomics_helper+0x6ec/0x4858
[   34.146439]  kasan_atomics+0x198/0x2e0
[   34.146485]  kunit_try_run_case+0x170/0x3f0
[   34.146532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.146584]  kthread+0x328/0x630
[   34.146640]  ret_from_fork+0x10/0x20
[   34.146693] 
[   34.146715] Allocated by task 296:
[   34.146743]  kasan_save_stack+0x3c/0x68
[   34.146782]  kasan_save_track+0x20/0x40
[   34.146829]  kasan_save_alloc_info+0x40/0x58
[   34.146867]  __kasan_kmalloc+0xd4/0xd8
[   34.146904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.146945]  kasan_atomics+0xb8/0x2e0
[   34.147071]  kthread+0x328/0x630
[   34.147115]  ret_from_fork+0x10/0x20
[   34.147151] 
[   34.147428] The buggy address is located 0 bytes to the right of
[   34.147428]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.148019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.148874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.149460]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.149510] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.149717]                                      ^
[   34.149784]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.149935]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.152029] ==================================================================
[   34.276645] ==================================================================
[   34.276717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   34.276858] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.276945] 
[   34.276993] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.277312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.277366] Hardware name: linux,dummy-virt (DT)
[   34.277550] Call trace:
[   34.277581]  show_stack+0x20/0x38 (C)
[   34.277633]  dump_stack_lvl+0x8c/0xd0
[   34.277751]  print_report+0x118/0x5e8
[   34.277827]  kasan_report+0xdc/0x128
[   34.277882]  kasan_check_range+0x100/0x1a8
[   34.277937]  __kasan_check_write+0x20/0x30
[   34.278207]  kasan_atomics_helper+0xd3c/0x4858
[   34.278543]  kasan_atomics+0x198/0x2e0
[   34.278639]  kunit_try_run_case+0x170/0x3f0
[   34.278700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.278754]  kthread+0x328/0x630
[   34.278797]  ret_from_fork+0x10/0x20
[   34.278845] 
[   34.279032] Allocated by task 296:
[   34.279118]  kasan_save_stack+0x3c/0x68
[   34.279346]  kasan_save_track+0x20/0x40
[   34.279397]  kasan_save_alloc_info+0x40/0x58
[   34.279474]  __kasan_kmalloc+0xd4/0xd8
[   34.279511]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.279555]  kasan_atomics+0xb8/0x2e0
[   34.279595]  kunit_try_run_case+0x170/0x3f0
[   34.279695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.279909]  kthread+0x328/0x630
[   34.279948]  ret_from_fork+0x10/0x20
[   34.279992] 
[   34.280041] The buggy address belongs to the object at fff00000c9708480
[   34.280041]  which belongs to the cache kmalloc-64 of size 64
[   34.280208] The buggy address is located 0 bytes to the right of
[   34.280208]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.280279] 
[   34.280301] The buggy address belongs to the physical page:
[   34.280343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.280587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.280742] page_type: f5(slab)
[   34.280831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.281108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.281183] page dumped because: kasan: bad access detected
[   34.281248] 
[   34.281292] Memory state around the buggy address:
[   34.281390]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.281475]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.281535] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.281646]                                      ^
[   34.281689]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.281734]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.281780] ==================================================================
[   34.401950] ==================================================================
[   34.401996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   34.402053] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.402115] 
[   34.402494] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.402948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.403520] Hardware name: linux,dummy-virt (DT)
[   34.403558] Call trace:
[   34.403581]  show_stack+0x20/0x38 (C)
[   34.403632]  dump_stack_lvl+0x8c/0xd0
[   34.403679]  print_report+0x118/0x5e8
[   34.403779]  kasan_report+0xdc/0x128
[   34.403823]  kasan_check_range+0x100/0x1a8
[   34.403869]  __kasan_check_write+0x20/0x30
[   34.403916]  kasan_atomics_helper+0x147c/0x4858
[   34.404108]  kasan_atomics+0x198/0x2e0
[   34.404170]  kunit_try_run_case+0x170/0x3f0
[   34.404217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.404503]  kthread+0x328/0x630
[   34.404557]  ret_from_fork+0x10/0x20
[   34.405025] 
[   34.405055] Allocated by task 296:
[   34.405098]  kasan_save_stack+0x3c/0x68
[   34.405141]  kasan_save_track+0x20/0x40
[   34.405195]  kasan_save_alloc_info+0x40/0x58
[   34.405235]  __kasan_kmalloc+0xd4/0xd8
[   34.405380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.405433]  kasan_atomics+0xb8/0x2e0
[   34.405473]  kunit_try_run_case+0x170/0x3f0
[   34.406043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.406357]  kthread+0x328/0x630
[   34.406396]  ret_from_fork+0x10/0x20
[   34.406653] 
[   34.406722] The buggy address belongs to the object at fff00000c9708480
[   34.406722]  which belongs to the cache kmalloc-64 of size 64
[   34.407140] The buggy address is located 0 bytes to the right of
[   34.407140]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.407405] 
[   34.407456] The buggy address belongs to the physical page:
[   34.407548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.407602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.407685] page_type: f5(slab)
[   34.407768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.407820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.407879] page dumped because: kasan: bad access detected
[   34.407911] 
[   34.408093] Memory state around the buggy address:
[   34.408134]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.408181]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.408227] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.408268]                                      ^
[   34.408819]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.408901]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.409131] ==================================================================
[   34.301270] ==================================================================
[   34.301322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   34.301436] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.301491] 
[   34.301549] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.301953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.302003] Hardware name: linux,dummy-virt (DT)
[   34.302042] Call trace:
[   34.302068]  show_stack+0x20/0x38 (C)
[   34.302131]  dump_stack_lvl+0x8c/0xd0
[   34.302181]  print_report+0x118/0x5e8
[   34.302226]  kasan_report+0xdc/0x128
[   34.302467]  kasan_check_range+0x100/0x1a8
[   34.302533]  __kasan_check_write+0x20/0x30
[   34.302641]  kasan_atomics_helper+0xe44/0x4858
[   34.302695]  kasan_atomics+0x198/0x2e0
[   34.302918]  kunit_try_run_case+0x170/0x3f0
[   34.302997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.303107]  kthread+0x328/0x630
[   34.303162]  ret_from_fork+0x10/0x20
[   34.303380] 
[   34.303528] Allocated by task 296:
[   34.303563]  kasan_save_stack+0x3c/0x68
[   34.303608]  kasan_save_track+0x20/0x40
[   34.303711]  kasan_save_alloc_info+0x40/0x58
[   34.303796]  __kasan_kmalloc+0xd4/0xd8
[   34.304030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.304099]  kasan_atomics+0xb8/0x2e0
[   34.304146]  kunit_try_run_case+0x170/0x3f0
[   34.304270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.304322]  kthread+0x328/0x630
[   34.304576]  ret_from_fork+0x10/0x20
[   34.304637] 
[   34.304662] The buggy address belongs to the object at fff00000c9708480
[   34.304662]  which belongs to the cache kmalloc-64 of size 64
[   34.304727] The buggy address is located 0 bytes to the right of
[   34.304727]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.304811] 
[   34.304836] The buggy address belongs to the physical page:
[   34.304873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.304927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.304977] page_type: f5(slab)
[   34.305029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.305097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.305149] page dumped because: kasan: bad access detected
[   34.305182] 
[   34.305207] Memory state around the buggy address:
[   34.305252]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.305306]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.305355] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.305404]                                      ^
[   34.305455]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.305516]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.305556] ==================================================================
[   34.410641] ==================================================================
[   34.410692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   34.410744] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.410794] 
[   34.410824] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.410909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.410938] Hardware name: linux,dummy-virt (DT)
[   34.410970] Call trace:
[   34.410993]  show_stack+0x20/0x38 (C)
[   34.411203]  dump_stack_lvl+0x8c/0xd0
[   34.411408]  print_report+0x118/0x5e8
[   34.411607]  kasan_report+0xdc/0x128
[   34.411960]  kasan_check_range+0x100/0x1a8
[   34.412011]  __kasan_check_write+0x20/0x30
[   34.412059]  kasan_atomics_helper+0x14e4/0x4858
[   34.412120]  kasan_atomics+0x198/0x2e0
[   34.412168]  kunit_try_run_case+0x170/0x3f0
[   34.412215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.413033]  kthread+0x328/0x630
[   34.413150]  ret_from_fork+0x10/0x20
[   34.413235] 
[   34.413334] Allocated by task 296:
[   34.413393]  kasan_save_stack+0x3c/0x68
[   34.413433]  kasan_save_track+0x20/0x40
[   34.413471]  kasan_save_alloc_info+0x40/0x58
[   34.413551]  __kasan_kmalloc+0xd4/0xd8
[   34.413589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.413642]  kasan_atomics+0xb8/0x2e0
[   34.413743]  kunit_try_run_case+0x170/0x3f0
[   34.413823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.413984]  kthread+0x328/0x630
[   34.414035]  ret_from_fork+0x10/0x20
[   34.414090] 
[   34.414112] The buggy address belongs to the object at fff00000c9708480
[   34.414112]  which belongs to the cache kmalloc-64 of size 64
[   34.414172] The buggy address is located 0 bytes to the right of
[   34.414172]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.414237] 
[   34.414260] The buggy address belongs to the physical page:
[   34.414294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.414346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.414395] page_type: f5(slab)
[   34.414433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.414737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.415019] page dumped because: kasan: bad access detected
[   34.415057] 
[   34.415089] Memory state around the buggy address:
[   34.415321]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.415439]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.415558] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.415639]                                      ^
[   34.415769]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.415814]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.415873] ==================================================================
[   34.325553] ==================================================================
[   34.325614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   34.325664] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.325714] 
[   34.325931] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.326105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.326139] Hardware name: linux,dummy-virt (DT)
[   34.326173] Call trace:
[   34.326199]  show_stack+0x20/0x38 (C)
[   34.326415]  dump_stack_lvl+0x8c/0xd0
[   34.326547]  print_report+0x118/0x5e8
[   34.326614]  kasan_report+0xdc/0x128
[   34.326669]  kasan_check_range+0x100/0x1a8
[   34.326868]  __kasan_check_write+0x20/0x30
[   34.326941]  kasan_atomics_helper+0xf88/0x4858
[   34.327025]  kasan_atomics+0x198/0x2e0
[   34.327095]  kunit_try_run_case+0x170/0x3f0
[   34.327190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.327246]  kthread+0x328/0x630
[   34.327313]  ret_from_fork+0x10/0x20
[   34.327402] 
[   34.327442] Allocated by task 296:
[   34.327490]  kasan_save_stack+0x3c/0x68
[   34.327644]  kasan_save_track+0x20/0x40
[   34.327688]  kasan_save_alloc_info+0x40/0x58
[   34.327749]  __kasan_kmalloc+0xd4/0xd8
[   34.327870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.327955]  kasan_atomics+0xb8/0x2e0
[   34.328066]  kunit_try_run_case+0x170/0x3f0
[   34.328119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.328164]  kthread+0x328/0x630
[   34.328201]  ret_from_fork+0x10/0x20
[   34.328237] 
[   34.328260] The buggy address belongs to the object at fff00000c9708480
[   34.328260]  which belongs to the cache kmalloc-64 of size 64
[   34.328318] The buggy address is located 0 bytes to the right of
[   34.328318]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.328395] 
[   34.328441] The buggy address belongs to the physical page:
[   34.328481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.328533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.328592] page_type: f5(slab)
[   34.328647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.328699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.328740] page dumped because: kasan: bad access detected
[   34.328774] 
[   34.328794] Memory state around the buggy address:
[   34.328834]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.328888]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.328932] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.328982]                                      ^
[   34.329015]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.329062]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.329510] ==================================================================
[   34.381857] ==================================================================
[   34.382590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   34.382661] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.382721] 
[   34.382882] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.383063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.383182] Hardware name: linux,dummy-virt (DT)
[   34.383222] Call trace:
[   34.383342]  show_stack+0x20/0x38 (C)
[   34.383408]  dump_stack_lvl+0x8c/0xd0
[   34.383464]  print_report+0x118/0x5e8
[   34.383685]  kasan_report+0xdc/0x128
[   34.383790]  kasan_check_range+0x100/0x1a8
[   34.383836]  __kasan_check_write+0x20/0x30
[   34.383882]  kasan_atomics_helper+0x1384/0x4858
[   34.383934]  kasan_atomics+0x198/0x2e0
[   34.384102]  kunit_try_run_case+0x170/0x3f0
[   34.384160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.384214]  kthread+0x328/0x630
[   34.384257]  ret_from_fork+0x10/0x20
[   34.384305] 
[   34.384326] Allocated by task 296:
[   34.384693]  kasan_save_stack+0x3c/0x68
[   34.384792]  kasan_save_track+0x20/0x40
[   34.384831]  kasan_save_alloc_info+0x40/0x58
[   34.384871]  __kasan_kmalloc+0xd4/0xd8
[   34.384908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.384949]  kasan_atomics+0xb8/0x2e0
[   34.385247]  kunit_try_run_case+0x170/0x3f0
[   34.385337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.385384]  kthread+0x328/0x630
[   34.385417]  ret_from_fork+0x10/0x20
[   34.385455] 
[   34.385488] The buggy address belongs to the object at fff00000c9708480
[   34.385488]  which belongs to the cache kmalloc-64 of size 64
[   34.385549] The buggy address is located 0 bytes to the right of
[   34.385549]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.385794] 
[   34.386218] The buggy address belongs to the physical page:
[   34.386275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.386332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.386405] page_type: f5(slab)
[   34.386503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.386555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.386597] page dumped because: kasan: bad access detected
[   34.386629] 
[   34.386651] Memory state around the buggy address:
[   34.386733]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.386812]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.386892] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.387012]                                      ^
[   34.387373]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.387692]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.387750] ==================================================================
[   34.337419] ==================================================================
[   34.337483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   34.337569] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.337643] 
[   34.337702] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.337925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.337954] Hardware name: linux,dummy-virt (DT)
[   34.338004] Call trace:
[   34.338034]  show_stack+0x20/0x38 (C)
[   34.338096]  dump_stack_lvl+0x8c/0xd0
[   34.338179]  print_report+0x118/0x5e8
[   34.338238]  kasan_report+0xdc/0x128
[   34.338282]  kasan_check_range+0x100/0x1a8
[   34.338356]  __kasan_check_write+0x20/0x30
[   34.338415]  kasan_atomics_helper+0x1058/0x4858
[   34.338475]  kasan_atomics+0x198/0x2e0
[   34.338523]  kunit_try_run_case+0x170/0x3f0
[   34.338570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.338623]  kthread+0x328/0x630
[   34.338674]  ret_from_fork+0x10/0x20
[   34.338722] 
[   34.338744] Allocated by task 296:
[   34.338772]  kasan_save_stack+0x3c/0x68
[   34.338812]  kasan_save_track+0x20/0x40
[   34.338850]  kasan_save_alloc_info+0x40/0x58
[   34.338889]  __kasan_kmalloc+0xd4/0xd8
[   34.338925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.338968]  kasan_atomics+0xb8/0x2e0
[   34.339016]  kunit_try_run_case+0x170/0x3f0
[   34.339055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.339523]  kthread+0x328/0x630
[   34.339575]  ret_from_fork+0x10/0x20
[   34.339613] 
[   34.339637] The buggy address belongs to the object at fff00000c9708480
[   34.339637]  which belongs to the cache kmalloc-64 of size 64
[   34.339846] The buggy address is located 0 bytes to the right of
[   34.339846]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.340069] 
[   34.340152] The buggy address belongs to the physical page:
[   34.340239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.340324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.340538] page_type: f5(slab)
[   34.340667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.340757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.340845] page dumped because: kasan: bad access detected
[   34.340979] 
[   34.341000] Memory state around the buggy address:
[   34.341034]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.341233]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.341397] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.341474]                                      ^
[   34.341601]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.341675]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.341897] ==================================================================
[   34.465498] ==================================================================
[   34.465551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   34.467477] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.467628] 
[   34.467663] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.467760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.467789] Hardware name: linux,dummy-virt (DT)
[   34.467822] Call trace:
[   34.467846]  show_stack+0x20/0x38 (C)
[   34.467900]  dump_stack_lvl+0x8c/0xd0
[   34.469558]  print_report+0x118/0x5e8
[   34.469824]  kasan_report+0xdc/0x128
[   34.470348]  kasan_check_range+0x100/0x1a8
[   34.471028]  __kasan_check_write+0x20/0x30
[   34.471225]  kasan_atomics_helper+0x16d0/0x4858
[   34.471277]  kasan_atomics+0x198/0x2e0
[   34.471327]  kunit_try_run_case+0x170/0x3f0
[   34.471375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.472323]  kthread+0x328/0x630
[   34.472846]  ret_from_fork+0x10/0x20
[   34.473473] 
[   34.473734] Allocated by task 296:
[   34.473771]  kasan_save_stack+0x3c/0x68
[   34.474301]  kasan_save_track+0x20/0x40
[   34.474726]  kasan_save_alloc_info+0x40/0x58
[   34.474784]  __kasan_kmalloc+0xd4/0xd8
[   34.474821]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.474864]  kasan_atomics+0xb8/0x2e0
[   34.475763]  kunit_try_run_case+0x170/0x3f0
[   34.475831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.475879]  kthread+0x328/0x630
[   34.475915]  ret_from_fork+0x10/0x20
[   34.475954] 
[   34.475977] The buggy address belongs to the object at fff00000c9708480
[   34.475977]  which belongs to the cache kmalloc-64 of size 64
[   34.476038] The buggy address is located 0 bytes to the right of
[   34.476038]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.477239] 
[   34.477619] The buggy address belongs to the physical page:
[   34.477991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.478523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.478584] page_type: f5(slab)
[   34.478625] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.479216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.479869] page dumped because: kasan: bad access detected
[   34.479914] 
[   34.479936] Memory state around the buggy address:
[   34.481060]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.481368]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.481614] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.482409]                                      ^
[   34.482464]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.482611]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.482785] ==================================================================
[   34.136980] ==================================================================
[   34.137268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   34.137331] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.137386] 
[   34.137491] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.137585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.137862] Hardware name: linux,dummy-virt (DT)
[   34.137923] Call trace:
[   34.137950]  show_stack+0x20/0x38 (C)
[   34.138007]  dump_stack_lvl+0x8c/0xd0
[   34.138353]  print_report+0x118/0x5e8
[   34.138431]  kasan_report+0xdc/0x128
[   34.138700]  kasan_check_range+0x100/0x1a8
[   34.138844]  __kasan_check_write+0x20/0x30
[   34.138899]  kasan_atomics_helper+0x684/0x4858
[   34.138951]  kasan_atomics+0x198/0x2e0
[   34.139157]  kunit_try_run_case+0x170/0x3f0
[   34.139325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.139393]  kthread+0x328/0x630
[   34.139438]  ret_from_fork+0x10/0x20
[   34.139731] 
[   34.139783] Allocated by task 296:
[   34.139924]  kasan_save_stack+0x3c/0x68
[   34.139992]  kasan_save_track+0x20/0x40
[   34.140031]  kasan_save_alloc_info+0x40/0x58
[   34.140076]  __kasan_kmalloc+0xd4/0xd8
[   34.140123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.140710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.140784]  kthread+0x328/0x630
[   34.140826]  ret_from_fork+0x10/0x20
[   34.141125] 
[   34.141213] The buggy address belongs to the object at fff00000c9708480
[   34.141213]  which belongs to the cache kmalloc-64 of size 64
[   34.141554] 
[   34.141684] The buggy address belongs to the physical page:
[   34.141789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.142164] page_type: f5(slab)
[   34.142242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.142621] page dumped because: kasan: bad access detected
[   34.142765] 
[   34.142849] Memory state around the buggy address:
[   34.143164] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.143216]                                      ^
[   34.143295]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.143570]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.143625] ==================================================================
[   34.361639] ==================================================================
[   34.361853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   34.362035] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.362117] 
[   34.362178] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.362350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.362409] Hardware name: linux,dummy-virt (DT)
[   34.362444] Call trace:
[   34.362546]  show_stack+0x20/0x38 (C)
[   34.362599]  dump_stack_lvl+0x8c/0xd0
[   34.362648]  print_report+0x118/0x5e8
[   34.362692]  kasan_report+0xdc/0x128
[   34.362951]  kasan_check_range+0x100/0x1a8
[   34.363107]  __kasan_check_write+0x20/0x30
[   34.363176]  kasan_atomics_helper+0x11f8/0x4858
[   34.363396]  kasan_atomics+0x198/0x2e0
[   34.363593]  kunit_try_run_case+0x170/0x3f0
[   34.363675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.363800]  kthread+0x328/0x630
[   34.363877]  ret_from_fork+0x10/0x20
[   34.364072] 
[   34.364150] Allocated by task 296:
[   34.364387]  kasan_save_stack+0x3c/0x68
[   34.364666]  kasan_save_track+0x20/0x40
[   34.364713]  kasan_save_alloc_info+0x40/0x58
[   34.364762]  __kasan_kmalloc+0xd4/0xd8
[   34.364800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.364843]  kasan_atomics+0xb8/0x2e0
[   34.364960]  kunit_try_run_case+0x170/0x3f0
[   34.365038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.365180]  kthread+0x328/0x630
[   34.365279]  ret_from_fork+0x10/0x20
[   34.365608] 
[   34.365664] The buggy address belongs to the object at fff00000c9708480
[   34.365664]  which belongs to the cache kmalloc-64 of size 64
[   34.365758] The buggy address is located 0 bytes to the right of
[   34.365758]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.365907] 
[   34.365965] The buggy address belongs to the physical page:
[   34.366192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.366365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.366458] page_type: f5(slab)
[   34.366526] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.366761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.366949] page dumped because: kasan: bad access detected
[   34.367020] 
[   34.367119] Memory state around the buggy address:
[   34.367157]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.367420]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.367558] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.367626]                                      ^
[   34.367873]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.368063]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.368151] ==================================================================
[   34.313160] ==================================================================
[   34.313216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   34.313276] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.313392] 
[   34.313452] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.313569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.313600] Hardware name: linux,dummy-virt (DT)
[   34.313630] Call trace:
[   34.313654]  show_stack+0x20/0x38 (C)
[   34.313877]  dump_stack_lvl+0x8c/0xd0
[   34.313942]  print_report+0x118/0x5e8
[   34.314050]  kasan_report+0xdc/0x128
[   34.314136]  kasan_check_range+0x100/0x1a8
[   34.314353]  __kasan_check_write+0x20/0x30
[   34.314456]  kasan_atomics_helper+0xeb8/0x4858
[   34.314512]  kasan_atomics+0x198/0x2e0
[   34.314558]  kunit_try_run_case+0x170/0x3f0
[   34.314612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.314664]  kthread+0x328/0x630
[   34.314826]  ret_from_fork+0x10/0x20
[   34.314890] 
[   34.315026] Allocated by task 296:
[   34.315075]  kasan_save_stack+0x3c/0x68
[   34.315195]  kasan_save_track+0x20/0x40
[   34.315244]  kasan_save_alloc_info+0x40/0x58
[   34.315299]  __kasan_kmalloc+0xd4/0xd8
[   34.315337]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.315387]  kasan_atomics+0xb8/0x2e0
[   34.315425]  kunit_try_run_case+0x170/0x3f0
[   34.315465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.315609]  kthread+0x328/0x630
[   34.315657]  ret_from_fork+0x10/0x20
[   34.315696] 
[   34.315992] The buggy address belongs to the object at fff00000c9708480
[   34.315992]  which belongs to the cache kmalloc-64 of size 64
[   34.316127] The buggy address is located 0 bytes to the right of
[   34.316127]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.316432] 
[   34.316583] The buggy address belongs to the physical page:
[   34.316642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.316769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.316909] page_type: f5(slab)
[   34.317030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.317093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.317136] page dumped because: kasan: bad access detected
[   34.317175] 
[   34.317195] Memory state around the buggy address:
[   34.317227]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.317491]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.317597] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.317666]                                      ^
[   34.317861]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.318108]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.318197] ==================================================================
[   34.330553] ==================================================================
[   34.330607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   34.330659] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.330719] 
[   34.330749] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.331071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.331192] Hardware name: linux,dummy-virt (DT)
[   34.331248] Call trace:
[   34.331275]  show_stack+0x20/0x38 (C)
[   34.331331]  dump_stack_lvl+0x8c/0xd0
[   34.331524]  print_report+0x118/0x5e8
[   34.331810]  kasan_report+0xdc/0x128
[   34.331874]  kasan_check_range+0x100/0x1a8
[   34.331952]  __kasan_check_write+0x20/0x30
[   34.332040]  kasan_atomics_helper+0xff0/0x4858
[   34.332121]  kasan_atomics+0x198/0x2e0
[   34.332224]  kunit_try_run_case+0x170/0x3f0
[   34.332374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.332471]  kthread+0x328/0x630
[   34.332579]  ret_from_fork+0x10/0x20
[   34.332630] 
[   34.332666] Allocated by task 296:
[   34.332701]  kasan_save_stack+0x3c/0x68
[   34.332977]  kasan_save_track+0x20/0x40
[   34.333050]  kasan_save_alloc_info+0x40/0x58
[   34.333530]  __kasan_kmalloc+0xd4/0xd8
[   34.333614]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.333678]  kasan_atomics+0xb8/0x2e0
[   34.333751]  kunit_try_run_case+0x170/0x3f0
[   34.333979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.334075]  kthread+0x328/0x630
[   34.334205]  ret_from_fork+0x10/0x20
[   34.334246] 
[   34.334275] The buggy address belongs to the object at fff00000c9708480
[   34.334275]  which belongs to the cache kmalloc-64 of size 64
[   34.334552] The buggy address is located 0 bytes to the right of
[   34.334552]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.334675] 
[   34.334724] The buggy address belongs to the physical page:
[   34.334787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.334950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.335138] page_type: f5(slab)
[   34.335213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.335280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.335393] page dumped because: kasan: bad access detected
[   34.335462] 
[   34.335536] Memory state around the buggy address:
[   34.335575]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.335620]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.335908] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.336023]                                      ^
[   34.336102]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.336191]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.336444] ==================================================================
[   34.172580] ==================================================================
[   34.172633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   34.172765] Read of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.172819] 
[   34.172877] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.172969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.172997] Hardware name: linux,dummy-virt (DT)
[   34.173337] Call trace:
[   34.173387]  show_stack+0x20/0x38 (C)
[   34.173453]  dump_stack_lvl+0x8c/0xd0
[   34.173574]  print_report+0x118/0x5e8
[   34.173638]  kasan_report+0xdc/0x128
[   34.173705]  __asan_report_load4_noabort+0x20/0x30
[   34.176866] page_type: f5(slab)
[   34.178033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.181623]  kasan_save_alloc_info+0x40/0x58
[   34.181689]  __kasan_kmalloc+0xd4/0xd8
[   34.182037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.182161]  kasan_atomics+0xb8/0x2e0
[   34.182218]  kunit_try_run_case+0x170/0x3f0
[   34.182297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.182675]  kthread+0x328/0x630
[   34.182749]  ret_from_fork+0x10/0x20
[   34.183033] 
[   34.183071] The buggy address belongs to the object at fff00000c9708480
[   34.183071]  which belongs to the cache kmalloc-64 of size 64
[   34.183169] The buggy address is located 0 bytes to the right of
[   34.183169]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.183302] 
[   34.183381] The buggy address belongs to the physical page:
[   34.183738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.183816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.183933] page_type: f5(slab)
[   34.184017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.184328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.184541] page dumped because: kasan: bad access detected
[   34.184616] 
[   34.184646] Memory state around the buggy address:
[   34.184932]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.185011]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.185815]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.190271]  kasan_save_alloc_info+0x40/0x58
[   34.194675]  kasan_atomics+0x198/0x2e0
[   34.196971] 
[   34.197032] The buggy address belongs to the physical page:
[   34.197140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.197196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.197248] page_type: f5(slab)
[   34.197287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.197574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.198041] page dumped because: kasan: bad access detected
[   34.198157] 
[   34.198216] Memory state around the buggy address:
[   34.198337]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.198386]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.198456] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.198757]                                      ^
[   34.198825]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.198908]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.198963] ==================================================================
[   34.396860] ==================================================================
[   34.396917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   34.396970] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.397022] 
[   34.397059] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.397461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.397601] Hardware name: linux,dummy-virt (DT)
[   34.397755] Call trace:
[   34.397801]  show_stack+0x20/0x38 (C)
[   34.397850]  dump_stack_lvl+0x8c/0xd0
[   34.397899]  print_report+0x118/0x5e8
[   34.397942]  kasan_report+0xdc/0x128
[   34.397988]  kasan_check_range+0x100/0x1a8
[   34.398046]  __kasan_check_write+0x20/0x30
[   34.398123]  kasan_atomics_helper+0x1414/0x4858
[   34.398173]  kasan_atomics+0x198/0x2e0
[   34.398220]  kunit_try_run_case+0x170/0x3f0
[   34.398267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.398320]  kthread+0x328/0x630
[   34.398457]  ret_from_fork+0x10/0x20
[   34.398680] 
[   34.398736] Allocated by task 296:
[   34.398768]  kasan_save_stack+0x3c/0x68
[   34.398810]  kasan_save_track+0x20/0x40
[   34.398848]  kasan_save_alloc_info+0x40/0x58
[   34.399378]  __kasan_kmalloc+0xd4/0xd8
[   34.399442]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.399574]  kasan_atomics+0xb8/0x2e0
[   34.399673]  kunit_try_run_case+0x170/0x3f0
[   34.399815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.399904]  kthread+0x328/0x630
[   34.399940]  ret_from_fork+0x10/0x20
[   34.400090] 
[   34.400115] The buggy address belongs to the object at fff00000c9708480
[   34.400115]  which belongs to the cache kmalloc-64 of size 64
[   34.400265] The buggy address is located 0 bytes to the right of
[   34.400265]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.400399] 
[   34.400469] The buggy address belongs to the physical page:
[   34.400519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.400572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.400659] page_type: f5(slab)
[   34.400741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.400792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.400933] page dumped because: kasan: bad access detected
[   34.400966] 
[   34.401033] Memory state around the buggy address:
[   34.401138]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.401183]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.401296] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.401473]                                      ^
[   34.401508]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.401564]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.401622] ==================================================================
[   34.160591] ==================================================================
[   34.160645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   34.160858] Write of size 4 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.161031] 
[   34.161102] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.161190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.161218] Hardware name: linux,dummy-virt (DT)
[   34.161338] Call trace:
[   34.161396]  show_stack+0x20/0x38 (C)
[   34.161451]  dump_stack_lvl+0x8c/0xd0
[   34.161643]  print_report+0x118/0x5e8
[   34.161693]  kasan_report+0xdc/0x128
[   34.161753]  kasan_check_range+0x100/0x1a8
[   34.161801]  __kasan_check_write+0x20/0x30
[   34.161849]  kasan_atomics_helper+0x7cc/0x4858
[   34.161898]  kasan_atomics+0x198/0x2e0
[   34.161946]  kunit_try_run_case+0x170/0x3f0
[   34.161993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.162049]  kthread+0x328/0x630
[   34.162102]  ret_from_fork+0x10/0x20
[   34.162150] 
[   34.162171] Allocated by task 296:
[   34.162200]  kasan_save_stack+0x3c/0x68
[   34.162241]  kasan_save_track+0x20/0x40
[   34.162278]  kasan_save_alloc_info+0x40/0x58
[   34.162318]  __kasan_kmalloc+0xd4/0xd8
[   34.162408]  kasan_atomics+0xb8/0x2e0
[   34.164060]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.165857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.168835] 
[   34.170094] page dumped because: kasan: bad access detected
[   34.170658]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.170750] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.170860]                                      ^
[   34.170928]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.170981]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.171297] ==================================================================
[   34.526711] ==================================================================
[   34.526763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   34.526819] Read of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.526871] 
[   34.526904] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.528334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.528479] Hardware name: linux,dummy-virt (DT)
[   34.528618] Call trace:
[   34.528877]  show_stack+0x20/0x38 (C)
[   34.528974]  dump_stack_lvl+0x8c/0xd0
[   34.529026]  print_report+0x118/0x5e8
[   34.529071]  kasan_report+0xdc/0x128
[   34.530441]  __asan_report_load8_noabort+0x20/0x30
[   34.530710]  kasan_atomics_helper+0x3e20/0x4858
[   34.531460]  kasan_atomics+0x198/0x2e0
[   34.532444]  kunit_try_run_case+0x170/0x3f0
[   34.532617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.533088]  kthread+0x328/0x630
[   34.533341]  ret_from_fork+0x10/0x20
[   34.533762] 
[   34.533882] Allocated by task 296:
[   34.533980]  kasan_save_stack+0x3c/0x68
[   34.534104]  kasan_save_track+0x20/0x40
[   34.534290]  kasan_save_alloc_info+0x40/0x58
[   34.534910]  __kasan_kmalloc+0xd4/0xd8
[   34.535525]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.535638]  kasan_atomics+0xb8/0x2e0
[   34.535917]  kunit_try_run_case+0x170/0x3f0
[   34.536212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.536568]  kthread+0x328/0x630
[   34.536623]  ret_from_fork+0x10/0x20
[   34.536661] 
[   34.536850] The buggy address belongs to the object at fff00000c9708480
[   34.536850]  which belongs to the cache kmalloc-64 of size 64
[   34.537333] The buggy address is located 0 bytes to the right of
[   34.537333]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.538210] 
[   34.538236] The buggy address belongs to the physical page:
[   34.538272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.538328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.538381] page_type: f5(slab)
[   34.538423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.538473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.538515] page dumped because: kasan: bad access detected
[   34.538546] 
[   34.538567] Memory state around the buggy address:
[   34.538601]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.538645]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.538690] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.538730]                                      ^
[   34.538765]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.538807]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.538848] ==================================================================
[   34.375257] ==================================================================
[   34.375777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   34.375901] Write of size 8 at addr fff00000c97084b0 by task kunit_try_catch/296
[   34.375989] 
[   34.376149] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   34.376273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.376408] Hardware name: linux,dummy-virt (DT)
[   34.376453] Call trace:
[   34.376478]  show_stack+0x20/0x38 (C)
[   34.376551]  dump_stack_lvl+0x8c/0xd0
[   34.376606]  print_report+0x118/0x5e8
[   34.376833]  kasan_report+0xdc/0x128
[   34.376937]  kasan_check_range+0x100/0x1a8
[   34.377181]  __kasan_check_write+0x20/0x30
[   34.377290]  kasan_atomics_helper+0x12d8/0x4858
[   34.377347]  kasan_atomics+0x198/0x2e0
[   34.377643]  kunit_try_run_case+0x170/0x3f0
[   34.377742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.377927]  kthread+0x328/0x630
[   34.377997]  ret_from_fork+0x10/0x20
[   34.378107] 
[   34.378137] Allocated by task 296:
[   34.378168]  kasan_save_stack+0x3c/0x68
[   34.378210]  kasan_save_track+0x20/0x40
[   34.378256]  kasan_save_alloc_info+0x40/0x58
[   34.378306]  __kasan_kmalloc+0xd4/0xd8
[   34.378343]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.378388]  kasan_atomics+0xb8/0x2e0
[   34.378425]  kunit_try_run_case+0x170/0x3f0
[   34.378472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.378536]  kthread+0x328/0x630
[   34.378573]  ret_from_fork+0x10/0x20
[   34.378622] 
[   34.378646] The buggy address belongs to the object at fff00000c9708480
[   34.378646]  which belongs to the cache kmalloc-64 of size 64
[   34.378706] The buggy address is located 0 bytes to the right of
[   34.378706]  allocated 48-byte region [fff00000c9708480, fff00000c97084b0)
[   34.378773] 
[   34.378804] The buggy address belongs to the physical page:
[   34.378839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109708
[   34.378903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.378951] page_type: f5(slab)
[   34.379006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.379064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.379568] page dumped because: kasan: bad access detected
[   34.379609] 
[   34.379630] Memory state around the buggy address:
[   34.379666]  fff00000c9708380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.379879]  fff00000c9708400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.379966] >fff00000c9708480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.380373]                                      ^
[   34.380449]  fff00000c9708500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.380533]  fff00000c9708580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.380677] ==================================================================


[   27.711638] ==================================================================
[   27.712293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   27.712642] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.713199] 
[   27.713325] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.713377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.713391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.713416] Call Trace:
[   27.713436]  <TASK>
[   27.713454]  dump_stack_lvl+0x73/0xb0
[   27.713487]  print_report+0xd1/0x640
[   27.713776]  ? __virt_addr_valid+0x1db/0x2d0
[   27.713808]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.713840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.713868]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.713890]  kasan_report+0x141/0x180
[   27.714126]  ? kasan_atomics_helper+0x12e6/0x5450
[   27.714157]  kasan_check_range+0x10c/0x1c0
[   27.714182]  __kasan_check_write+0x18/0x20
[   27.714207]  kasan_atomics_helper+0x12e6/0x5450
[   27.714231]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.714254]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.714279]  ? kasan_atomics+0x152/0x310
[   27.714318]  kasan_atomics+0x1dc/0x310
[   27.714344]  ? __pfx_kasan_atomics+0x10/0x10
[   27.714368]  ? __pfx_read_tsc+0x10/0x10
[   27.714391]  ? ktime_get_ts64+0x86/0x230
[   27.714417]  kunit_try_run_case+0x1a5/0x480
[   27.714443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.714466]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.714502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.714536]  ? __kthread_parkme+0x82/0x180
[   27.714557]  ? preempt_count_sub+0x50/0x80
[   27.714582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.714607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.714635]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.714665]  kthread+0x337/0x6f0
[   27.714686]  ? trace_preempt_on+0x20/0xc0
[   27.714711]  ? __pfx_kthread+0x10/0x10
[   27.714733]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.714763]  ? calculate_sigpending+0x7b/0xa0
[   27.714788]  ? __pfx_kthread+0x10/0x10
[   27.714825]  ret_from_fork+0x116/0x1d0
[   27.714860]  ? __pfx_kthread+0x10/0x10
[   27.714881]  ret_from_fork_asm+0x1a/0x30
[   27.714914]  </TASK>
[   27.714926] 
[   27.726883] Allocated by task 313:
[   27.727227]  kasan_save_stack+0x45/0x70
[   27.727622]  kasan_save_track+0x18/0x40
[   27.727917]  kasan_save_alloc_info+0x3b/0x50
[   27.728240]  __kasan_kmalloc+0xb7/0xc0
[   27.728438]  __kmalloc_cache_noprof+0x189/0x420
[   27.728636]  kasan_atomics+0x95/0x310
[   27.728802]  kunit_try_run_case+0x1a5/0x480
[   27.729351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.729786]  kthread+0x337/0x6f0
[   27.730142]  ret_from_fork+0x116/0x1d0
[   27.730333]  ret_from_fork_asm+0x1a/0x30
[   27.730518] 
[   27.730606] The buggy address belongs to the object at ffff8881053c7b80
[   27.730606]  which belongs to the cache kmalloc-64 of size 64
[   27.731738] The buggy address is located 0 bytes to the right of
[   27.731738]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.732649] 
[   27.732878] The buggy address belongs to the physical page:
[   27.733428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.734290] flags: 0x200000000000000(node=0|zone=2)
[   27.734549] page_type: f5(slab)
[   27.734713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.735336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.735838] page dumped because: kasan: bad access detected
[   27.736210] 
[   27.736299] Memory state around the buggy address:
[   27.736508]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.737058]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.737480] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.738037]                                      ^
[   27.738419]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.738730]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.739289] ==================================================================
[   27.296070] ==================================================================
[   27.297034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   27.297335] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.297929] 
[   27.298257] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.298326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.298398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.298421] Call Trace:
[   27.298440]  <TASK>
[   27.298459]  dump_stack_lvl+0x73/0xb0
[   27.298493]  print_report+0xd1/0x640
[   27.298516]  ? __virt_addr_valid+0x1db/0x2d0
[   27.298540]  ? kasan_atomics_helper+0xa2b/0x5450
[   27.298560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.298585]  ? kasan_atomics_helper+0xa2b/0x5450
[   27.298606]  kasan_report+0x141/0x180
[   27.298627]  ? kasan_atomics_helper+0xa2b/0x5450
[   27.298657]  kasan_check_range+0x10c/0x1c0
[   27.298680]  __kasan_check_write+0x18/0x20
[   27.298702]  kasan_atomics_helper+0xa2b/0x5450
[   27.298724]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.298745]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.298769]  ? kasan_atomics+0x152/0x310
[   27.298846]  kasan_atomics+0x1dc/0x310
[   27.298873]  ? __pfx_kasan_atomics+0x10/0x10
[   27.298896]  ? __pfx_read_tsc+0x10/0x10
[   27.298917]  ? ktime_get_ts64+0x86/0x230
[   27.298943]  kunit_try_run_case+0x1a5/0x480
[   27.298970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.298993]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.299028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.299061]  ? __kthread_parkme+0x82/0x180
[   27.299082]  ? preempt_count_sub+0x50/0x80
[   27.299105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.299128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.299151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.299173]  kthread+0x337/0x6f0
[   27.299193]  ? trace_preempt_on+0x20/0xc0
[   27.299216]  ? __pfx_kthread+0x10/0x10
[   27.299236]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.299266]  ? calculate_sigpending+0x7b/0xa0
[   27.299301]  ? __pfx_kthread+0x10/0x10
[   27.299322]  ret_from_fork+0x116/0x1d0
[   27.299342]  ? __pfx_kthread+0x10/0x10
[   27.299361]  ret_from_fork_asm+0x1a/0x30
[   27.299392]  </TASK>
[   27.299403] 
[   27.310615] Allocated by task 313:
[   27.310877]  kasan_save_stack+0x45/0x70
[   27.311281]  kasan_save_track+0x18/0x40
[   27.311454]  kasan_save_alloc_info+0x3b/0x50
[   27.311670]  __kasan_kmalloc+0xb7/0xc0
[   27.311814]  __kmalloc_cache_noprof+0x189/0x420
[   27.312511]  kasan_atomics+0x95/0x310
[   27.312682]  kunit_try_run_case+0x1a5/0x480
[   27.312898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.313381]  kthread+0x337/0x6f0
[   27.313544]  ret_from_fork+0x116/0x1d0
[   27.313713]  ret_from_fork_asm+0x1a/0x30
[   27.314309] 
[   27.314407] The buggy address belongs to the object at ffff8881053c7b80
[   27.314407]  which belongs to the cache kmalloc-64 of size 64
[   27.314832] The buggy address is located 0 bytes to the right of
[   27.314832]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.315537] 
[   27.315611] The buggy address belongs to the physical page:
[   27.315845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.316175] flags: 0x200000000000000(node=0|zone=2)
[   27.316391] page_type: f5(slab)
[   27.316547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.316840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.317147] page dumped because: kasan: bad access detected
[   27.317996] 
[   27.318092] Memory state around the buggy address:
[   27.318250]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.318721]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.319184] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.319443]                                      ^
[   27.319909]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.320338]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.320713] ==================================================================
[   28.183375] ==================================================================
[   28.183608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   28.183910] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.184198] 
[   28.184380] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.184432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.184445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.184469] Call Trace:
[   28.184487]  <TASK>
[   28.184503]  dump_stack_lvl+0x73/0xb0
[   28.184537]  print_report+0xd1/0x640
[   28.184560]  ? __virt_addr_valid+0x1db/0x2d0
[   28.184585]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.184606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.184632]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.184653]  kasan_report+0x141/0x180
[   28.184677]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.184703]  kasan_check_range+0x10c/0x1c0
[   28.184726]  __kasan_check_write+0x18/0x20
[   28.184750]  kasan_atomics_helper+0x1e12/0x5450
[   28.184798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.184822]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.184847]  ? kasan_atomics+0x152/0x310
[   28.184885]  kasan_atomics+0x1dc/0x310
[   28.184907]  ? __pfx_kasan_atomics+0x10/0x10
[   28.184931]  ? __pfx_read_tsc+0x10/0x10
[   28.184983]  ? ktime_get_ts64+0x86/0x230
[   28.185008]  kunit_try_run_case+0x1a5/0x480
[   28.185043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.185066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.185102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.185136]  ? __kthread_parkme+0x82/0x180
[   28.185156]  ? preempt_count_sub+0x50/0x80
[   28.185200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.185224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.185248]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.185271]  kthread+0x337/0x6f0
[   28.185291]  ? trace_preempt_on+0x20/0xc0
[   28.185316]  ? __pfx_kthread+0x10/0x10
[   28.185346]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.185377]  ? calculate_sigpending+0x7b/0xa0
[   28.185434]  ? __pfx_kthread+0x10/0x10
[   28.185459]  ret_from_fork+0x116/0x1d0
[   28.185479]  ? __pfx_kthread+0x10/0x10
[   28.185511]  ret_from_fork_asm+0x1a/0x30
[   28.185543]  </TASK>
[   28.185554] 
[   28.200115] Allocated by task 313:
[   28.200313]  kasan_save_stack+0x45/0x70
[   28.200785]  kasan_save_track+0x18/0x40
[   28.201076]  kasan_save_alloc_info+0x3b/0x50
[   28.201252]  __kasan_kmalloc+0xb7/0xc0
[   28.201431]  __kmalloc_cache_noprof+0x189/0x420
[   28.201617]  kasan_atomics+0x95/0x310
[   28.201785]  kunit_try_run_case+0x1a5/0x480
[   28.202408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.202896]  kthread+0x337/0x6f0
[   28.203185]  ret_from_fork+0x116/0x1d0
[   28.203359]  ret_from_fork_asm+0x1a/0x30
[   28.203495] 
[   28.203562] The buggy address belongs to the object at ffff8881053c7b80
[   28.203562]  which belongs to the cache kmalloc-64 of size 64
[   28.204044] The buggy address is located 0 bytes to the right of
[   28.204044]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.204624] 
[   28.204796] The buggy address belongs to the physical page:
[   28.205090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.205506] flags: 0x200000000000000(node=0|zone=2)
[   28.205671] page_type: f5(slab)
[   28.205888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.206198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.206541] page dumped because: kasan: bad access detected
[   28.206712] 
[   28.206775] Memory state around the buggy address:
[   28.206921]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.207335]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.207726] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.207924]                                      ^
[   28.208185]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.208879]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.209142] ==================================================================
[   28.469618] ==================================================================
[   28.469997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   28.470327] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.470623] 
[   28.470728] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.470776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.470789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.470830] Call Trace:
[   28.470847]  <TASK>
[   28.470863]  dump_stack_lvl+0x73/0xb0
[   28.470894]  print_report+0xd1/0x640
[   28.470916]  ? __virt_addr_valid+0x1db/0x2d0
[   28.470940]  ? kasan_atomics_helper+0x5115/0x5450
[   28.470962]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.470988]  ? kasan_atomics_helper+0x5115/0x5450
[   28.471010]  kasan_report+0x141/0x180
[   28.471050]  ? kasan_atomics_helper+0x5115/0x5450
[   28.471077]  __asan_report_load8_noabort+0x18/0x20
[   28.471115]  kasan_atomics_helper+0x5115/0x5450
[   28.471138]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.471174]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.471211]  ? kasan_atomics+0x152/0x310
[   28.471251]  kasan_atomics+0x1dc/0x310
[   28.471288]  ? __pfx_kasan_atomics+0x10/0x10
[   28.471325]  ? __pfx_read_tsc+0x10/0x10
[   28.471372]  ? ktime_get_ts64+0x86/0x230
[   28.471410]  kunit_try_run_case+0x1a5/0x480
[   28.471449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.471485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.471535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.471569]  ? __kthread_parkme+0x82/0x180
[   28.471590]  ? preempt_count_sub+0x50/0x80
[   28.471614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.471641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.471667]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.471692]  kthread+0x337/0x6f0
[   28.471712]  ? trace_preempt_on+0x20/0xc0
[   28.471736]  ? __pfx_kthread+0x10/0x10
[   28.471757]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.471788]  ? calculate_sigpending+0x7b/0xa0
[   28.471812]  ? __pfx_kthread+0x10/0x10
[   28.471834]  ret_from_fork+0x116/0x1d0
[   28.471855]  ? __pfx_kthread+0x10/0x10
[   28.471875]  ret_from_fork_asm+0x1a/0x30
[   28.471907]  </TASK>
[   28.471919] 
[   28.479088] Allocated by task 313:
[   28.479257]  kasan_save_stack+0x45/0x70
[   28.479429]  kasan_save_track+0x18/0x40
[   28.479556]  kasan_save_alloc_info+0x3b/0x50
[   28.479695]  __kasan_kmalloc+0xb7/0xc0
[   28.479845]  __kmalloc_cache_noprof+0x189/0x420
[   28.480060]  kasan_atomics+0x95/0x310
[   28.480260]  kunit_try_run_case+0x1a5/0x480
[   28.480485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.480680]  kthread+0x337/0x6f0
[   28.480842]  ret_from_fork+0x116/0x1d0
[   28.481020]  ret_from_fork_asm+0x1a/0x30
[   28.481207] 
[   28.481304] The buggy address belongs to the object at ffff8881053c7b80
[   28.481304]  which belongs to the cache kmalloc-64 of size 64
[   28.481788] The buggy address is located 0 bytes to the right of
[   28.481788]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.482282] 
[   28.482379] The buggy address belongs to the physical page:
[   28.482596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.482929] flags: 0x200000000000000(node=0|zone=2)
[   28.483155] page_type: f5(slab)
[   28.483315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.483615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.483970] page dumped because: kasan: bad access detected
[   28.484247] 
[   28.484347] Memory state around the buggy address:
[   28.484553]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.484894]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.485201] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.485514]                                      ^
[   28.485724]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.486024]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.486260] ==================================================================
[   28.150398] ==================================================================
[   28.151504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   28.151766] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.152074] 
[   28.152164] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.152215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.152228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.152252] Call Trace:
[   28.152273]  <TASK>
[   28.152292]  dump_stack_lvl+0x73/0xb0
[   28.152338]  print_report+0xd1/0x640
[   28.152381]  ? __virt_addr_valid+0x1db/0x2d0
[   28.152405]  ? kasan_atomics_helper+0x1d7a/0x5450
[   28.152427]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.152453]  ? kasan_atomics_helper+0x1d7a/0x5450
[   28.152475]  kasan_report+0x141/0x180
[   28.152498]  ? kasan_atomics_helper+0x1d7a/0x5450
[   28.152524]  kasan_check_range+0x10c/0x1c0
[   28.152548]  __kasan_check_write+0x18/0x20
[   28.152572]  kasan_atomics_helper+0x1d7a/0x5450
[   28.152595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.152617]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.152642]  ? kasan_atomics+0x152/0x310
[   28.152668]  kasan_atomics+0x1dc/0x310
[   28.152691]  ? __pfx_kasan_atomics+0x10/0x10
[   28.152715]  ? __pfx_read_tsc+0x10/0x10
[   28.152737]  ? ktime_get_ts64+0x86/0x230
[   28.152763]  kunit_try_run_case+0x1a5/0x480
[   28.152788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.152811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.152847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.152921]  ? __kthread_parkme+0x82/0x180
[   28.152968]  ? preempt_count_sub+0x50/0x80
[   28.152992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.153016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.153040]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.153064]  kthread+0x337/0x6f0
[   28.153084]  ? trace_preempt_on+0x20/0xc0
[   28.153108]  ? __pfx_kthread+0x10/0x10
[   28.153129]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.153160]  ? calculate_sigpending+0x7b/0xa0
[   28.153185]  ? __pfx_kthread+0x10/0x10
[   28.153207]  ret_from_fork+0x116/0x1d0
[   28.153227]  ? __pfx_kthread+0x10/0x10
[   28.153248]  ret_from_fork_asm+0x1a/0x30
[   28.153280]  </TASK>
[   28.153293] 
[   28.168043] Allocated by task 313:
[   28.168293]  kasan_save_stack+0x45/0x70
[   28.168660]  kasan_save_track+0x18/0x40
[   28.169100]  kasan_save_alloc_info+0x3b/0x50
[   28.169662]  __kasan_kmalloc+0xb7/0xc0
[   28.170061]  __kmalloc_cache_noprof+0x189/0x420
[   28.170547]  kasan_atomics+0x95/0x310
[   28.170826]  kunit_try_run_case+0x1a5/0x480
[   28.171332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.171592]  kthread+0x337/0x6f0
[   28.171941]  ret_from_fork+0x116/0x1d0
[   28.172408]  ret_from_fork_asm+0x1a/0x30
[   28.172587] 
[   28.172658] The buggy address belongs to the object at ffff8881053c7b80
[   28.172658]  which belongs to the cache kmalloc-64 of size 64
[   28.173606] The buggy address is located 0 bytes to the right of
[   28.173606]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.174634] 
[   28.174818] The buggy address belongs to the physical page:
[   28.175438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.176122] flags: 0x200000000000000(node=0|zone=2)
[   28.176631] page_type: f5(slab)
[   28.176913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.177579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.177803] page dumped because: kasan: bad access detected
[   28.177970] 
[   28.178127] Memory state around the buggy address:
[   28.178596]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.179591]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.180455] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.181237]                                      ^
[   28.181677]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.182258]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.182972] ==================================================================
[   27.617442] ==================================================================
[   27.618062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   27.618407] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.618962] 
[   27.619044] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.619092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.619105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.619129] Call Trace:
[   27.619145]  <TASK>
[   27.619161]  dump_stack_lvl+0x73/0xb0
[   27.619191]  print_report+0xd1/0x640
[   27.619214]  ? __virt_addr_valid+0x1db/0x2d0
[   27.619237]  ? kasan_atomics_helper+0x1148/0x5450
[   27.619258]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.619285]  ? kasan_atomics_helper+0x1148/0x5450
[   27.619319]  kasan_report+0x141/0x180
[   27.619341]  ? kasan_atomics_helper+0x1148/0x5450
[   27.619367]  kasan_check_range+0x10c/0x1c0
[   27.619391]  __kasan_check_write+0x18/0x20
[   27.619415]  kasan_atomics_helper+0x1148/0x5450
[   27.619438]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.619461]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.619487]  ? kasan_atomics+0x152/0x310
[   27.619513]  kasan_atomics+0x1dc/0x310
[   27.619536]  ? __pfx_kasan_atomics+0x10/0x10
[   27.619560]  ? __pfx_read_tsc+0x10/0x10
[   27.619582]  ? ktime_get_ts64+0x86/0x230
[   27.619608]  kunit_try_run_case+0x1a5/0x480
[   27.619632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.619655]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.619690]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.619724]  ? __kthread_parkme+0x82/0x180
[   27.619745]  ? preempt_count_sub+0x50/0x80
[   27.619769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.619793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.619816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.619841]  kthread+0x337/0x6f0
[   27.619861]  ? trace_preempt_on+0x20/0xc0
[   27.619885]  ? __pfx_kthread+0x10/0x10
[   27.619906]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.619936]  ? calculate_sigpending+0x7b/0xa0
[   27.619961]  ? __pfx_kthread+0x10/0x10
[   27.619983]  ret_from_fork+0x116/0x1d0
[   27.620037]  ? __pfx_kthread+0x10/0x10
[   27.620059]  ret_from_fork_asm+0x1a/0x30
[   27.620090]  </TASK>
[   27.620102] 
[   27.628555] Allocated by task 313:
[   27.628732]  kasan_save_stack+0x45/0x70
[   27.628946]  kasan_save_track+0x18/0x40
[   27.629139]  kasan_save_alloc_info+0x3b/0x50
[   27.629353]  __kasan_kmalloc+0xb7/0xc0
[   27.629536]  __kmalloc_cache_noprof+0x189/0x420
[   27.629750]  kasan_atomics+0x95/0x310
[   27.629931]  kunit_try_run_case+0x1a5/0x480
[   27.630131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.630366]  kthread+0x337/0x6f0
[   27.630482]  ret_from_fork+0x116/0x1d0
[   27.630610]  ret_from_fork_asm+0x1a/0x30
[   27.630827] 
[   27.630921] The buggy address belongs to the object at ffff8881053c7b80
[   27.630921]  which belongs to the cache kmalloc-64 of size 64
[   27.631634] The buggy address is located 0 bytes to the right of
[   27.631634]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.632138] 
[   27.632232] The buggy address belongs to the physical page:
[   27.632423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.632779] flags: 0x200000000000000(node=0|zone=2)
[   27.633052] page_type: f5(slab)
[   27.633198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.633545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.633854] page dumped because: kasan: bad access detected
[   27.634044] 
[   27.634133] Memory state around the buggy address:
[   27.634342]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.634613]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.634879] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.635183]                                      ^
[   27.635412]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.635656]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.635865] ==================================================================
[   28.299063] ==================================================================
[   28.299763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   28.300446] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.301087] 
[   28.301270] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.301334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.301360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.301383] Call Trace:
[   28.301400]  <TASK>
[   28.301417]  dump_stack_lvl+0x73/0xb0
[   28.301449]  print_report+0xd1/0x640
[   28.301472]  ? __virt_addr_valid+0x1db/0x2d0
[   28.301495]  ? kasan_atomics_helper+0x2006/0x5450
[   28.301516]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.301542]  ? kasan_atomics_helper+0x2006/0x5450
[   28.301573]  kasan_report+0x141/0x180
[   28.301596]  ? kasan_atomics_helper+0x2006/0x5450
[   28.301622]  kasan_check_range+0x10c/0x1c0
[   28.301646]  __kasan_check_write+0x18/0x20
[   28.301670]  kasan_atomics_helper+0x2006/0x5450
[   28.301693]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.301714]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.301739]  ? kasan_atomics+0x152/0x310
[   28.301765]  kasan_atomics+0x1dc/0x310
[   28.301787]  ? __pfx_kasan_atomics+0x10/0x10
[   28.301812]  ? __pfx_read_tsc+0x10/0x10
[   28.301862]  ? ktime_get_ts64+0x86/0x230
[   28.301904]  kunit_try_run_case+0x1a5/0x480
[   28.301930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.301953]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.301990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.302025]  ? __kthread_parkme+0x82/0x180
[   28.302045]  ? preempt_count_sub+0x50/0x80
[   28.302070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.302094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.302118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.302142]  kthread+0x337/0x6f0
[   28.302161]  ? trace_preempt_on+0x20/0xc0
[   28.302185]  ? __pfx_kthread+0x10/0x10
[   28.302206]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.302236]  ? calculate_sigpending+0x7b/0xa0
[   28.302261]  ? __pfx_kthread+0x10/0x10
[   28.302282]  ret_from_fork+0x116/0x1d0
[   28.302301]  ? __pfx_kthread+0x10/0x10
[   28.302321]  ret_from_fork_asm+0x1a/0x30
[   28.302362]  </TASK>
[   28.302373] 
[   28.315572] Allocated by task 313:
[   28.315948]  kasan_save_stack+0x45/0x70
[   28.316320]  kasan_save_track+0x18/0x40
[   28.316706]  kasan_save_alloc_info+0x3b/0x50
[   28.317139]  __kasan_kmalloc+0xb7/0xc0
[   28.317638]  __kmalloc_cache_noprof+0x189/0x420
[   28.317846]  kasan_atomics+0x95/0x310
[   28.317980]  kunit_try_run_case+0x1a5/0x480
[   28.318353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.318851]  kthread+0x337/0x6f0
[   28.319186]  ret_from_fork+0x116/0x1d0
[   28.319577]  ret_from_fork_asm+0x1a/0x30
[   28.319978] 
[   28.320134] The buggy address belongs to the object at ffff8881053c7b80
[   28.320134]  which belongs to the cache kmalloc-64 of size 64
[   28.321246] The buggy address is located 0 bytes to the right of
[   28.321246]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.322205] 
[   28.322369] The buggy address belongs to the physical page:
[   28.322845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.323141] flags: 0x200000000000000(node=0|zone=2)
[   28.323562] page_type: f5(slab)
[   28.323858] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.324622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.325297] page dumped because: kasan: bad access detected
[   28.325496] 
[   28.325560] Memory state around the buggy address:
[   28.325789]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.326277]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.326519] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.326731]                                      ^
[   28.326880]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.327105]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.327364] ==================================================================
[   27.429460] ==================================================================
[   27.429692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   27.430217] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.430573] 
[   27.430764] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.430841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.430854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.430877] Call Trace:
[   27.430896]  <TASK>
[   27.430913]  dump_stack_lvl+0x73/0xb0
[   27.430946]  print_report+0xd1/0x640
[   27.430970]  ? __virt_addr_valid+0x1db/0x2d0
[   27.430995]  ? kasan_atomics_helper+0xde0/0x5450
[   27.431016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.431043]  ? kasan_atomics_helper+0xde0/0x5450
[   27.431065]  kasan_report+0x141/0x180
[   27.431087]  ? kasan_atomics_helper+0xde0/0x5450
[   27.431114]  kasan_check_range+0x10c/0x1c0
[   27.431138]  __kasan_check_write+0x18/0x20
[   27.431162]  kasan_atomics_helper+0xde0/0x5450
[   27.431389]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.431424]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.431450]  ? kasan_atomics+0x152/0x310
[   27.431477]  kasan_atomics+0x1dc/0x310
[   27.431500]  ? __pfx_kasan_atomics+0x10/0x10
[   27.431569]  ? __pfx_read_tsc+0x10/0x10
[   27.431593]  ? ktime_get_ts64+0x86/0x230
[   27.431619]  kunit_try_run_case+0x1a5/0x480
[   27.431644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.431667]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.431735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.431768]  ? __kthread_parkme+0x82/0x180
[   27.431789]  ? preempt_count_sub+0x50/0x80
[   27.431927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.431953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.431977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.432001]  kthread+0x337/0x6f0
[   27.432021]  ? trace_preempt_on+0x20/0xc0
[   27.432045]  ? __pfx_kthread+0x10/0x10
[   27.432097]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.432129]  ? calculate_sigpending+0x7b/0xa0
[   27.432154]  ? __pfx_kthread+0x10/0x10
[   27.432176]  ret_from_fork+0x116/0x1d0
[   27.432196]  ? __pfx_kthread+0x10/0x10
[   27.432245]  ret_from_fork_asm+0x1a/0x30
[   27.432278]  </TASK>
[   27.432289] 
[   27.441387] Allocated by task 313:
[   27.441608]  kasan_save_stack+0x45/0x70
[   27.441927]  kasan_save_track+0x18/0x40
[   27.442195]  kasan_save_alloc_info+0x3b/0x50
[   27.442416]  __kasan_kmalloc+0xb7/0xc0
[   27.442560]  __kmalloc_cache_noprof+0x189/0x420
[   27.442710]  kasan_atomics+0x95/0x310
[   27.442833]  kunit_try_run_case+0x1a5/0x480
[   27.443029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.443284]  kthread+0x337/0x6f0
[   27.443683]  ret_from_fork+0x116/0x1d0
[   27.443881]  ret_from_fork_asm+0x1a/0x30
[   27.444085] 
[   27.444174] The buggy address belongs to the object at ffff8881053c7b80
[   27.444174]  which belongs to the cache kmalloc-64 of size 64
[   27.444558] The buggy address is located 0 bytes to the right of
[   27.444558]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.444935] 
[   27.445022] The buggy address belongs to the physical page:
[   27.445261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.445997] flags: 0x200000000000000(node=0|zone=2)
[   27.446285] page_type: f5(slab)
[   27.446418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.446679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.447279] page dumped because: kasan: bad access detected
[   27.447757] 
[   27.447971] Memory state around the buggy address:
[   27.448247]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.448891]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.449180] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.449478]                                      ^
[   27.449676]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.449957]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.450229] ==================================================================
[   27.653773] ==================================================================
[   27.654102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   27.654419] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.654667] 
[   27.654743] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.654789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.654802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.654824] Call Trace:
[   27.654839]  <TASK>
[   27.654853]  dump_stack_lvl+0x73/0xb0
[   27.654882]  print_report+0xd1/0x640
[   27.654904]  ? __virt_addr_valid+0x1db/0x2d0
[   27.654927]  ? kasan_atomics_helper+0x1217/0x5450
[   27.654947]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.654973]  ? kasan_atomics_helper+0x1217/0x5450
[   27.654994]  kasan_report+0x141/0x180
[   27.655016]  ? kasan_atomics_helper+0x1217/0x5450
[   27.655041]  kasan_check_range+0x10c/0x1c0
[   27.655064]  __kasan_check_write+0x18/0x20
[   27.655088]  kasan_atomics_helper+0x1217/0x5450
[   27.655110]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.655131]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.655155]  ? kasan_atomics+0x152/0x310
[   27.655181]  kasan_atomics+0x1dc/0x310
[   27.655203]  ? __pfx_kasan_atomics+0x10/0x10
[   27.655226]  ? __pfx_read_tsc+0x10/0x10
[   27.655248]  ? ktime_get_ts64+0x86/0x230
[   27.655272]  kunit_try_run_case+0x1a5/0x480
[   27.655296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.655350]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.655388]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.655422]  ? __kthread_parkme+0x82/0x180
[   27.655443]  ? preempt_count_sub+0x50/0x80
[   27.655466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.655490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.655514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.655538]  kthread+0x337/0x6f0
[   27.655558]  ? trace_preempt_on+0x20/0xc0
[   27.655581]  ? __pfx_kthread+0x10/0x10
[   27.655602]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.655633]  ? calculate_sigpending+0x7b/0xa0
[   27.655658]  ? __pfx_kthread+0x10/0x10
[   27.655680]  ret_from_fork+0x116/0x1d0
[   27.655699]  ? __pfx_kthread+0x10/0x10
[   27.655720]  ret_from_fork_asm+0x1a/0x30
[   27.655752]  </TASK>
[   27.655762] 
[   27.668264] Allocated by task 313:
[   27.668413]  kasan_save_stack+0x45/0x70
[   27.669334]  kasan_save_track+0x18/0x40
[   27.669618]  kasan_save_alloc_info+0x3b/0x50
[   27.670262]  __kasan_kmalloc+0xb7/0xc0
[   27.670534]  __kmalloc_cache_noprof+0x189/0x420
[   27.671006]  kasan_atomics+0x95/0x310
[   27.671406]  kunit_try_run_case+0x1a5/0x480
[   27.671732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.672197]  kthread+0x337/0x6f0
[   27.672500]  ret_from_fork+0x116/0x1d0
[   27.672963]  ret_from_fork_asm+0x1a/0x30
[   27.673365] 
[   27.673455] The buggy address belongs to the object at ffff8881053c7b80
[   27.673455]  which belongs to the cache kmalloc-64 of size 64
[   27.674583] The buggy address is located 0 bytes to the right of
[   27.674583]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.675540] 
[   27.675776] The buggy address belongs to the physical page:
[   27.676390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.677125] flags: 0x200000000000000(node=0|zone=2)
[   27.677515] page_type: f5(slab)
[   27.677674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.678492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.678956] page dumped because: kasan: bad access detected
[   27.679406] 
[   27.679497] Memory state around the buggy address:
[   27.679982]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.680588]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.681080] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.681527]                                      ^
[   27.681743]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.682475]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.683001] ==================================================================
[   27.784187] ==================================================================
[   27.784528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   27.784851] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.785120] 
[   27.785200] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.785248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.785262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.785284] Call Trace:
[   27.785303]  <TASK>
[   27.785329]  dump_stack_lvl+0x73/0xb0
[   27.785359]  print_report+0xd1/0x640
[   27.785383]  ? __virt_addr_valid+0x1db/0x2d0
[   27.785406]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.785426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.785453]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.785475]  kasan_report+0x141/0x180
[   27.785497]  ? kasan_atomics_helper+0x4eae/0x5450
[   27.785523]  __asan_report_load8_noabort+0x18/0x20
[   27.785548]  kasan_atomics_helper+0x4eae/0x5450
[   27.785570]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.785591]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.785616]  ? kasan_atomics+0x152/0x310
[   27.785642]  kasan_atomics+0x1dc/0x310
[   27.785664]  ? __pfx_kasan_atomics+0x10/0x10
[   27.785688]  ? __pfx_read_tsc+0x10/0x10
[   27.785710]  ? ktime_get_ts64+0x86/0x230
[   27.785735]  kunit_try_run_case+0x1a5/0x480
[   27.785777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.785809]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.785845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.785906]  ? __kthread_parkme+0x82/0x180
[   27.785930]  ? preempt_count_sub+0x50/0x80
[   27.785955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.785980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.786003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.786046]  kthread+0x337/0x6f0
[   27.786067]  ? trace_preempt_on+0x20/0xc0
[   27.786102]  ? __pfx_kthread+0x10/0x10
[   27.786123]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.786154]  ? calculate_sigpending+0x7b/0xa0
[   27.786196]  ? __pfx_kthread+0x10/0x10
[   27.786217]  ret_from_fork+0x116/0x1d0
[   27.786249]  ? __pfx_kthread+0x10/0x10
[   27.786270]  ret_from_fork_asm+0x1a/0x30
[   27.786302]  </TASK>
[   27.786342] 
[   27.795687] Allocated by task 313:
[   27.797131]  kasan_save_stack+0x45/0x70
[   27.797330]  kasan_save_track+0x18/0x40
[   27.797466]  kasan_save_alloc_info+0x3b/0x50
[   27.797611]  __kasan_kmalloc+0xb7/0xc0
[   27.797739]  __kmalloc_cache_noprof+0x189/0x420
[   27.798108]  kasan_atomics+0x95/0x310
[   27.798429]  kunit_try_run_case+0x1a5/0x480
[   27.798790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.799030]  kthread+0x337/0x6f0
[   27.799235]  ret_from_fork+0x116/0x1d0
[   27.799912]  ret_from_fork_asm+0x1a/0x30
[   27.800348] 
[   27.800610] The buggy address belongs to the object at ffff8881053c7b80
[   27.800610]  which belongs to the cache kmalloc-64 of size 64
[   27.801530] The buggy address is located 0 bytes to the right of
[   27.801530]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.802440] 
[   27.802684] The buggy address belongs to the physical page:
[   27.802931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.803481] flags: 0x200000000000000(node=0|zone=2)
[   27.803931] page_type: f5(slab)
[   27.804286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.804620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.805121] page dumped because: kasan: bad access detected
[   27.805534] 
[   27.805632] Memory state around the buggy address:
[   27.806003]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.806605]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.807027] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.807351]                                      ^
[   27.807565]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.808071]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.808568] ==================================================================
[   27.321621] ==================================================================
[   27.321954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   27.322456] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.322757] 
[   27.323263] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.323331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.323344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.323368] Call Trace:
[   27.323386]  <TASK>
[   27.323403]  dump_stack_lvl+0x73/0xb0
[   27.323437]  print_report+0xd1/0x640
[   27.323459]  ? __virt_addr_valid+0x1db/0x2d0
[   27.323641]  ? kasan_atomics_helper+0xac7/0x5450
[   27.323666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.323692]  ? kasan_atomics_helper+0xac7/0x5450
[   27.323713]  kasan_report+0x141/0x180
[   27.323735]  ? kasan_atomics_helper+0xac7/0x5450
[   27.323760]  kasan_check_range+0x10c/0x1c0
[   27.323782]  __kasan_check_write+0x18/0x20
[   27.323865]  kasan_atomics_helper+0xac7/0x5450
[   27.323887]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.323908]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.323932]  ? kasan_atomics+0x152/0x310
[   27.323958]  kasan_atomics+0x1dc/0x310
[   27.323979]  ? __pfx_kasan_atomics+0x10/0x10
[   27.324002]  ? __pfx_read_tsc+0x10/0x10
[   27.324024]  ? ktime_get_ts64+0x86/0x230
[   27.324049]  kunit_try_run_case+0x1a5/0x480
[   27.324073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.324094]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.324128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.324161]  ? __kthread_parkme+0x82/0x180
[   27.324181]  ? preempt_count_sub+0x50/0x80
[   27.324204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.324227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.324249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.324272]  kthread+0x337/0x6f0
[   27.324306]  ? trace_preempt_on+0x20/0xc0
[   27.324329]  ? __pfx_kthread+0x10/0x10
[   27.324348]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.324378]  ? calculate_sigpending+0x7b/0xa0
[   27.324402]  ? __pfx_kthread+0x10/0x10
[   27.324422]  ret_from_fork+0x116/0x1d0
[   27.324441]  ? __pfx_kthread+0x10/0x10
[   27.324461]  ret_from_fork_asm+0x1a/0x30
[   27.324491]  </TASK>
[   27.324501] 
[   27.335499] Allocated by task 313:
[   27.335691]  kasan_save_stack+0x45/0x70
[   27.335839]  kasan_save_track+0x18/0x40
[   27.335967]  kasan_save_alloc_info+0x3b/0x50
[   27.336338]  __kasan_kmalloc+0xb7/0xc0
[   27.336665]  __kmalloc_cache_noprof+0x189/0x420
[   27.336879]  kasan_atomics+0x95/0x310
[   27.337121]  kunit_try_run_case+0x1a5/0x480
[   27.337324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.337560]  kthread+0x337/0x6f0
[   27.337676]  ret_from_fork+0x116/0x1d0
[   27.337808]  ret_from_fork_asm+0x1a/0x30
[   27.337999] 
[   27.338156] The buggy address belongs to the object at ffff8881053c7b80
[   27.338156]  which belongs to the cache kmalloc-64 of size 64
[   27.338688] The buggy address is located 0 bytes to the right of
[   27.338688]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.339314] 
[   27.339380] The buggy address belongs to the physical page:
[   27.339544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.340073] flags: 0x200000000000000(node=0|zone=2)
[   27.340336] page_type: f5(slab)
[   27.340495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.340856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.341100] page dumped because: kasan: bad access detected
[   27.341363] 
[   27.341451] Memory state around the buggy address:
[   27.341670]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.342021]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.342330] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.342612]                                      ^
[   27.342784]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.343064]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.343270] ==================================================================
[   27.051937] ==================================================================
[   27.052274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   27.053438] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.053788] 
[   27.054097] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.054163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.054175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.054197] Call Trace:
[   27.054220]  <TASK>
[   27.054235]  dump_stack_lvl+0x73/0xb0
[   27.054267]  print_report+0xd1/0x640
[   27.054298]  ? __virt_addr_valid+0x1db/0x2d0
[   27.054322]  ? kasan_atomics_helper+0x4b54/0x5450
[   27.054342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.054366]  ? kasan_atomics_helper+0x4b54/0x5450
[   27.054386]  kasan_report+0x141/0x180
[   27.054408]  ? kasan_atomics_helper+0x4b54/0x5450
[   27.054432]  __asan_report_load4_noabort+0x18/0x20
[   27.054456]  kasan_atomics_helper+0x4b54/0x5450
[   27.054477]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.054498]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.054522]  ? kasan_atomics+0x152/0x310
[   27.054547]  kasan_atomics+0x1dc/0x310
[   27.054568]  ? __pfx_kasan_atomics+0x10/0x10
[   27.054591]  ? __pfx_read_tsc+0x10/0x10
[   27.054612]  ? ktime_get_ts64+0x86/0x230
[   27.054636]  kunit_try_run_case+0x1a5/0x480
[   27.054665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.054686]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.054721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.054763]  ? __kthread_parkme+0x82/0x180
[   27.054783]  ? preempt_count_sub+0x50/0x80
[   27.054831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.054854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.054876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.054898]  kthread+0x337/0x6f0
[   27.054917]  ? trace_preempt_on+0x20/0xc0
[   27.054941]  ? __pfx_kthread+0x10/0x10
[   27.054960]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.054990]  ? calculate_sigpending+0x7b/0xa0
[   27.055014]  ? __pfx_kthread+0x10/0x10
[   27.055034]  ret_from_fork+0x116/0x1d0
[   27.055052]  ? __pfx_kthread+0x10/0x10
[   27.055072]  ret_from_fork_asm+0x1a/0x30
[   27.055101]  </TASK>
[   27.055111] 
[   27.063581] Allocated by task 313:
[   27.063795]  kasan_save_stack+0x45/0x70
[   27.063996]  kasan_save_track+0x18/0x40
[   27.064263]  kasan_save_alloc_info+0x3b/0x50
[   27.064477]  __kasan_kmalloc+0xb7/0xc0
[   27.064674]  __kmalloc_cache_noprof+0x189/0x420
[   27.064919]  kasan_atomics+0x95/0x310
[   27.065101]  kunit_try_run_case+0x1a5/0x480
[   27.065462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.065690]  kthread+0x337/0x6f0
[   27.066032]  ret_from_fork+0x116/0x1d0
[   27.066231]  ret_from_fork_asm+0x1a/0x30
[   27.066423] 
[   27.066510] The buggy address belongs to the object at ffff8881053c7b80
[   27.066510]  which belongs to the cache kmalloc-64 of size 64
[   27.066995] The buggy address is located 0 bytes to the right of
[   27.066995]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.067524] 
[   27.067591] The buggy address belongs to the physical page:
[   27.067755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.067986] flags: 0x200000000000000(node=0|zone=2)
[   27.068139] page_type: f5(slab)
[   27.068252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.068921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.069407] page dumped because: kasan: bad access detected
[   27.069651] 
[   27.069734] Memory state around the buggy address:
[   27.070130]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.070402]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.070613] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.070884]                                      ^
[   27.071097]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.071653]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.071952] ==================================================================
[   27.136256] ==================================================================
[   27.136597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   27.137118] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.137390] 
[   27.137481] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.137528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.137539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.137562] Call Trace:
[   27.137579]  <TASK>
[   27.137593]  dump_stack_lvl+0x73/0xb0
[   27.137625]  print_report+0xd1/0x640
[   27.137659]  ? __virt_addr_valid+0x1db/0x2d0
[   27.137682]  ? kasan_atomics_helper+0x5fe/0x5450
[   27.137702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.137739]  ? kasan_atomics_helper+0x5fe/0x5450
[   27.137760]  kasan_report+0x141/0x180
[   27.137781]  ? kasan_atomics_helper+0x5fe/0x5450
[   27.137865]  kasan_check_range+0x10c/0x1c0
[   27.137890]  __kasan_check_write+0x18/0x20
[   27.137913]  kasan_atomics_helper+0x5fe/0x5450
[   27.137934]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.137955]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.137979]  ? kasan_atomics+0x152/0x310
[   27.138004]  kasan_atomics+0x1dc/0x310
[   27.138026]  ? __pfx_kasan_atomics+0x10/0x10
[   27.138049]  ? __pfx_read_tsc+0x10/0x10
[   27.138070]  ? ktime_get_ts64+0x86/0x230
[   27.138094]  kunit_try_run_case+0x1a5/0x480
[   27.138118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.138140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.138174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.138207]  ? __kthread_parkme+0x82/0x180
[   27.138226]  ? preempt_count_sub+0x50/0x80
[   27.138249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.138272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.138307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.138329]  kthread+0x337/0x6f0
[   27.138359]  ? trace_preempt_on+0x20/0xc0
[   27.138381]  ? __pfx_kthread+0x10/0x10
[   27.138401]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.138441]  ? calculate_sigpending+0x7b/0xa0
[   27.138466]  ? __pfx_kthread+0x10/0x10
[   27.138486]  ret_from_fork+0x116/0x1d0
[   27.138504]  ? __pfx_kthread+0x10/0x10
[   27.138524]  ret_from_fork_asm+0x1a/0x30
[   27.138554]  </TASK>
[   27.138565] 
[   27.146975] Allocated by task 313:
[   27.147290]  kasan_save_stack+0x45/0x70
[   27.147511]  kasan_save_track+0x18/0x40
[   27.147713]  kasan_save_alloc_info+0x3b/0x50
[   27.148064]  __kasan_kmalloc+0xb7/0xc0
[   27.148300]  __kmalloc_cache_noprof+0x189/0x420
[   27.148554]  kasan_atomics+0x95/0x310
[   27.148755]  kunit_try_run_case+0x1a5/0x480
[   27.149120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.149404]  kthread+0x337/0x6f0
[   27.149555]  ret_from_fork+0x116/0x1d0
[   27.149727]  ret_from_fork_asm+0x1a/0x30
[   27.149940] 
[   27.150025] The buggy address belongs to the object at ffff8881053c7b80
[   27.150025]  which belongs to the cache kmalloc-64 of size 64
[   27.150630] The buggy address is located 0 bytes to the right of
[   27.150630]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.151256] 
[   27.151362] The buggy address belongs to the physical page:
[   27.151599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.152002] flags: 0x200000000000000(node=0|zone=2)
[   27.152237] page_type: f5(slab)
[   27.152392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.152697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.153213] page dumped because: kasan: bad access detected
[   27.153479] 
[   27.153568] Memory state around the buggy address:
[   27.153773]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.154143]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.154467] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.154684]                                      ^
[   27.154834]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.155041]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.155246] ==================================================================
[   27.247039] ==================================================================
[   27.247581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   27.248304] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.248744] 
[   27.249109] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.249164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.249241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.249265] Call Trace:
[   27.249279]  <TASK>
[   27.249308]  dump_stack_lvl+0x73/0xb0
[   27.249344]  print_report+0xd1/0x640
[   27.249367]  ? __virt_addr_valid+0x1db/0x2d0
[   27.249390]  ? kasan_atomics_helper+0x8f9/0x5450
[   27.249410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.249435]  ? kasan_atomics_helper+0x8f9/0x5450
[   27.249455]  kasan_report+0x141/0x180
[   27.249476]  ? kasan_atomics_helper+0x8f9/0x5450
[   27.249501]  kasan_check_range+0x10c/0x1c0
[   27.249525]  __kasan_check_write+0x18/0x20
[   27.249551]  kasan_atomics_helper+0x8f9/0x5450
[   27.249573]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.249594]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.249618]  ? kasan_atomics+0x152/0x310
[   27.249644]  kasan_atomics+0x1dc/0x310
[   27.249666]  ? __pfx_kasan_atomics+0x10/0x10
[   27.249689]  ? __pfx_read_tsc+0x10/0x10
[   27.249710]  ? ktime_get_ts64+0x86/0x230
[   27.249735]  kunit_try_run_case+0x1a5/0x480
[   27.249759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.249780]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.249815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.249848]  ? __kthread_parkme+0x82/0x180
[   27.249868]  ? preempt_count_sub+0x50/0x80
[   27.249890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.249912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.249935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.249957]  kthread+0x337/0x6f0
[   27.249976]  ? trace_preempt_on+0x20/0xc0
[   27.249999]  ? __pfx_kthread+0x10/0x10
[   27.250018]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.250063]  ? calculate_sigpending+0x7b/0xa0
[   27.250088]  ? __pfx_kthread+0x10/0x10
[   27.250109]  ret_from_fork+0x116/0x1d0
[   27.250127]  ? __pfx_kthread+0x10/0x10
[   27.250147]  ret_from_fork_asm+0x1a/0x30
[   27.250177]  </TASK>
[   27.250187] 
[   27.260667] Allocated by task 313:
[   27.260992]  kasan_save_stack+0x45/0x70
[   27.261154]  kasan_save_track+0x18/0x40
[   27.261532]  kasan_save_alloc_info+0x3b/0x50
[   27.261732]  __kasan_kmalloc+0xb7/0xc0
[   27.262006]  __kmalloc_cache_noprof+0x189/0x420
[   27.262442]  kasan_atomics+0x95/0x310
[   27.262595]  kunit_try_run_case+0x1a5/0x480
[   27.262785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.263442]  kthread+0x337/0x6f0
[   27.263582]  ret_from_fork+0x116/0x1d0
[   27.264057]  ret_from_fork_asm+0x1a/0x30
[   27.264214] 
[   27.264323] The buggy address belongs to the object at ffff8881053c7b80
[   27.264323]  which belongs to the cache kmalloc-64 of size 64
[   27.264903] The buggy address is located 0 bytes to the right of
[   27.264903]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.265661] 
[   27.265755] The buggy address belongs to the physical page:
[   27.266264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.266628] flags: 0x200000000000000(node=0|zone=2)
[   27.267139] page_type: f5(slab)
[   27.267314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.267633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.267955] page dumped because: kasan: bad access detected
[   27.268172] 
[   27.268260] Memory state around the buggy address:
[   27.268893]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.269206]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.269509] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.269796]                                      ^
[   27.270371]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.270635]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271170] ==================================================================
[   28.027265] ==================================================================
[   28.027606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   28.027935] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.028308] 
[   28.028438] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.028486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.028499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.028522] Call Trace:
[   28.028541]  <TASK>
[   28.028556]  dump_stack_lvl+0x73/0xb0
[   28.028586]  print_report+0xd1/0x640
[   28.028609]  ? __virt_addr_valid+0x1db/0x2d0
[   28.028634]  ? kasan_atomics_helper+0x19e3/0x5450
[   28.028655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.028682]  ? kasan_atomics_helper+0x19e3/0x5450
[   28.028704]  kasan_report+0x141/0x180
[   28.028726]  ? kasan_atomics_helper+0x19e3/0x5450
[   28.028752]  kasan_check_range+0x10c/0x1c0
[   28.028777]  __kasan_check_write+0x18/0x20
[   28.028801]  kasan_atomics_helper+0x19e3/0x5450
[   28.028824]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.028847]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.028873]  ? kasan_atomics+0x152/0x310
[   28.028899]  kasan_atomics+0x1dc/0x310
[   28.028922]  ? __pfx_kasan_atomics+0x10/0x10
[   28.028946]  ? __pfx_read_tsc+0x10/0x10
[   28.028968]  ? ktime_get_ts64+0x86/0x230
[   28.028994]  kunit_try_run_case+0x1a5/0x480
[   28.029018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.029041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.029077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.029111]  ? __kthread_parkme+0x82/0x180
[   28.029132]  ? preempt_count_sub+0x50/0x80
[   28.029156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.029180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.029204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.029227]  kthread+0x337/0x6f0
[   28.029248]  ? trace_preempt_on+0x20/0xc0
[   28.029271]  ? __pfx_kthread+0x10/0x10
[   28.029293]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.029333]  ? calculate_sigpending+0x7b/0xa0
[   28.029357]  ? __pfx_kthread+0x10/0x10
[   28.029379]  ret_from_fork+0x116/0x1d0
[   28.029399]  ? __pfx_kthread+0x10/0x10
[   28.029420]  ret_from_fork_asm+0x1a/0x30
[   28.029452]  </TASK>
[   28.029463] 
[   28.037738] Allocated by task 313:
[   28.038074]  kasan_save_stack+0x45/0x70
[   28.038272]  kasan_save_track+0x18/0x40
[   28.038475]  kasan_save_alloc_info+0x3b/0x50
[   28.038683]  __kasan_kmalloc+0xb7/0xc0
[   28.038838]  __kmalloc_cache_noprof+0x189/0x420
[   28.039025]  kasan_atomics+0x95/0x310
[   28.039178]  kunit_try_run_case+0x1a5/0x480
[   28.039604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.039924]  kthread+0x337/0x6f0
[   28.040085]  ret_from_fork+0x116/0x1d0
[   28.040249]  ret_from_fork_asm+0x1a/0x30
[   28.040463] 
[   28.040559] The buggy address belongs to the object at ffff8881053c7b80
[   28.040559]  which belongs to the cache kmalloc-64 of size 64
[   28.041239] The buggy address is located 0 bytes to the right of
[   28.041239]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.041731] 
[   28.041817] The buggy address belongs to the physical page:
[   28.042052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.042384] flags: 0x200000000000000(node=0|zone=2)
[   28.042614] page_type: f5(slab)
[   28.042744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.043010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.043644] page dumped because: kasan: bad access detected
[   28.043997] 
[   28.044074] Memory state around the buggy address:
[   28.044266]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.044573]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.044820] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.045027]                                      ^
[   28.045178]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.045399]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.045608] ==================================================================
[   27.175733] ==================================================================
[   27.175954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   27.176236] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.176569] 
[   27.176802] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.176854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.176867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.176889] Call Trace:
[   27.176906]  <TASK>
[   27.176921]  dump_stack_lvl+0x73/0xb0
[   27.176952]  print_report+0xd1/0x640
[   27.176974]  ? __virt_addr_valid+0x1db/0x2d0
[   27.176997]  ? kasan_atomics_helper+0x72f/0x5450
[   27.177017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.177042]  ? kasan_atomics_helper+0x72f/0x5450
[   27.177063]  kasan_report+0x141/0x180
[   27.177084]  ? kasan_atomics_helper+0x72f/0x5450
[   27.177110]  kasan_check_range+0x10c/0x1c0
[   27.177133]  __kasan_check_write+0x18/0x20
[   27.177155]  kasan_atomics_helper+0x72f/0x5450
[   27.177177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.177197]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.177222]  ? kasan_atomics+0x152/0x310
[   27.177247]  kasan_atomics+0x1dc/0x310
[   27.177269]  ? __pfx_kasan_atomics+0x10/0x10
[   27.177303]  ? __pfx_read_tsc+0x10/0x10
[   27.177325]  ? ktime_get_ts64+0x86/0x230
[   27.177349]  kunit_try_run_case+0x1a5/0x480
[   27.177372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.177393]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.177472]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.177510]  ? __kthread_parkme+0x82/0x180
[   27.177530]  ? preempt_count_sub+0x50/0x80
[   27.177553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.177577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.177599]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.177622]  kthread+0x337/0x6f0
[   27.177652]  ? trace_preempt_on+0x20/0xc0
[   27.177675]  ? __pfx_kthread+0x10/0x10
[   27.177694]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.177736]  ? calculate_sigpending+0x7b/0xa0
[   27.177760]  ? __pfx_kthread+0x10/0x10
[   27.177780]  ret_from_fork+0x116/0x1d0
[   27.177847]  ? __pfx_kthread+0x10/0x10
[   27.177870]  ret_from_fork_asm+0x1a/0x30
[   27.177900]  </TASK>
[   27.177911] 
[   27.186202] Allocated by task 313:
[   27.186404]  kasan_save_stack+0x45/0x70
[   27.186704]  kasan_save_track+0x18/0x40
[   27.187009]  kasan_save_alloc_info+0x3b/0x50
[   27.187273]  __kasan_kmalloc+0xb7/0xc0
[   27.187462]  __kmalloc_cache_noprof+0x189/0x420
[   27.187680]  kasan_atomics+0x95/0x310
[   27.187922]  kunit_try_run_case+0x1a5/0x480
[   27.188172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.188455]  kthread+0x337/0x6f0
[   27.188601]  ret_from_fork+0x116/0x1d0
[   27.188977]  ret_from_fork_asm+0x1a/0x30
[   27.189253] 
[   27.189356] The buggy address belongs to the object at ffff8881053c7b80
[   27.189356]  which belongs to the cache kmalloc-64 of size 64
[   27.190044] The buggy address is located 0 bytes to the right of
[   27.190044]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.190610] 
[   27.190688] The buggy address belongs to the physical page:
[   27.190893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.191576] flags: 0x200000000000000(node=0|zone=2)
[   27.191948] page_type: f5(slab)
[   27.192145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.192392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.192614] page dumped because: kasan: bad access detected
[   27.192779] 
[   27.192841] Memory state around the buggy address:
[   27.192989]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.193291]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.193950] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.194308]                                      ^
[   27.194535]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.195158]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.195580] ==================================================================
[   27.568604] ==================================================================
[   27.569167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   27.569612] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.570119] 
[   27.570249] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.570307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.570321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.570344] Call Trace:
[   27.570576]  <TASK>
[   27.570597]  dump_stack_lvl+0x73/0xb0
[   27.570633]  print_report+0xd1/0x640
[   27.570664]  ? __virt_addr_valid+0x1db/0x2d0
[   27.570689]  ? kasan_atomics_helper+0x1079/0x5450
[   27.570915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.570946]  ? kasan_atomics_helper+0x1079/0x5450
[   27.570968]  kasan_report+0x141/0x180
[   27.571005]  ? kasan_atomics_helper+0x1079/0x5450
[   27.571031]  kasan_check_range+0x10c/0x1c0
[   27.571064]  __kasan_check_write+0x18/0x20
[   27.571088]  kasan_atomics_helper+0x1079/0x5450
[   27.571110]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.571133]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.571158]  ? kasan_atomics+0x152/0x310
[   27.571184]  kasan_atomics+0x1dc/0x310
[   27.571207]  ? __pfx_kasan_atomics+0x10/0x10
[   27.571231]  ? __pfx_read_tsc+0x10/0x10
[   27.571254]  ? ktime_get_ts64+0x86/0x230
[   27.571280]  kunit_try_run_case+0x1a5/0x480
[   27.571317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.571340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.571376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.571410]  ? __kthread_parkme+0x82/0x180
[   27.571431]  ? preempt_count_sub+0x50/0x80
[   27.571455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.571479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.571503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.571527]  kthread+0x337/0x6f0
[   27.571548]  ? trace_preempt_on+0x20/0xc0
[   27.571572]  ? __pfx_kthread+0x10/0x10
[   27.571595]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.571626]  ? calculate_sigpending+0x7b/0xa0
[   27.571652]  ? __pfx_kthread+0x10/0x10
[   27.571675]  ret_from_fork+0x116/0x1d0
[   27.571695]  ? __pfx_kthread+0x10/0x10
[   27.571716]  ret_from_fork_asm+0x1a/0x30
[   27.571749]  </TASK>
[   27.571760] 
[   27.584697] Allocated by task 313:
[   27.584997]  kasan_save_stack+0x45/0x70
[   27.585433]  kasan_save_track+0x18/0x40
[   27.585781]  kasan_save_alloc_info+0x3b/0x50
[   27.586157]  __kasan_kmalloc+0xb7/0xc0
[   27.586541]  __kmalloc_cache_noprof+0x189/0x420
[   27.586748]  kasan_atomics+0x95/0x310
[   27.587133]  kunit_try_run_case+0x1a5/0x480
[   27.587620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.587971]  kthread+0x337/0x6f0
[   27.588397]  ret_from_fork+0x116/0x1d0
[   27.588707]  ret_from_fork_asm+0x1a/0x30
[   27.589068] 
[   27.589218] The buggy address belongs to the object at ffff8881053c7b80
[   27.589218]  which belongs to the cache kmalloc-64 of size 64
[   27.590190] The buggy address is located 0 bytes to the right of
[   27.590190]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.590971] 
[   27.591061] The buggy address belongs to the physical page:
[   27.591549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.592155] flags: 0x200000000000000(node=0|zone=2)
[   27.592587] page_type: f5(slab)
[   27.592873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.593551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.593950] page dumped because: kasan: bad access detected
[   27.594317] 
[   27.594408] Memory state around the buggy address:
[   27.594611]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.595192]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.595691] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.596354]                                      ^
[   27.596740]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.597328]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.597810] ==================================================================
[   27.852411] ==================================================================
[   27.853120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   27.853580] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.854471] 
[   27.854586] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.854636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.854651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.854680] Call Trace:
[   27.854697]  <TASK>
[   27.854711]  dump_stack_lvl+0x73/0xb0
[   27.854744]  print_report+0xd1/0x640
[   27.854766]  ? __virt_addr_valid+0x1db/0x2d0
[   27.854790]  ? kasan_atomics_helper+0x151d/0x5450
[   27.854811]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.854837]  ? kasan_atomics_helper+0x151d/0x5450
[   27.854858]  kasan_report+0x141/0x180
[   27.854880]  ? kasan_atomics_helper+0x151d/0x5450
[   27.854906]  kasan_check_range+0x10c/0x1c0
[   27.854949]  __kasan_check_write+0x18/0x20
[   27.855087]  kasan_atomics_helper+0x151d/0x5450
[   27.855122]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.855145]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.855171]  ? kasan_atomics+0x152/0x310
[   27.855198]  kasan_atomics+0x1dc/0x310
[   27.855220]  ? __pfx_kasan_atomics+0x10/0x10
[   27.855244]  ? __pfx_read_tsc+0x10/0x10
[   27.855266]  ? ktime_get_ts64+0x86/0x230
[   27.855292]  kunit_try_run_case+0x1a5/0x480
[   27.855330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.855353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.855387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.855421]  ? __kthread_parkme+0x82/0x180
[   27.855442]  ? preempt_count_sub+0x50/0x80
[   27.855466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.855489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.855513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.855536]  kthread+0x337/0x6f0
[   27.855555]  ? trace_preempt_on+0x20/0xc0
[   27.855580]  ? __pfx_kthread+0x10/0x10
[   27.855601]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.855632]  ? calculate_sigpending+0x7b/0xa0
[   27.855656]  ? __pfx_kthread+0x10/0x10
[   27.855677]  ret_from_fork+0x116/0x1d0
[   27.855697]  ? __pfx_kthread+0x10/0x10
[   27.855717]  ret_from_fork_asm+0x1a/0x30
[   27.855748]  </TASK>
[   27.855760] 
[   27.866236] Allocated by task 313:
[   27.866495]  kasan_save_stack+0x45/0x70
[   27.866651]  kasan_save_track+0x18/0x40
[   27.867135]  kasan_save_alloc_info+0x3b/0x50
[   27.867448]  __kasan_kmalloc+0xb7/0xc0
[   27.867669]  __kmalloc_cache_noprof+0x189/0x420
[   27.867860]  kasan_atomics+0x95/0x310
[   27.868089]  kunit_try_run_case+0x1a5/0x480
[   27.868518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.868893]  kthread+0x337/0x6f0
[   27.869046]  ret_from_fork+0x116/0x1d0
[   27.869376]  ret_from_fork_asm+0x1a/0x30
[   27.869549] 
[   27.869642] The buggy address belongs to the object at ffff8881053c7b80
[   27.869642]  which belongs to the cache kmalloc-64 of size 64
[   27.870492] The buggy address is located 0 bytes to the right of
[   27.870492]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.871281] 
[   27.871411] The buggy address belongs to the physical page:
[   27.871781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.872178] flags: 0x200000000000000(node=0|zone=2)
[   27.872589] page_type: f5(slab)
[   27.873022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.873402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.873705] page dumped because: kasan: bad access detected
[   27.874056] 
[   27.874137] Memory state around the buggy address:
[   27.874504]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.874977]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.875324] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.875601]                                      ^
[   27.875785]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.876325]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.876779] ==================================================================
[   27.683774] ==================================================================
[   27.684469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   27.684782] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.685284] 
[   27.685396] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.685448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.685462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.685486] Call Trace:
[   27.685508]  <TASK>
[   27.685528]  dump_stack_lvl+0x73/0xb0
[   27.685563]  print_report+0xd1/0x640
[   27.685586]  ? __virt_addr_valid+0x1db/0x2d0
[   27.685610]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.685634]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.685660]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.685682]  kasan_report+0x141/0x180
[   27.685706]  ? kasan_atomics_helper+0x49e8/0x5450
[   27.685733]  __asan_report_load4_noabort+0x18/0x20
[   27.685760]  kasan_atomics_helper+0x49e8/0x5450
[   27.685785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.686100]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.686128]  ? kasan_atomics+0x152/0x310
[   27.686156]  kasan_atomics+0x1dc/0x310
[   27.686181]  ? __pfx_kasan_atomics+0x10/0x10
[   27.686205]  ? __pfx_read_tsc+0x10/0x10
[   27.686274]  ? ktime_get_ts64+0x86/0x230
[   27.686311]  kunit_try_run_case+0x1a5/0x480
[   27.686338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.686361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.686398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.686434]  ? __kthread_parkme+0x82/0x180
[   27.686457]  ? preempt_count_sub+0x50/0x80
[   27.686481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.686506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.686529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.686553]  kthread+0x337/0x6f0
[   27.686573]  ? trace_preempt_on+0x20/0xc0
[   27.686597]  ? __pfx_kthread+0x10/0x10
[   27.686618]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.686648]  ? calculate_sigpending+0x7b/0xa0
[   27.686677]  ? __pfx_kthread+0x10/0x10
[   27.686698]  ret_from_fork+0x116/0x1d0
[   27.686718]  ? __pfx_kthread+0x10/0x10
[   27.686739]  ret_from_fork_asm+0x1a/0x30
[   27.686770]  </TASK>
[   27.686781] 
[   27.698715] Allocated by task 313:
[   27.699165]  kasan_save_stack+0x45/0x70
[   27.699499]  kasan_save_track+0x18/0x40
[   27.699795]  kasan_save_alloc_info+0x3b/0x50
[   27.700186]  __kasan_kmalloc+0xb7/0xc0
[   27.700384]  __kmalloc_cache_noprof+0x189/0x420
[   27.700587]  kasan_atomics+0x95/0x310
[   27.700754]  kunit_try_run_case+0x1a5/0x480
[   27.701300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.701664]  kthread+0x337/0x6f0
[   27.702041]  ret_from_fork+0x116/0x1d0
[   27.702377]  ret_from_fork_asm+0x1a/0x30
[   27.702738] 
[   27.702877] The buggy address belongs to the object at ffff8881053c7b80
[   27.702877]  which belongs to the cache kmalloc-64 of size 64
[   27.703541] The buggy address is located 0 bytes to the right of
[   27.703541]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.704513] 
[   27.704736] The buggy address belongs to the physical page:
[   27.705218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.705727] flags: 0x200000000000000(node=0|zone=2)
[   27.706188] page_type: f5(slab)
[   27.706521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.707051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.707465] page dumped because: kasan: bad access detected
[   27.707703] 
[   27.707784] Memory state around the buggy address:
[   27.708210]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.708515]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.709036] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.709484]                                      ^
[   27.709856]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.710417]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.710720] ==================================================================
[   27.945904] ==================================================================
[   27.946206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   27.946533] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.946968] 
[   27.947069] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.947120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.947133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.947157] Call Trace:
[   27.947173]  <TASK>
[   27.947189]  dump_stack_lvl+0x73/0xb0
[   27.947221]  print_report+0xd1/0x640
[   27.947244]  ? __virt_addr_valid+0x1db/0x2d0
[   27.947267]  ? kasan_atomics_helper+0x177f/0x5450
[   27.947291]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.947332]  ? kasan_atomics_helper+0x177f/0x5450
[   27.947354]  kasan_report+0x141/0x180
[   27.947377]  ? kasan_atomics_helper+0x177f/0x5450
[   27.947403]  kasan_check_range+0x10c/0x1c0
[   27.947427]  __kasan_check_write+0x18/0x20
[   27.947451]  kasan_atomics_helper+0x177f/0x5450
[   27.947474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.947497]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.947522]  ? kasan_atomics+0x152/0x310
[   27.947549]  kasan_atomics+0x1dc/0x310
[   27.947573]  ? __pfx_kasan_atomics+0x10/0x10
[   27.947597]  ? __pfx_read_tsc+0x10/0x10
[   27.947619]  ? ktime_get_ts64+0x86/0x230
[   27.947645]  kunit_try_run_case+0x1a5/0x480
[   27.947669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.947692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.947727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.947761]  ? __kthread_parkme+0x82/0x180
[   27.947782]  ? preempt_count_sub+0x50/0x80
[   27.947967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.947992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.948018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.948041]  kthread+0x337/0x6f0
[   27.948063]  ? trace_preempt_on+0x20/0xc0
[   27.948086]  ? __pfx_kthread+0x10/0x10
[   27.948108]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.948139]  ? calculate_sigpending+0x7b/0xa0
[   27.948164]  ? __pfx_kthread+0x10/0x10
[   27.948186]  ret_from_fork+0x116/0x1d0
[   27.948206]  ? __pfx_kthread+0x10/0x10
[   27.948226]  ret_from_fork_asm+0x1a/0x30
[   27.948258]  </TASK>
[   27.948269] 
[   27.955763] Allocated by task 313:
[   27.955944]  kasan_save_stack+0x45/0x70
[   27.956162]  kasan_save_track+0x18/0x40
[   27.956524]  kasan_save_alloc_info+0x3b/0x50
[   27.956748]  __kasan_kmalloc+0xb7/0xc0
[   27.956935]  __kmalloc_cache_noprof+0x189/0x420
[   27.957125]  kasan_atomics+0x95/0x310
[   27.957251]  kunit_try_run_case+0x1a5/0x480
[   27.957635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.958030]  kthread+0x337/0x6f0
[   27.958228]  ret_from_fork+0x116/0x1d0
[   27.958419]  ret_from_fork_asm+0x1a/0x30
[   27.958591] 
[   27.958689] The buggy address belongs to the object at ffff8881053c7b80
[   27.958689]  which belongs to the cache kmalloc-64 of size 64
[   27.959298] The buggy address is located 0 bytes to the right of
[   27.959298]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.959790] 
[   27.959894] The buggy address belongs to the physical page:
[   27.960060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.960297] flags: 0x200000000000000(node=0|zone=2)
[   27.960465] page_type: f5(slab)
[   27.960580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.960806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.961119] page dumped because: kasan: bad access detected
[   27.961565] 
[   27.961662] Memory state around the buggy address:
[   27.961972]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.962297]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.962594] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.965319]                                      ^
[   27.965548]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.965814]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.966104] ==================================================================
[   28.210202] ==================================================================
[   28.210827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   28.211411] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.211639] 
[   28.211726] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.211776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.211789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.211813] Call Trace:
[   28.211833]  <TASK>
[   28.211852]  dump_stack_lvl+0x73/0xb0
[   28.211885]  print_report+0xd1/0x640
[   28.211908]  ? __virt_addr_valid+0x1db/0x2d0
[   28.211933]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.211954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.212375]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.212397]  kasan_report+0x141/0x180
[   28.212421]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.212447]  kasan_check_range+0x10c/0x1c0
[   28.212470]  __kasan_check_write+0x18/0x20
[   28.212493]  kasan_atomics_helper+0x1eaa/0x5450
[   28.212515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.212539]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.212564]  ? kasan_atomics+0x152/0x310
[   28.212590]  kasan_atomics+0x1dc/0x310
[   28.212613]  ? __pfx_kasan_atomics+0x10/0x10
[   28.212637]  ? __pfx_read_tsc+0x10/0x10
[   28.212661]  ? ktime_get_ts64+0x86/0x230
[   28.212687]  kunit_try_run_case+0x1a5/0x480
[   28.212711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.212734]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.212770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.212822]  ? __kthread_parkme+0x82/0x180
[   28.212844]  ? preempt_count_sub+0x50/0x80
[   28.212868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.212893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.212917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.212941]  kthread+0x337/0x6f0
[   28.212961]  ? trace_preempt_on+0x20/0xc0
[   28.212986]  ? __pfx_kthread+0x10/0x10
[   28.213007]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.213038]  ? calculate_sigpending+0x7b/0xa0
[   28.213063]  ? __pfx_kthread+0x10/0x10
[   28.213086]  ret_from_fork+0x116/0x1d0
[   28.213105]  ? __pfx_kthread+0x10/0x10
[   28.213126]  ret_from_fork_asm+0x1a/0x30
[   28.213158]  </TASK>
[   28.213169] 
[   28.227717] Allocated by task 313:
[   28.228146]  kasan_save_stack+0x45/0x70
[   28.228849]  kasan_save_track+0x18/0x40
[   28.229249]  kasan_save_alloc_info+0x3b/0x50
[   28.229537]  __kasan_kmalloc+0xb7/0xc0
[   28.229667]  __kmalloc_cache_noprof+0x189/0x420
[   28.229814]  kasan_atomics+0x95/0x310
[   28.230080]  kunit_try_run_case+0x1a5/0x480
[   28.230738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.231413]  kthread+0x337/0x6f0
[   28.231863]  ret_from_fork+0x116/0x1d0
[   28.232387]  ret_from_fork_asm+0x1a/0x30
[   28.232897] 
[   28.233067] The buggy address belongs to the object at ffff8881053c7b80
[   28.233067]  which belongs to the cache kmalloc-64 of size 64
[   28.233826] The buggy address is located 0 bytes to the right of
[   28.233826]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.234204] 
[   28.234274] The buggy address belongs to the physical page:
[   28.234479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.234746] flags: 0x200000000000000(node=0|zone=2)
[   28.235221] page_type: f5(slab)
[   28.235510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.236584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.237031] page dumped because: kasan: bad access detected
[   28.237466] 
[   28.237804] Memory state around the buggy address:
[   28.238247]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.238599]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.239120] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.239422]                                      ^
[   28.239720]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.240212]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.240683] ==================================================================
[   28.447398] ==================================================================
[   28.448075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   28.448553] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.449920] 
[   28.450435] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.450496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.450779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.450818] Call Trace:
[   28.450836]  <TASK>
[   28.450855]  dump_stack_lvl+0x73/0xb0
[   28.450893]  print_report+0xd1/0x640
[   28.450918]  ? __virt_addr_valid+0x1db/0x2d0
[   28.450943]  ? kasan_atomics_helper+0x224c/0x5450
[   28.450967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.450993]  ? kasan_atomics_helper+0x224c/0x5450
[   28.451015]  kasan_report+0x141/0x180
[   28.451037]  ? kasan_atomics_helper+0x224c/0x5450
[   28.451063]  kasan_check_range+0x10c/0x1c0
[   28.451087]  __kasan_check_write+0x18/0x20
[   28.451110]  kasan_atomics_helper+0x224c/0x5450
[   28.451133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.451155]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.451180]  ? kasan_atomics+0x152/0x310
[   28.451206]  kasan_atomics+0x1dc/0x310
[   28.451229]  ? __pfx_kasan_atomics+0x10/0x10
[   28.451253]  ? __pfx_read_tsc+0x10/0x10
[   28.451274]  ? ktime_get_ts64+0x86/0x230
[   28.451299]  kunit_try_run_case+0x1a5/0x480
[   28.451324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.451362]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.451397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.451431]  ? __kthread_parkme+0x82/0x180
[   28.451452]  ? preempt_count_sub+0x50/0x80
[   28.451475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.451499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.451523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.451546]  kthread+0x337/0x6f0
[   28.451566]  ? trace_preempt_on+0x20/0xc0
[   28.451590]  ? __pfx_kthread+0x10/0x10
[   28.451611]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.451641]  ? calculate_sigpending+0x7b/0xa0
[   28.451666]  ? __pfx_kthread+0x10/0x10
[   28.451687]  ret_from_fork+0x116/0x1d0
[   28.451707]  ? __pfx_kthread+0x10/0x10
[   28.451728]  ret_from_fork_asm+0x1a/0x30
[   28.451758]  </TASK>
[   28.451770] 
[   28.461122] Allocated by task 313:
[   28.461245]  kasan_save_stack+0x45/0x70
[   28.461423]  kasan_save_track+0x18/0x40
[   28.461611]  kasan_save_alloc_info+0x3b/0x50
[   28.461865]  __kasan_kmalloc+0xb7/0xc0
[   28.462068]  __kmalloc_cache_noprof+0x189/0x420
[   28.462319]  kasan_atomics+0x95/0x310
[   28.462550]  kunit_try_run_case+0x1a5/0x480
[   28.462781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.463041]  kthread+0x337/0x6f0
[   28.463209]  ret_from_fork+0x116/0x1d0
[   28.463404]  ret_from_fork_asm+0x1a/0x30
[   28.463536] 
[   28.463598] The buggy address belongs to the object at ffff8881053c7b80
[   28.463598]  which belongs to the cache kmalloc-64 of size 64
[   28.463933] The buggy address is located 0 bytes to the right of
[   28.463933]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.464408] 
[   28.464522] The buggy address belongs to the physical page:
[   28.464769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.465133] flags: 0x200000000000000(node=0|zone=2)
[   28.465375] page_type: f5(slab)
[   28.465561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.465917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.466220] page dumped because: kasan: bad access detected
[   28.466404] 
[   28.466466] Memory state around the buggy address:
[   28.466683]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.467022]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.467296] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.467643]                                      ^
[   28.467866]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.468160]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.468408] ==================================================================
[   28.100619] ==================================================================
[   28.100840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   28.101062] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.101277] 
[   28.101382] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.101443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.101456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.101477] Call Trace:
[   28.101491]  <TASK>
[   28.101505]  dump_stack_lvl+0x73/0xb0
[   28.101534]  print_report+0xd1/0x640
[   28.101556]  ? __virt_addr_valid+0x1db/0x2d0
[   28.101579]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.101600]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.101626]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.101648]  kasan_report+0x141/0x180
[   28.101671]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.101696]  __asan_report_load8_noabort+0x18/0x20
[   28.101721]  kasan_atomics_helper+0x4f30/0x5450
[   28.101745]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.101767]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.101791]  ? kasan_atomics+0x152/0x310
[   28.101817]  kasan_atomics+0x1dc/0x310
[   28.101840]  ? __pfx_kasan_atomics+0x10/0x10
[   28.101864]  ? __pfx_read_tsc+0x10/0x10
[   28.101886]  ? ktime_get_ts64+0x86/0x230
[   28.101910]  kunit_try_run_case+0x1a5/0x480
[   28.101934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.101957]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.101992]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.102026]  ? __kthread_parkme+0x82/0x180
[   28.102046]  ? preempt_count_sub+0x50/0x80
[   28.102070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.102094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.102118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.102142]  kthread+0x337/0x6f0
[   28.102162]  ? trace_preempt_on+0x20/0xc0
[   28.102185]  ? __pfx_kthread+0x10/0x10
[   28.102207]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.102237]  ? calculate_sigpending+0x7b/0xa0
[   28.102261]  ? __pfx_kthread+0x10/0x10
[   28.102282]  ret_from_fork+0x116/0x1d0
[   28.102302]  ? __pfx_kthread+0x10/0x10
[   28.102332]  ret_from_fork_asm+0x1a/0x30
[   28.102364]  </TASK>
[   28.102375] 
[   28.110585] Allocated by task 313:
[   28.110719]  kasan_save_stack+0x45/0x70
[   28.110883]  kasan_save_track+0x18/0x40
[   28.111150]  kasan_save_alloc_info+0x3b/0x50
[   28.111367]  __kasan_kmalloc+0xb7/0xc0
[   28.111548]  __kmalloc_cache_noprof+0x189/0x420
[   28.111774]  kasan_atomics+0x95/0x310
[   28.111957]  kunit_try_run_case+0x1a5/0x480
[   28.112153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.112620]  kthread+0x337/0x6f0
[   28.112800]  ret_from_fork+0x116/0x1d0
[   28.113033]  ret_from_fork_asm+0x1a/0x30
[   28.113173] 
[   28.113263] The buggy address belongs to the object at ffff8881053c7b80
[   28.113263]  which belongs to the cache kmalloc-64 of size 64
[   28.113786] The buggy address is located 0 bytes to the right of
[   28.113786]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.114415] 
[   28.114515] The buggy address belongs to the physical page:
[   28.114823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.115164] flags: 0x200000000000000(node=0|zone=2)
[   28.115386] page_type: f5(slab)
[   28.115526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.115839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.116125] page dumped because: kasan: bad access detected
[   28.116341] 
[   28.116442] Memory state around the buggy address:
[   28.116591]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.116802]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.117011] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.117217]                                      ^
[   28.117375]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.117583]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.117789] ==================================================================
[   27.092081] ==================================================================
[   27.092393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   27.092717] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.093192] 
[   27.093313] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.093381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.093405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.093426] Call Trace:
[   27.093441]  <TASK>
[   27.093455]  dump_stack_lvl+0x73/0xb0
[   27.093486]  print_report+0xd1/0x640
[   27.093507]  ? __virt_addr_valid+0x1db/0x2d0
[   27.093530]  ? kasan_atomics_helper+0x4b3a/0x5450
[   27.093552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.093577]  ? kasan_atomics_helper+0x4b3a/0x5450
[   27.093598]  kasan_report+0x141/0x180
[   27.093619]  ? kasan_atomics_helper+0x4b3a/0x5450
[   27.093644]  __asan_report_store4_noabort+0x1b/0x30
[   27.093668]  kasan_atomics_helper+0x4b3a/0x5450
[   27.093689]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.093711]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.093734]  ? kasan_atomics+0x152/0x310
[   27.093759]  kasan_atomics+0x1dc/0x310
[   27.093780]  ? __pfx_kasan_atomics+0x10/0x10
[   27.093803]  ? __pfx_read_tsc+0x10/0x10
[   27.093833]  ? ktime_get_ts64+0x86/0x230
[   27.093858]  kunit_try_run_case+0x1a5/0x480
[   27.093882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.093914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.093948]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.093980]  ? __kthread_parkme+0x82/0x180
[   27.093999]  ? preempt_count_sub+0x50/0x80
[   27.094022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.094046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.094068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.094091]  kthread+0x337/0x6f0
[   27.094110]  ? trace_preempt_on+0x20/0xc0
[   27.094132]  ? __pfx_kthread+0x10/0x10
[   27.094152]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.094182]  ? calculate_sigpending+0x7b/0xa0
[   27.094206]  ? __pfx_kthread+0x10/0x10
[   27.094329]  ret_from_fork+0x116/0x1d0
[   27.094349]  ? __pfx_kthread+0x10/0x10
[   27.094369]  ret_from_fork_asm+0x1a/0x30
[   27.094399]  </TASK>
[   27.094410] 
[   27.103060] Allocated by task 313:
[   27.103237]  kasan_save_stack+0x45/0x70
[   27.103448]  kasan_save_track+0x18/0x40
[   27.103624]  kasan_save_alloc_info+0x3b/0x50
[   27.103843]  __kasan_kmalloc+0xb7/0xc0
[   27.104002]  __kmalloc_cache_noprof+0x189/0x420
[   27.104319]  kasan_atomics+0x95/0x310
[   27.104459]  kunit_try_run_case+0x1a5/0x480
[   27.104598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.104765]  kthread+0x337/0x6f0
[   27.105013]  ret_from_fork+0x116/0x1d0
[   27.105405]  ret_from_fork_asm+0x1a/0x30
[   27.105595] 
[   27.105682] The buggy address belongs to the object at ffff8881053c7b80
[   27.105682]  which belongs to the cache kmalloc-64 of size 64
[   27.106185] The buggy address is located 0 bytes to the right of
[   27.106185]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.108366] 
[   27.108678] The buggy address belongs to the physical page:
[   27.109263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.109613] flags: 0x200000000000000(node=0|zone=2)
[   27.109821] page_type: f5(slab)
[   27.109971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.110261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.111447] page dumped because: kasan: bad access detected
[   27.111681] 
[   27.111760] Memory state around the buggy address:
[   27.112506]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.113353]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.113842] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.114141]                                      ^
[   27.114351]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.114633]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.115412] ==================================================================
[   27.155773] ==================================================================
[   27.156503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   27.156896] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.157328] 
[   27.157413] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.157462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.157474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.157496] Call Trace:
[   27.157513]  <TASK>
[   27.157528]  dump_stack_lvl+0x73/0xb0
[   27.157558]  print_report+0xd1/0x640
[   27.157581]  ? __virt_addr_valid+0x1db/0x2d0
[   27.157604]  ? kasan_atomics_helper+0x697/0x5450
[   27.157625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.157649]  ? kasan_atomics_helper+0x697/0x5450
[   27.157669]  kasan_report+0x141/0x180
[   27.157690]  ? kasan_atomics_helper+0x697/0x5450
[   27.157728]  kasan_check_range+0x10c/0x1c0
[   27.157752]  __kasan_check_write+0x18/0x20
[   27.157774]  kasan_atomics_helper+0x697/0x5450
[   27.157810]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.157831]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.157856]  ? kasan_atomics+0x152/0x310
[   27.157880]  kasan_atomics+0x1dc/0x310
[   27.157902]  ? __pfx_kasan_atomics+0x10/0x10
[   27.157935]  ? __pfx_read_tsc+0x10/0x10
[   27.157956]  ? ktime_get_ts64+0x86/0x230
[   27.157980]  kunit_try_run_case+0x1a5/0x480
[   27.158069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.158092]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.158142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.158175]  ? __kthread_parkme+0x82/0x180
[   27.158195]  ? preempt_count_sub+0x50/0x80
[   27.158229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.158251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.158274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.158305]  kthread+0x337/0x6f0
[   27.158333]  ? trace_preempt_on+0x20/0xc0
[   27.158356]  ? __pfx_kthread+0x10/0x10
[   27.158376]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.158415]  ? calculate_sigpending+0x7b/0xa0
[   27.158440]  ? __pfx_kthread+0x10/0x10
[   27.158461]  ret_from_fork+0x116/0x1d0
[   27.158479]  ? __pfx_kthread+0x10/0x10
[   27.158499]  ret_from_fork_asm+0x1a/0x30
[   27.158540]  </TASK>
[   27.158550] 
[   27.166954] Allocated by task 313:
[   27.167135]  kasan_save_stack+0x45/0x70
[   27.167308]  kasan_save_track+0x18/0x40
[   27.167437]  kasan_save_alloc_info+0x3b/0x50
[   27.167637]  __kasan_kmalloc+0xb7/0xc0
[   27.167829]  __kmalloc_cache_noprof+0x189/0x420
[   27.168131]  kasan_atomics+0x95/0x310
[   27.168265]  kunit_try_run_case+0x1a5/0x480
[   27.168416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.168584]  kthread+0x337/0x6f0
[   27.168696]  ret_from_fork+0x116/0x1d0
[   27.168839]  ret_from_fork_asm+0x1a/0x30
[   27.169118] 
[   27.169208] The buggy address belongs to the object at ffff8881053c7b80
[   27.169208]  which belongs to the cache kmalloc-64 of size 64
[   27.170065] The buggy address is located 0 bytes to the right of
[   27.170065]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.170497] 
[   27.170588] The buggy address belongs to the physical page:
[   27.170840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.171485] flags: 0x200000000000000(node=0|zone=2)
[   27.171725] page_type: f5(slab)
[   27.172052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.172400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.172734] page dumped because: kasan: bad access detected
[   27.173023] 
[   27.173140] Memory state around the buggy address:
[   27.173339]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.173659]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.174025] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.174341]                                      ^
[   27.174557]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.175032]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.175368] ==================================================================
[   27.481941] ==================================================================
[   27.482609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   27.483179] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.483480] 
[   27.483684] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.483734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.483748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.483772] Call Trace:
[   27.483786]  <TASK>
[   27.484137]  dump_stack_lvl+0x73/0xb0
[   27.484177]  print_report+0xd1/0x640
[   27.484203]  ? __virt_addr_valid+0x1db/0x2d0
[   27.484230]  ? kasan_atomics_helper+0xf10/0x5450
[   27.484252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.484330]  ? kasan_atomics_helper+0xf10/0x5450
[   27.484352]  kasan_report+0x141/0x180
[   27.484376]  ? kasan_atomics_helper+0xf10/0x5450
[   27.484401]  kasan_check_range+0x10c/0x1c0
[   27.484425]  __kasan_check_write+0x18/0x20
[   27.484449]  kasan_atomics_helper+0xf10/0x5450
[   27.484472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.484495]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.484520]  ? kasan_atomics+0x152/0x310
[   27.484547]  kasan_atomics+0x1dc/0x310
[   27.484570]  ? __pfx_kasan_atomics+0x10/0x10
[   27.484594]  ? __pfx_read_tsc+0x10/0x10
[   27.484616]  ? ktime_get_ts64+0x86/0x230
[   27.484642]  kunit_try_run_case+0x1a5/0x480
[   27.484666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.484689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.484725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.484758]  ? __kthread_parkme+0x82/0x180
[   27.484779]  ? preempt_count_sub+0x50/0x80
[   27.484816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.484840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.484864]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.484897]  kthread+0x337/0x6f0
[   27.484917]  ? trace_preempt_on+0x20/0xc0
[   27.484942]  ? __pfx_kthread+0x10/0x10
[   27.484963]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.484994]  ? calculate_sigpending+0x7b/0xa0
[   27.485020]  ? __pfx_kthread+0x10/0x10
[   27.485043]  ret_from_fork+0x116/0x1d0
[   27.485064]  ? __pfx_kthread+0x10/0x10
[   27.485085]  ret_from_fork_asm+0x1a/0x30
[   27.485116]  </TASK>
[   27.485128] 
[   27.497049] Allocated by task 313:
[   27.497664]  kasan_save_stack+0x45/0x70
[   27.498081]  kasan_save_track+0x18/0x40
[   27.498557]  kasan_save_alloc_info+0x3b/0x50
[   27.498928]  __kasan_kmalloc+0xb7/0xc0
[   27.499257]  __kmalloc_cache_noprof+0x189/0x420
[   27.499606]  kasan_atomics+0x95/0x310
[   27.499780]  kunit_try_run_case+0x1a5/0x480
[   27.500213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.500466]  kthread+0x337/0x6f0
[   27.500611]  ret_from_fork+0x116/0x1d0
[   27.500783]  ret_from_fork_asm+0x1a/0x30
[   27.501274] 
[   27.501545] The buggy address belongs to the object at ffff8881053c7b80
[   27.501545]  which belongs to the cache kmalloc-64 of size 64
[   27.502402] The buggy address is located 0 bytes to the right of
[   27.502402]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.503424] 
[   27.503658] The buggy address belongs to the physical page:
[   27.504255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.504768] flags: 0x200000000000000(node=0|zone=2)
[   27.505153] page_type: f5(slab)
[   27.505328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.505628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.506200] page dumped because: kasan: bad access detected
[   27.506596] 
[   27.506827] Memory state around the buggy address:
[   27.507251]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.507685]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.508127] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.508430]                                      ^
[   27.508640]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509200]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.509712] ==================================================================
[   27.004258] ==================================================================
[   27.005086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   27.005384] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.005835] 
[   27.006171] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.006225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.006238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.006386] Call Trace:
[   27.006409]  <TASK>
[   27.006427]  dump_stack_lvl+0x73/0xb0
[   27.006462]  print_report+0xd1/0x640
[   27.006485]  ? __virt_addr_valid+0x1db/0x2d0
[   27.006508]  ? kasan_atomics_helper+0x4b6e/0x5450
[   27.006529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.006554]  ? kasan_atomics_helper+0x4b6e/0x5450
[   27.006574]  kasan_report+0x141/0x180
[   27.006596]  ? kasan_atomics_helper+0x4b6e/0x5450
[   27.006621]  __asan_report_store4_noabort+0x1b/0x30
[   27.006644]  kasan_atomics_helper+0x4b6e/0x5450
[   27.006674]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.006695]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.006721]  ? kasan_atomics+0x152/0x310
[   27.006746]  kasan_atomics+0x1dc/0x310
[   27.006769]  ? __pfx_kasan_atomics+0x10/0x10
[   27.006792]  ? __pfx_read_tsc+0x10/0x10
[   27.006870]  ? ktime_get_ts64+0x86/0x230
[   27.006897]  kunit_try_run_case+0x1a5/0x480
[   27.006921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.006943]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.006978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.007010]  ? __kthread_parkme+0x82/0x180
[   27.007030]  ? preempt_count_sub+0x50/0x80
[   27.007053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.007076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.007098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.007120]  kthread+0x337/0x6f0
[   27.007139]  ? trace_preempt_on+0x20/0xc0
[   27.007162]  ? __pfx_kthread+0x10/0x10
[   27.007182]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.007211]  ? calculate_sigpending+0x7b/0xa0
[   27.007235]  ? __pfx_kthread+0x10/0x10
[   27.007255]  ret_from_fork+0x116/0x1d0
[   27.007274]  ? __pfx_kthread+0x10/0x10
[   27.007305]  ret_from_fork_asm+0x1a/0x30
[   27.007336]  </TASK>
[   27.007347] 
[   27.017310] Allocated by task 313:
[   27.018030]  kasan_save_stack+0x45/0x70
[   27.018472]  kasan_save_track+0x18/0x40
[   27.019092]  kasan_save_alloc_info+0x3b/0x50
[   27.019430]  __kasan_kmalloc+0xb7/0xc0
[   27.019659]  __kmalloc_cache_noprof+0x189/0x420
[   27.020146]  kasan_atomics+0x95/0x310
[   27.020289]  kunit_try_run_case+0x1a5/0x480
[   27.020427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.020591]  kthread+0x337/0x6f0
[   27.020700]  ret_from_fork+0x116/0x1d0
[   27.021040]  ret_from_fork_asm+0x1a/0x30
[   27.021438] 
[   27.021593] The buggy address belongs to the object at ffff8881053c7b80
[   27.021593]  which belongs to the cache kmalloc-64 of size 64
[   27.022991] The buggy address is located 0 bytes to the right of
[   27.022991]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.024195] 
[   27.024368] The buggy address belongs to the physical page:
[   27.024738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.025290] flags: 0x200000000000000(node=0|zone=2)
[   27.025457] page_type: f5(slab)
[   27.025574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.025915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.026605] page dumped because: kasan: bad access detected
[   27.027248] 
[   27.027420] Memory state around the buggy address:
[   27.027935]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.028572]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.029139] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.029403]                                      ^
[   27.029904]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.030338]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.030546] ==================================================================
[   27.199241] ==================================================================
[   27.199668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   27.200702] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.201524] 
[   27.201860] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.201920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.201933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.201956] Call Trace:
[   27.201976]  <TASK>
[   27.201995]  dump_stack_lvl+0x73/0xb0
[   27.202030]  print_report+0xd1/0x640
[   27.202054]  ? __virt_addr_valid+0x1db/0x2d0
[   27.202078]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.202098]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.202125]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.202147]  kasan_report+0x141/0x180
[   27.202168]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.202193]  kasan_check_range+0x10c/0x1c0
[   27.202217]  __kasan_check_write+0x18/0x20
[   27.202240]  kasan_atomics_helper+0x7c7/0x5450
[   27.202262]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.202299]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.202450]  ? kasan_atomics+0x152/0x310
[   27.202481]  kasan_atomics+0x1dc/0x310
[   27.202505]  ? __pfx_kasan_atomics+0x10/0x10
[   27.202529]  ? __pfx_read_tsc+0x10/0x10
[   27.202551]  ? ktime_get_ts64+0x86/0x230
[   27.202575]  kunit_try_run_case+0x1a5/0x480
[   27.202640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.202668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.202706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.202738]  ? __kthread_parkme+0x82/0x180
[   27.202758]  ? preempt_count_sub+0x50/0x80
[   27.202781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.202827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.202865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.202887]  kthread+0x337/0x6f0
[   27.202906]  ? trace_preempt_on+0x20/0xc0
[   27.202929]  ? __pfx_kthread+0x10/0x10
[   27.202948]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.202978]  ? calculate_sigpending+0x7b/0xa0
[   27.203002]  ? __pfx_kthread+0x10/0x10
[   27.203022]  ret_from_fork+0x116/0x1d0
[   27.203041]  ? __pfx_kthread+0x10/0x10
[   27.203060]  ret_from_fork_asm+0x1a/0x30
[   27.203091]  </TASK>
[   27.203101] 
[   27.213685] Allocated by task 313:
[   27.213833]  kasan_save_stack+0x45/0x70
[   27.213985]  kasan_save_track+0x18/0x40
[   27.214252]  kasan_save_alloc_info+0x3b/0x50
[   27.214598]  __kasan_kmalloc+0xb7/0xc0
[   27.214791]  __kmalloc_cache_noprof+0x189/0x420
[   27.215116]  kasan_atomics+0x95/0x310
[   27.215331]  kunit_try_run_case+0x1a5/0x480
[   27.215477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.215688]  kthread+0x337/0x6f0
[   27.216041]  ret_from_fork+0x116/0x1d0
[   27.216267]  ret_from_fork_asm+0x1a/0x30
[   27.216476] 
[   27.216567] The buggy address belongs to the object at ffff8881053c7b80
[   27.216567]  which belongs to the cache kmalloc-64 of size 64
[   27.217154] The buggy address is located 0 bytes to the right of
[   27.217154]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.217656] 
[   27.217770] The buggy address belongs to the physical page:
[   27.218147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.218465] flags: 0x200000000000000(node=0|zone=2)
[   27.218708] page_type: f5(slab)
[   27.218935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.219237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.219606] page dumped because: kasan: bad access detected
[   27.219855] 
[   27.219944] Memory state around the buggy address:
[   27.220163]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.220737]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.221377] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.221589]                                      ^
[   27.221848]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.222194]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.222519] ==================================================================
[   27.343766] ==================================================================
[   27.344096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   27.344598] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.344975] 
[   27.345084] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.345132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.345144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.345167] Call Trace:
[   27.345185]  <TASK>
[   27.345201]  dump_stack_lvl+0x73/0xb0
[   27.345232]  print_report+0xd1/0x640
[   27.345253]  ? __virt_addr_valid+0x1db/0x2d0
[   27.345276]  ? kasan_atomics_helper+0xb6a/0x5450
[   27.345311]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.345337]  ? kasan_atomics_helper+0xb6a/0x5450
[   27.345359]  kasan_report+0x141/0x180
[   27.345381]  ? kasan_atomics_helper+0xb6a/0x5450
[   27.345405]  kasan_check_range+0x10c/0x1c0
[   27.345428]  __kasan_check_write+0x18/0x20
[   27.345450]  kasan_atomics_helper+0xb6a/0x5450
[   27.345471]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.345493]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.345517]  ? kasan_atomics+0x152/0x310
[   27.345542]  kasan_atomics+0x1dc/0x310
[   27.345564]  ? __pfx_kasan_atomics+0x10/0x10
[   27.345587]  ? __pfx_read_tsc+0x10/0x10
[   27.345609]  ? ktime_get_ts64+0x86/0x230
[   27.345633]  kunit_try_run_case+0x1a5/0x480
[   27.345656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.345678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.345711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.345744]  ? __kthread_parkme+0x82/0x180
[   27.345764]  ? preempt_count_sub+0x50/0x80
[   27.345787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.345821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.345844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.345866]  kthread+0x337/0x6f0
[   27.345885]  ? trace_preempt_on+0x20/0xc0
[   27.345909]  ? __pfx_kthread+0x10/0x10
[   27.345929]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.345964]  ? calculate_sigpending+0x7b/0xa0
[   27.345989]  ? __pfx_kthread+0x10/0x10
[   27.346011]  ret_from_fork+0x116/0x1d0
[   27.346030]  ? __pfx_kthread+0x10/0x10
[   27.346051]  ret_from_fork_asm+0x1a/0x30
[   27.346082]  </TASK>
[   27.346094] 
[   27.353798] Allocated by task 313:
[   27.353970]  kasan_save_stack+0x45/0x70
[   27.354144]  kasan_save_track+0x18/0x40
[   27.354309]  kasan_save_alloc_info+0x3b/0x50
[   27.354512]  __kasan_kmalloc+0xb7/0xc0
[   27.354697]  __kmalloc_cache_noprof+0x189/0x420
[   27.354905]  kasan_atomics+0x95/0x310
[   27.355058]  kunit_try_run_case+0x1a5/0x480
[   27.356640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.356824]  kthread+0x337/0x6f0
[   27.356938]  ret_from_fork+0x116/0x1d0
[   27.357063]  ret_from_fork_asm+0x1a/0x30
[   27.357196] 
[   27.357262] The buggy address belongs to the object at ffff8881053c7b80
[   27.357262]  which belongs to the cache kmalloc-64 of size 64
[   27.357792] The buggy address is located 0 bytes to the right of
[   27.357792]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.358632] 
[   27.358733] The buggy address belongs to the physical page:
[   27.359129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.359451] flags: 0x200000000000000(node=0|zone=2)
[   27.359612] page_type: f5(slab)
[   27.359763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.360216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.360557] page dumped because: kasan: bad access detected
[   27.360724] 
[   27.360786] Memory state around the buggy address:
[   27.361286]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.361622]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.362013] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.362326]                                      ^
[   27.362643]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.363052]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.363362] ==================================================================
[   27.386694] ==================================================================
[   27.387260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   27.387514] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.388188] 
[   27.388318] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.388367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.388381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.388405] Call Trace:
[   27.388423]  <TASK>
[   27.388440]  dump_stack_lvl+0x73/0xb0
[   27.388474]  print_report+0xd1/0x640
[   27.388498]  ? __virt_addr_valid+0x1db/0x2d0
[   27.388523]  ? kasan_atomics_helper+0x4a84/0x5450
[   27.388544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.388571]  ? kasan_atomics_helper+0x4a84/0x5450
[   27.388592]  kasan_report+0x141/0x180
[   27.388615]  ? kasan_atomics_helper+0x4a84/0x5450
[   27.388641]  __asan_report_load4_noabort+0x18/0x20
[   27.388666]  kasan_atomics_helper+0x4a84/0x5450
[   27.388689]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.388711]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.388736]  ? kasan_atomics+0x152/0x310
[   27.388762]  kasan_atomics+0x1dc/0x310
[   27.388786]  ? __pfx_kasan_atomics+0x10/0x10
[   27.388849]  ? __pfx_read_tsc+0x10/0x10
[   27.388871]  ? ktime_get_ts64+0x86/0x230
[   27.388897]  kunit_try_run_case+0x1a5/0x480
[   27.388923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.388946]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.388981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.389015]  ? __kthread_parkme+0x82/0x180
[   27.389036]  ? preempt_count_sub+0x50/0x80
[   27.389061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.389085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.389108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.389131]  kthread+0x337/0x6f0
[   27.389152]  ? trace_preempt_on+0x20/0xc0
[   27.389187]  ? __pfx_kthread+0x10/0x10
[   27.389208]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.389239]  ? calculate_sigpending+0x7b/0xa0
[   27.389263]  ? __pfx_kthread+0x10/0x10
[   27.389329]  ret_from_fork+0x116/0x1d0
[   27.389349]  ? __pfx_kthread+0x10/0x10
[   27.389370]  ret_from_fork_asm+0x1a/0x30
[   27.389402]  </TASK>
[   27.389414] 
[   27.398258] Allocated by task 313:
[   27.398488]  kasan_save_stack+0x45/0x70
[   27.398697]  kasan_save_track+0x18/0x40
[   27.399063]  kasan_save_alloc_info+0x3b/0x50
[   27.399224]  __kasan_kmalloc+0xb7/0xc0
[   27.399426]  __kmalloc_cache_noprof+0x189/0x420
[   27.399598]  kasan_atomics+0x95/0x310
[   27.399724]  kunit_try_run_case+0x1a5/0x480
[   27.399885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.400136]  kthread+0x337/0x6f0
[   27.400505]  ret_from_fork+0x116/0x1d0
[   27.400839]  ret_from_fork_asm+0x1a/0x30
[   27.401155] 
[   27.401250] The buggy address belongs to the object at ffff8881053c7b80
[   27.401250]  which belongs to the cache kmalloc-64 of size 64
[   27.401810] The buggy address is located 0 bytes to the right of
[   27.401810]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.402259] 
[   27.402546] The buggy address belongs to the physical page:
[   27.402967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.403395] flags: 0x200000000000000(node=0|zone=2)
[   27.403604] page_type: f5(slab)
[   27.403798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.404261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.404751] page dumped because: kasan: bad access detected
[   27.405052] 
[   27.405147] Memory state around the buggy address:
[   27.405439]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.405775]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.406189] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.406548]                                      ^
[   27.406748]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.407232]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.407625] ==================================================================
[   27.116781] ==================================================================
[   27.117401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   27.117875] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.118554] 
[   27.118677] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.118728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.118740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.118763] Call Trace:
[   27.118781]  <TASK>
[   27.118798]  dump_stack_lvl+0x73/0xb0
[   27.118833]  print_report+0xd1/0x640
[   27.118856]  ? __virt_addr_valid+0x1db/0x2d0
[   27.118879]  ? kasan_atomics_helper+0x565/0x5450
[   27.118899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.118924]  ? kasan_atomics_helper+0x565/0x5450
[   27.118944]  kasan_report+0x141/0x180
[   27.118965]  ? kasan_atomics_helper+0x565/0x5450
[   27.118990]  kasan_check_range+0x10c/0x1c0
[   27.119013]  __kasan_check_write+0x18/0x20
[   27.119035]  kasan_atomics_helper+0x565/0x5450
[   27.119056]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.119077]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.119101]  ? kasan_atomics+0x152/0x310
[   27.119126]  kasan_atomics+0x1dc/0x310
[   27.119148]  ? __pfx_kasan_atomics+0x10/0x10
[   27.119170]  ? __pfx_read_tsc+0x10/0x10
[   27.119192]  ? ktime_get_ts64+0x86/0x230
[   27.119216]  kunit_try_run_case+0x1a5/0x480
[   27.119240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.119262]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.119308]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.119340]  ? __kthread_parkme+0x82/0x180
[   27.119361]  ? preempt_count_sub+0x50/0x80
[   27.119384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.119407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.119430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.119465]  kthread+0x337/0x6f0
[   27.119484]  ? trace_preempt_on+0x20/0xc0
[   27.119507]  ? __pfx_kthread+0x10/0x10
[   27.119540]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.119569]  ? calculate_sigpending+0x7b/0xa0
[   27.119593]  ? __pfx_kthread+0x10/0x10
[   27.119614]  ret_from_fork+0x116/0x1d0
[   27.119633]  ? __pfx_kthread+0x10/0x10
[   27.119662]  ret_from_fork_asm+0x1a/0x30
[   27.119693]  </TASK>
[   27.119703] 
[   27.127904] Allocated by task 313:
[   27.128084]  kasan_save_stack+0x45/0x70
[   27.128230]  kasan_save_track+0x18/0x40
[   27.128413]  kasan_save_alloc_info+0x3b/0x50
[   27.128622]  __kasan_kmalloc+0xb7/0xc0
[   27.128802]  __kmalloc_cache_noprof+0x189/0x420
[   27.128982]  kasan_atomics+0x95/0x310
[   27.129376]  kunit_try_run_case+0x1a5/0x480
[   27.129575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.129846]  kthread+0x337/0x6f0
[   27.130054]  ret_from_fork+0x116/0x1d0
[   27.130204]  ret_from_fork_asm+0x1a/0x30
[   27.130421] 
[   27.130492] The buggy address belongs to the object at ffff8881053c7b80
[   27.130492]  which belongs to the cache kmalloc-64 of size 64
[   27.130850] The buggy address is located 0 bytes to the right of
[   27.130850]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.131210] 
[   27.131332] The buggy address belongs to the physical page:
[   27.131586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.131931] flags: 0x200000000000000(node=0|zone=2)
[   27.132154] page_type: f5(slab)
[   27.132324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.132987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.133226] page dumped because: kasan: bad access detected
[   27.133465] 
[   27.133552] Memory state around the buggy address:
[   27.133783]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.134114]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.134461] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.134767]                                      ^
[   27.135005]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.135327]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.135635] ==================================================================
[   27.408128] ==================================================================
[   27.408929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   27.409255] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.409607] 
[   27.409710] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.409758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.409772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.409955] Call Trace:
[   27.409979]  <TASK>
[   27.410033]  dump_stack_lvl+0x73/0xb0
[   27.410068]  print_report+0xd1/0x640
[   27.410091]  ? __virt_addr_valid+0x1db/0x2d0
[   27.410115]  ? kasan_atomics_helper+0xd47/0x5450
[   27.410136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.410192]  ? kasan_atomics_helper+0xd47/0x5450
[   27.410214]  kasan_report+0x141/0x180
[   27.410236]  ? kasan_atomics_helper+0xd47/0x5450
[   27.410262]  kasan_check_range+0x10c/0x1c0
[   27.410287]  __kasan_check_write+0x18/0x20
[   27.410322]  kasan_atomics_helper+0xd47/0x5450
[   27.410345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.410367]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.410393]  ? kasan_atomics+0x152/0x310
[   27.410419]  kasan_atomics+0x1dc/0x310
[   27.410442]  ? __pfx_kasan_atomics+0x10/0x10
[   27.410501]  ? __pfx_read_tsc+0x10/0x10
[   27.410524]  ? ktime_get_ts64+0x86/0x230
[   27.410550]  kunit_try_run_case+0x1a5/0x480
[   27.410576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.410598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.410665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.410745]  ? __kthread_parkme+0x82/0x180
[   27.410767]  ? preempt_count_sub+0x50/0x80
[   27.410791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.410838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.410863]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.410910]  kthread+0x337/0x6f0
[   27.410993]  ? trace_preempt_on+0x20/0xc0
[   27.411018]  ? __pfx_kthread+0x10/0x10
[   27.411039]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.411070]  ? calculate_sigpending+0x7b/0xa0
[   27.411096]  ? __pfx_kthread+0x10/0x10
[   27.411118]  ret_from_fork+0x116/0x1d0
[   27.411137]  ? __pfx_kthread+0x10/0x10
[   27.411158]  ret_from_fork_asm+0x1a/0x30
[   27.411189]  </TASK>
[   27.411201] 
[   27.420272] Allocated by task 313:
[   27.420469]  kasan_save_stack+0x45/0x70
[   27.420618]  kasan_save_track+0x18/0x40
[   27.420877]  kasan_save_alloc_info+0x3b/0x50
[   27.421080]  __kasan_kmalloc+0xb7/0xc0
[   27.421258]  __kmalloc_cache_noprof+0x189/0x420
[   27.421570]  kasan_atomics+0x95/0x310
[   27.421718]  kunit_try_run_case+0x1a5/0x480
[   27.422008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.422253]  kthread+0x337/0x6f0
[   27.422380]  ret_from_fork+0x116/0x1d0
[   27.422503]  ret_from_fork_asm+0x1a/0x30
[   27.422632] 
[   27.422702] The buggy address belongs to the object at ffff8881053c7b80
[   27.422702]  which belongs to the cache kmalloc-64 of size 64
[   27.423163] The buggy address is located 0 bytes to the right of
[   27.423163]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.423813] 
[   27.423908] The buggy address belongs to the physical page:
[   27.424378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.424942] flags: 0x200000000000000(node=0|zone=2)
[   27.425349] page_type: f5(slab)
[   27.425469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.425716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.426394] page dumped because: kasan: bad access detected
[   27.426631] 
[   27.426700] Memory state around the buggy address:
[   27.426845]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.427077]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.427632] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.427959]                                      ^
[   27.428356]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.428669]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.429059] ==================================================================
[   28.082691] ==================================================================
[   28.083191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   28.083446] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.083782] 
[   28.083939] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.083986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.083999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.084020] Call Trace:
[   28.084036]  <TASK>
[   28.084049]  dump_stack_lvl+0x73/0xb0
[   28.084079]  print_report+0xd1/0x640
[   28.084101]  ? __virt_addr_valid+0x1db/0x2d0
[   28.084124]  ? kasan_atomics_helper+0x1c18/0x5450
[   28.084145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.084171]  ? kasan_atomics_helper+0x1c18/0x5450
[   28.084194]  kasan_report+0x141/0x180
[   28.084216]  ? kasan_atomics_helper+0x1c18/0x5450
[   28.084241]  kasan_check_range+0x10c/0x1c0
[   28.084266]  __kasan_check_write+0x18/0x20
[   28.084289]  kasan_atomics_helper+0x1c18/0x5450
[   28.084312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.084348]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.084372]  ? kasan_atomics+0x152/0x310
[   28.084399]  kasan_atomics+0x1dc/0x310
[   28.084423]  ? __pfx_kasan_atomics+0x10/0x10
[   28.084447]  ? __pfx_read_tsc+0x10/0x10
[   28.084469]  ? ktime_get_ts64+0x86/0x230
[   28.084494]  kunit_try_run_case+0x1a5/0x480
[   28.084521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.084543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.084579]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.084613]  ? __kthread_parkme+0x82/0x180
[   28.084633]  ? preempt_count_sub+0x50/0x80
[   28.084657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.084681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.084704]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.084728]  kthread+0x337/0x6f0
[   28.084749]  ? trace_preempt_on+0x20/0xc0
[   28.084771]  ? __pfx_kthread+0x10/0x10
[   28.084793]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.084824]  ? calculate_sigpending+0x7b/0xa0
[   28.084848]  ? __pfx_kthread+0x10/0x10
[   28.084869]  ret_from_fork+0x116/0x1d0
[   28.084889]  ? __pfx_kthread+0x10/0x10
[   28.084910]  ret_from_fork_asm+0x1a/0x30
[   28.084942]  </TASK>
[   28.084953] 
[   28.092993] Allocated by task 313:
[   28.093167]  kasan_save_stack+0x45/0x70
[   28.093309]  kasan_save_track+0x18/0x40
[   28.093457]  kasan_save_alloc_info+0x3b/0x50
[   28.093599]  __kasan_kmalloc+0xb7/0xc0
[   28.093725]  __kmalloc_cache_noprof+0x189/0x420
[   28.093920]  kasan_atomics+0x95/0x310
[   28.094176]  kunit_try_run_case+0x1a5/0x480
[   28.094392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.094637]  kthread+0x337/0x6f0
[   28.094806]  ret_from_fork+0x116/0x1d0
[   28.094987]  ret_from_fork_asm+0x1a/0x30
[   28.095177] 
[   28.095265] The buggy address belongs to the object at ffff8881053c7b80
[   28.095265]  which belongs to the cache kmalloc-64 of size 64
[   28.095661] The buggy address is located 0 bytes to the right of
[   28.095661]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.096202] 
[   28.096280] The buggy address belongs to the physical page:
[   28.096663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.097097] flags: 0x200000000000000(node=0|zone=2)
[   28.097314] page_type: f5(slab)
[   28.097493] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.097778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.098070] page dumped because: kasan: bad access detected
[   28.098274] 
[   28.098368] Memory state around the buggy address:
[   28.098565]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.098793]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.099104] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.099439]                                      ^
[   28.099665]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.100087]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.100304] ==================================================================
[   28.328176] ==================================================================
[   28.329054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   28.329605] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.329819] 
[   28.329897] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.329942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.329955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.329978] Call Trace:
[   28.329996]  <TASK>
[   28.330011]  dump_stack_lvl+0x73/0xb0
[   28.330042]  print_report+0xd1/0x640
[   28.330081]  ? __virt_addr_valid+0x1db/0x2d0
[   28.330105]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.330126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.330152]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.330174]  kasan_report+0x141/0x180
[   28.330197]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.330223]  __asan_report_load8_noabort+0x18/0x20
[   28.330260]  kasan_atomics_helper+0x4f98/0x5450
[   28.330284]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.330305]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.330340]  ? kasan_atomics+0x152/0x310
[   28.330366]  kasan_atomics+0x1dc/0x310
[   28.330389]  ? __pfx_kasan_atomics+0x10/0x10
[   28.330413]  ? __pfx_read_tsc+0x10/0x10
[   28.330435]  ? ktime_get_ts64+0x86/0x230
[   28.330460]  kunit_try_run_case+0x1a5/0x480
[   28.330484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.330507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.330542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.330576]  ? __kthread_parkme+0x82/0x180
[   28.330596]  ? preempt_count_sub+0x50/0x80
[   28.330619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.330643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.330672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.330695]  kthread+0x337/0x6f0
[   28.330715]  ? trace_preempt_on+0x20/0xc0
[   28.330739]  ? __pfx_kthread+0x10/0x10
[   28.330760]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.330790]  ? calculate_sigpending+0x7b/0xa0
[   28.330826]  ? __pfx_kthread+0x10/0x10
[   28.330859]  ret_from_fork+0x116/0x1d0
[   28.330878]  ? __pfx_kthread+0x10/0x10
[   28.331140]  ret_from_fork_asm+0x1a/0x30
[   28.331171]  </TASK>
[   28.331182] 
[   28.339720] Allocated by task 313:
[   28.339847]  kasan_save_stack+0x45/0x70
[   28.339990]  kasan_save_track+0x18/0x40
[   28.340182]  kasan_save_alloc_info+0x3b/0x50
[   28.340487]  __kasan_kmalloc+0xb7/0xc0
[   28.341343]  __kmalloc_cache_noprof+0x189/0x420
[   28.341533]  kasan_atomics+0x95/0x310
[   28.341720]  kunit_try_run_case+0x1a5/0x480
[   28.342031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.342365]  kthread+0x337/0x6f0
[   28.342537]  ret_from_fork+0x116/0x1d0
[   28.342815]  ret_from_fork_asm+0x1a/0x30
[   28.343160] 
[   28.343317] The buggy address belongs to the object at ffff8881053c7b80
[   28.343317]  which belongs to the cache kmalloc-64 of size 64
[   28.343791] The buggy address is located 0 bytes to the right of
[   28.343791]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.344576] 
[   28.344658] The buggy address belongs to the physical page:
[   28.344901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.345663] flags: 0x200000000000000(node=0|zone=2)
[   28.345958] page_type: f5(slab)
[   28.346118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.346432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.346801] page dumped because: kasan: bad access detected
[   28.347056] 
[   28.347146] Memory state around the buggy address:
[   28.347573]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.348056]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.348391] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.348808]                                      ^
[   28.349153]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.349893]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.350534] ==================================================================
[   28.008528] ==================================================================
[   28.008831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   28.009180] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.009450] 
[   28.009555] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.009613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.009626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.009649] Call Trace:
[   28.009664]  <TASK>
[   28.009678]  dump_stack_lvl+0x73/0xb0
[   28.009708]  print_report+0xd1/0x640
[   28.009731]  ? __virt_addr_valid+0x1db/0x2d0
[   28.009754]  ? kasan_atomics_helper+0x194a/0x5450
[   28.009775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.009943]  ? kasan_atomics_helper+0x194a/0x5450
[   28.009972]  kasan_report+0x141/0x180
[   28.009995]  ? kasan_atomics_helper+0x194a/0x5450
[   28.010022]  kasan_check_range+0x10c/0x1c0
[   28.010046]  __kasan_check_write+0x18/0x20
[   28.010070]  kasan_atomics_helper+0x194a/0x5450
[   28.010093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.010115]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.010140]  ? kasan_atomics+0x152/0x310
[   28.010166]  kasan_atomics+0x1dc/0x310
[   28.010188]  ? __pfx_kasan_atomics+0x10/0x10
[   28.010214]  ? __pfx_read_tsc+0x10/0x10
[   28.010235]  ? ktime_get_ts64+0x86/0x230
[   28.010260]  kunit_try_run_case+0x1a5/0x480
[   28.010284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.010307]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.010359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.010393]  ? __kthread_parkme+0x82/0x180
[   28.010413]  ? preempt_count_sub+0x50/0x80
[   28.010439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.010462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.010486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.010509]  kthread+0x337/0x6f0
[   28.010530]  ? trace_preempt_on+0x20/0xc0
[   28.010553]  ? __pfx_kthread+0x10/0x10
[   28.010574]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.010604]  ? calculate_sigpending+0x7b/0xa0
[   28.010628]  ? __pfx_kthread+0x10/0x10
[   28.010650]  ret_from_fork+0x116/0x1d0
[   28.010673]  ? __pfx_kthread+0x10/0x10
[   28.010694]  ret_from_fork_asm+0x1a/0x30
[   28.010725]  </TASK>
[   28.010736] 
[   28.019371] Allocated by task 313:
[   28.019537]  kasan_save_stack+0x45/0x70
[   28.019715]  kasan_save_track+0x18/0x40
[   28.019907]  kasan_save_alloc_info+0x3b/0x50
[   28.020168]  __kasan_kmalloc+0xb7/0xc0
[   28.020370]  __kmalloc_cache_noprof+0x189/0x420
[   28.020541]  kasan_atomics+0x95/0x310
[   28.020669]  kunit_try_run_case+0x1a5/0x480
[   28.020808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.020977]  kthread+0x337/0x6f0
[   28.021095]  ret_from_fork+0x116/0x1d0
[   28.021291]  ret_from_fork_asm+0x1a/0x30
[   28.021491] 
[   28.021582] The buggy address belongs to the object at ffff8881053c7b80
[   28.021582]  which belongs to the cache kmalloc-64 of size 64
[   28.022078] The buggy address is located 0 bytes to the right of
[   28.022078]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.022774] 
[   28.022877] The buggy address belongs to the physical page:
[   28.023058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.023410] flags: 0x200000000000000(node=0|zone=2)
[   28.023627] page_type: f5(slab)
[   28.023758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.024034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.024255] page dumped because: kasan: bad access detected
[   28.024707] 
[   28.024808] Memory state around the buggy address:
[   28.025096]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.025426]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.025739] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.026277]                                      ^
[   28.026471]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.026691]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.026898] ==================================================================
[   28.118148] ==================================================================
[   28.118494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   28.119225] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.119558] 
[   28.119663] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.119709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.119722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.119744] Call Trace:
[   28.119760]  <TASK>
[   28.119776]  dump_stack_lvl+0x73/0xb0
[   28.119805]  print_report+0xd1/0x640
[   28.119827]  ? __virt_addr_valid+0x1db/0x2d0
[   28.119850]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.119872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.119899]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.119920]  kasan_report+0x141/0x180
[   28.119943]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.119969]  kasan_check_range+0x10c/0x1c0
[   28.119993]  __kasan_check_write+0x18/0x20
[   28.120016]  kasan_atomics_helper+0x1ce1/0x5450
[   28.120039]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.120062]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.120087]  ? kasan_atomics+0x152/0x310
[   28.120113]  kasan_atomics+0x1dc/0x310
[   28.120137]  ? __pfx_kasan_atomics+0x10/0x10
[   28.120161]  ? __pfx_read_tsc+0x10/0x10
[   28.120183]  ? ktime_get_ts64+0x86/0x230
[   28.120209]  kunit_try_run_case+0x1a5/0x480
[   28.120233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.120256]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.120292]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.120336]  ? __kthread_parkme+0x82/0x180
[   28.120356]  ? preempt_count_sub+0x50/0x80
[   28.120379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.120403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.120427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.120450]  kthread+0x337/0x6f0
[   28.120470]  ? trace_preempt_on+0x20/0xc0
[   28.120494]  ? __pfx_kthread+0x10/0x10
[   28.120515]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.120546]  ? calculate_sigpending+0x7b/0xa0
[   28.120570]  ? __pfx_kthread+0x10/0x10
[   28.120592]  ret_from_fork+0x116/0x1d0
[   28.120611]  ? __pfx_kthread+0x10/0x10
[   28.120632]  ret_from_fork_asm+0x1a/0x30
[   28.120663]  </TASK>
[   28.120674] 
[   28.132371] Allocated by task 313:
[   28.132530]  kasan_save_stack+0x45/0x70
[   28.132723]  kasan_save_track+0x18/0x40
[   28.132927]  kasan_save_alloc_info+0x3b/0x50
[   28.133901]  __kasan_kmalloc+0xb7/0xc0
[   28.134048]  __kmalloc_cache_noprof+0x189/0x420
[   28.134285]  kasan_atomics+0x95/0x310
[   28.134492]  kunit_try_run_case+0x1a5/0x480
[   28.134696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.135674]  kthread+0x337/0x6f0
[   28.136000]  ret_from_fork+0x116/0x1d0
[   28.136132]  ret_from_fork_asm+0x1a/0x30
[   28.136348] 
[   28.136441] The buggy address belongs to the object at ffff8881053c7b80
[   28.136441]  which belongs to the cache kmalloc-64 of size 64
[   28.137181] The buggy address is located 0 bytes to the right of
[   28.137181]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.137570] 
[   28.137639] The buggy address belongs to the physical page:
[   28.137806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.138047] flags: 0x200000000000000(node=0|zone=2)
[   28.139446] page_type: f5(slab)
[   28.140159] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.141407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.142793] page dumped because: kasan: bad access detected
[   28.143916] 
[   28.144307] Memory state around the buggy address:
[   28.144929]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.145165]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.145833] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.146908]                                      ^
[   28.147736]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.148700]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.149503] ==================================================================
[   27.511054] ==================================================================
[   27.511390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   27.511702] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.512376] 
[   27.512610] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.512667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.512681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.512808] Call Trace:
[   27.512831]  <TASK>
[   27.512849]  dump_stack_lvl+0x73/0xb0
[   27.512885]  print_report+0xd1/0x640
[   27.512908]  ? __virt_addr_valid+0x1db/0x2d0
[   27.512934]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.512964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.512990]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.513026]  kasan_report+0x141/0x180
[   27.513050]  ? kasan_atomics_helper+0xfa9/0x5450
[   27.513076]  kasan_check_range+0x10c/0x1c0
[   27.513100]  __kasan_check_write+0x18/0x20
[   27.513124]  kasan_atomics_helper+0xfa9/0x5450
[   27.513146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.513169]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.513194]  ? kasan_atomics+0x152/0x310
[   27.513220]  kasan_atomics+0x1dc/0x310
[   27.513243]  ? __pfx_kasan_atomics+0x10/0x10
[   27.513268]  ? __pfx_read_tsc+0x10/0x10
[   27.513292]  ? ktime_get_ts64+0x86/0x230
[   27.513327]  kunit_try_run_case+0x1a5/0x480
[   27.513353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.513376]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.513412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.513446]  ? __kthread_parkme+0x82/0x180
[   27.513468]  ? preempt_count_sub+0x50/0x80
[   27.513493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.513518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.513541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.513566]  kthread+0x337/0x6f0
[   27.513586]  ? trace_preempt_on+0x20/0xc0
[   27.513610]  ? __pfx_kthread+0x10/0x10
[   27.513631]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.513662]  ? calculate_sigpending+0x7b/0xa0
[   27.513686]  ? __pfx_kthread+0x10/0x10
[   27.513709]  ret_from_fork+0x116/0x1d0
[   27.513728]  ? __pfx_kthread+0x10/0x10
[   27.513749]  ret_from_fork_asm+0x1a/0x30
[   27.513780]  </TASK>
[   27.513793] 
[   27.526156] Allocated by task 313:
[   27.526364]  kasan_save_stack+0x45/0x70
[   27.526560]  kasan_save_track+0x18/0x40
[   27.526741]  kasan_save_alloc_info+0x3b/0x50
[   27.527284]  __kasan_kmalloc+0xb7/0xc0
[   27.527659]  __kmalloc_cache_noprof+0x189/0x420
[   27.527996]  kasan_atomics+0x95/0x310
[   27.528372]  kunit_try_run_case+0x1a5/0x480
[   27.528569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.528789]  kthread+0x337/0x6f0
[   27.529205]  ret_from_fork+0x116/0x1d0
[   27.529498]  ret_from_fork_asm+0x1a/0x30
[   27.529827] 
[   27.530075] The buggy address belongs to the object at ffff8881053c7b80
[   27.530075]  which belongs to the cache kmalloc-64 of size 64
[   27.530557] The buggy address is located 0 bytes to the right of
[   27.530557]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.531535] 
[   27.531772] The buggy address belongs to the physical page:
[   27.532257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.532845] flags: 0x200000000000000(node=0|zone=2)
[   27.533196] page_type: f5(slab)
[   27.533514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.534037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.534442] page dumped because: kasan: bad access detected
[   27.534803] 
[   27.534982] Memory state around the buggy address:
[   27.535407]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.535696]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.536486] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.536956]                                      ^
[   27.537438]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.537944]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.538621] ==================================================================
[   27.988248] ==================================================================
[   27.988561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   27.988846] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.989164] 
[   27.989242] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.989287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.989300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.989334] Call Trace:
[   27.989352]  <TASK>
[   27.989368]  dump_stack_lvl+0x73/0xb0
[   27.989398]  print_report+0xd1/0x640
[   27.989421]  ? __virt_addr_valid+0x1db/0x2d0
[   27.989445]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.989466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.989493]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.989515]  kasan_report+0x141/0x180
[   27.989538]  ? kasan_atomics_helper+0x18b1/0x5450
[   27.989564]  kasan_check_range+0x10c/0x1c0
[   27.989589]  __kasan_check_write+0x18/0x20
[   27.989613]  kasan_atomics_helper+0x18b1/0x5450
[   27.989636]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.989658]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.989683]  ? kasan_atomics+0x152/0x310
[   27.989709]  kasan_atomics+0x1dc/0x310
[   27.989732]  ? __pfx_kasan_atomics+0x10/0x10
[   27.989757]  ? __pfx_read_tsc+0x10/0x10
[   27.989779]  ? ktime_get_ts64+0x86/0x230
[   27.989803]  kunit_try_run_case+0x1a5/0x480
[   27.989828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.989851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.989887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.989933]  ? __kthread_parkme+0x82/0x180
[   27.989954]  ? preempt_count_sub+0x50/0x80
[   27.989978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.990013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.990037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.990060]  kthread+0x337/0x6f0
[   27.990081]  ? trace_preempt_on+0x20/0xc0
[   27.990105]  ? __pfx_kthread+0x10/0x10
[   27.990126]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.990157]  ? calculate_sigpending+0x7b/0xa0
[   27.990182]  ? __pfx_kthread+0x10/0x10
[   27.990203]  ret_from_fork+0x116/0x1d0
[   27.990224]  ? __pfx_kthread+0x10/0x10
[   27.990244]  ret_from_fork_asm+0x1a/0x30
[   27.990275]  </TASK>
[   27.990286] 
[   27.998261] Allocated by task 313:
[   27.998398]  kasan_save_stack+0x45/0x70
[   27.998538]  kasan_save_track+0x18/0x40
[   27.998669]  kasan_save_alloc_info+0x3b/0x50
[   27.998882]  __kasan_kmalloc+0xb7/0xc0
[   27.999368]  __kmalloc_cache_noprof+0x189/0x420
[   27.999587]  kasan_atomics+0x95/0x310
[   27.999766]  kunit_try_run_case+0x1a5/0x480
[   27.999967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.000209]  kthread+0x337/0x6f0
[   28.000388]  ret_from_fork+0x116/0x1d0
[   28.000568]  ret_from_fork_asm+0x1a/0x30
[   28.000758] 
[   28.000846] The buggy address belongs to the object at ffff8881053c7b80
[   28.000846]  which belongs to the cache kmalloc-64 of size 64
[   28.002633] The buggy address is located 0 bytes to the right of
[   28.002633]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.003714] 
[   28.003956] The buggy address belongs to the physical page:
[   28.004209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.004513] flags: 0x200000000000000(node=0|zone=2)
[   28.004745] page_type: f5(slab)
[   28.005036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.005338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.005611] page dumped because: kasan: bad access detected
[   28.006065] 
[   28.006148] Memory state around the buggy address:
[   28.006349]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.006651]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.007000] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.007305]                                      ^
[   28.007509]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.007791]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.008064] ==================================================================
[   28.269632] ==================================================================
[   28.270381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   28.271169] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.271881] 
[   28.272057] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.272105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.272119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.272141] Call Trace:
[   28.272171]  <TASK>
[   28.272185]  dump_stack_lvl+0x73/0xb0
[   28.272238]  print_report+0xd1/0x640
[   28.272262]  ? __virt_addr_valid+0x1db/0x2d0
[   28.272285]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.272305]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.272341]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.272362]  kasan_report+0x141/0x180
[   28.272385]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.272411]  __asan_report_load8_noabort+0x18/0x20
[   28.272444]  kasan_atomics_helper+0x4f71/0x5450
[   28.272467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.272490]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.272521]  ? kasan_atomics+0x152/0x310
[   28.272547]  kasan_atomics+0x1dc/0x310
[   28.272570]  ? __pfx_kasan_atomics+0x10/0x10
[   28.272594]  ? __pfx_read_tsc+0x10/0x10
[   28.272616]  ? ktime_get_ts64+0x86/0x230
[   28.272642]  kunit_try_run_case+0x1a5/0x480
[   28.272667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.272690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.272729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.272765]  ? __kthread_parkme+0x82/0x180
[   28.272786]  ? preempt_count_sub+0x50/0x80
[   28.272810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.272834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.272859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.272882]  kthread+0x337/0x6f0
[   28.272902]  ? trace_preempt_on+0x20/0xc0
[   28.272925]  ? __pfx_kthread+0x10/0x10
[   28.272946]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.272977]  ? calculate_sigpending+0x7b/0xa0
[   28.273002]  ? __pfx_kthread+0x10/0x10
[   28.273045]  ret_from_fork+0x116/0x1d0
[   28.273066]  ? __pfx_kthread+0x10/0x10
[   28.273094]  ret_from_fork_asm+0x1a/0x30
[   28.273126]  </TASK>
[   28.273137] 
[   28.285916] Allocated by task 313:
[   28.286067]  kasan_save_stack+0x45/0x70
[   28.286209]  kasan_save_track+0x18/0x40
[   28.286347]  kasan_save_alloc_info+0x3b/0x50
[   28.286555]  __kasan_kmalloc+0xb7/0xc0
[   28.286777]  __kmalloc_cache_noprof+0x189/0x420
[   28.287138]  kasan_atomics+0x95/0x310
[   28.287443]  kunit_try_run_case+0x1a5/0x480
[   28.287694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.288252]  kthread+0x337/0x6f0
[   28.288593]  ret_from_fork+0x116/0x1d0
[   28.288929]  ret_from_fork_asm+0x1a/0x30
[   28.289315] 
[   28.289449] The buggy address belongs to the object at ffff8881053c7b80
[   28.289449]  which belongs to the cache kmalloc-64 of size 64
[   28.290349] The buggy address is located 0 bytes to the right of
[   28.290349]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.291312] 
[   28.291474] The buggy address belongs to the physical page:
[   28.291731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.292211] flags: 0x200000000000000(node=0|zone=2)
[   28.292699] page_type: f5(slab)
[   28.293091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.293479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.293701] page dumped because: kasan: bad access detected
[   28.294451] 
[   28.294603] Memory state around the buggy address:
[   28.295138]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.295881]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.296751] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.297437]                                      ^
[   28.297893]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.298481]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.298695] ==================================================================
[   27.364301] ==================================================================
[   27.364643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   27.365186] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.365502] 
[   27.365589] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.365639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.365652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.365676] Call Trace:
[   27.365689]  <TASK>
[   27.365705]  dump_stack_lvl+0x73/0xb0
[   27.365737]  print_report+0xd1/0x640
[   27.365761]  ? __virt_addr_valid+0x1db/0x2d0
[   27.365785]  ? kasan_atomics_helper+0xc70/0x5450
[   27.365878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.365906]  ? kasan_atomics_helper+0xc70/0x5450
[   27.365928]  kasan_report+0x141/0x180
[   27.365951]  ? kasan_atomics_helper+0xc70/0x5450
[   27.365977]  kasan_check_range+0x10c/0x1c0
[   27.366003]  __kasan_check_write+0x18/0x20
[   27.366027]  kasan_atomics_helper+0xc70/0x5450
[   27.366050]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.366073]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.366098]  ? kasan_atomics+0x152/0x310
[   27.366125]  kasan_atomics+0x1dc/0x310
[   27.366148]  ? __pfx_kasan_atomics+0x10/0x10
[   27.366173]  ? __pfx_read_tsc+0x10/0x10
[   27.366196]  ? ktime_get_ts64+0x86/0x230
[   27.366222]  kunit_try_run_case+0x1a5/0x480
[   27.366247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.366271]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.366321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.366405]  ? __kthread_parkme+0x82/0x180
[   27.366430]  ? preempt_count_sub+0x50/0x80
[   27.366455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.366479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.366505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.366529]  kthread+0x337/0x6f0
[   27.366550]  ? trace_preempt_on+0x20/0xc0
[   27.366574]  ? __pfx_kthread+0x10/0x10
[   27.366596]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.366627]  ? calculate_sigpending+0x7b/0xa0
[   27.366659]  ? __pfx_kthread+0x10/0x10
[   27.366681]  ret_from_fork+0x116/0x1d0
[   27.366701]  ? __pfx_kthread+0x10/0x10
[   27.366723]  ret_from_fork_asm+0x1a/0x30
[   27.366755]  </TASK>
[   27.366768] 
[   27.376722] Allocated by task 313:
[   27.377007]  kasan_save_stack+0x45/0x70
[   27.377256]  kasan_save_track+0x18/0x40
[   27.377477]  kasan_save_alloc_info+0x3b/0x50
[   27.377685]  __kasan_kmalloc+0xb7/0xc0
[   27.378077]  __kmalloc_cache_noprof+0x189/0x420
[   27.378275]  kasan_atomics+0x95/0x310
[   27.378452]  kunit_try_run_case+0x1a5/0x480
[   27.378595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.378770]  kthread+0x337/0x6f0
[   27.379144]  ret_from_fork+0x116/0x1d0
[   27.379364]  ret_from_fork_asm+0x1a/0x30
[   27.379564] 
[   27.379655] The buggy address belongs to the object at ffff8881053c7b80
[   27.379655]  which belongs to the cache kmalloc-64 of size 64
[   27.380341] The buggy address is located 0 bytes to the right of
[   27.380341]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.380799] 
[   27.380916] The buggy address belongs to the physical page:
[   27.381166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.381764] flags: 0x200000000000000(node=0|zone=2)
[   27.382209] page_type: f5(slab)
[   27.382357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.382735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.383265] page dumped because: kasan: bad access detected
[   27.383495] 
[   27.383560] Memory state around the buggy address:
[   27.383705]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.384462]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.384752] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.385332]                                      ^
[   27.385572]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.385984]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.386239] ==================================================================
[   27.539489] ==================================================================
[   27.540223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   27.540564] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.540947] 
[   27.541242] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.541532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.541553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.541578] Call Trace:
[   27.541599]  <TASK>
[   27.541617]  dump_stack_lvl+0x73/0xb0
[   27.541650]  print_report+0xd1/0x640
[   27.541716]  ? __virt_addr_valid+0x1db/0x2d0
[   27.541744]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.541766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.541793]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.541826]  kasan_report+0x141/0x180
[   27.541878]  ? kasan_atomics_helper+0x4a36/0x5450
[   27.541904]  __asan_report_load4_noabort+0x18/0x20
[   27.541929]  kasan_atomics_helper+0x4a36/0x5450
[   27.541951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.541974]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.542000]  ? kasan_atomics+0x152/0x310
[   27.542026]  kasan_atomics+0x1dc/0x310
[   27.542049]  ? __pfx_kasan_atomics+0x10/0x10
[   27.542074]  ? __pfx_read_tsc+0x10/0x10
[   27.542096]  ? ktime_get_ts64+0x86/0x230
[   27.542123]  kunit_try_run_case+0x1a5/0x480
[   27.542147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.542170]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.542207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.542240]  ? __kthread_parkme+0x82/0x180
[   27.542261]  ? preempt_count_sub+0x50/0x80
[   27.542285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.542323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.542348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.542372]  kthread+0x337/0x6f0
[   27.542393]  ? trace_preempt_on+0x20/0xc0
[   27.542417]  ? __pfx_kthread+0x10/0x10
[   27.542438]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.542469]  ? calculate_sigpending+0x7b/0xa0
[   27.542494]  ? __pfx_kthread+0x10/0x10
[   27.542516]  ret_from_fork+0x116/0x1d0
[   27.542536]  ? __pfx_kthread+0x10/0x10
[   27.542557]  ret_from_fork_asm+0x1a/0x30
[   27.542589]  </TASK>
[   27.542601] 
[   27.554807] Allocated by task 313:
[   27.555162]  kasan_save_stack+0x45/0x70
[   27.555575]  kasan_save_track+0x18/0x40
[   27.555764]  kasan_save_alloc_info+0x3b/0x50
[   27.556110]  __kasan_kmalloc+0xb7/0xc0
[   27.556288]  __kmalloc_cache_noprof+0x189/0x420
[   27.556493]  kasan_atomics+0x95/0x310
[   27.556661]  kunit_try_run_case+0x1a5/0x480
[   27.557110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.557541]  kthread+0x337/0x6f0
[   27.557838]  ret_from_fork+0x116/0x1d0
[   27.558164]  ret_from_fork_asm+0x1a/0x30
[   27.558498] 
[   27.558600] The buggy address belongs to the object at ffff8881053c7b80
[   27.558600]  which belongs to the cache kmalloc-64 of size 64
[   27.559407] The buggy address is located 0 bytes to the right of
[   27.559407]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.560355] 
[   27.560586] The buggy address belongs to the physical page:
[   27.561033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.561555] flags: 0x200000000000000(node=0|zone=2)
[   27.561778] page_type: f5(slab)
[   27.562105] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.562633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.563101] page dumped because: kasan: bad access detected
[   27.563499] 
[   27.563589] Memory state around the buggy address:
[   27.564009]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.564446]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.564918] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.565604]                                      ^
[   27.566010]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.566605]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.567134] ==================================================================
[   27.877665] ==================================================================
[   27.878076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   27.878397] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.879170] 
[   27.879276] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.879340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.879427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.879452] Call Trace:
[   27.879468]  <TASK>
[   27.879484]  dump_stack_lvl+0x73/0xb0
[   27.879517]  print_report+0xd1/0x640
[   27.879540]  ? __virt_addr_valid+0x1db/0x2d0
[   27.879564]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.879586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.879616]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.879639]  kasan_report+0x141/0x180
[   27.879661]  ? kasan_atomics_helper+0x15b6/0x5450
[   27.879687]  kasan_check_range+0x10c/0x1c0
[   27.879711]  __kasan_check_write+0x18/0x20
[   27.879735]  kasan_atomics_helper+0x15b6/0x5450
[   27.879757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.879780]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.879806]  ? kasan_atomics+0x152/0x310
[   27.879833]  kasan_atomics+0x1dc/0x310
[   27.879925]  ? __pfx_kasan_atomics+0x10/0x10
[   27.879951]  ? __pfx_read_tsc+0x10/0x10
[   27.879973]  ? ktime_get_ts64+0x86/0x230
[   27.879998]  kunit_try_run_case+0x1a5/0x480
[   27.880022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.880045]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.880173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.880208]  ? __kthread_parkme+0x82/0x180
[   27.880228]  ? preempt_count_sub+0x50/0x80
[   27.880251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.880275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.880299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.880335]  kthread+0x337/0x6f0
[   27.880355]  ? trace_preempt_on+0x20/0xc0
[   27.880379]  ? __pfx_kthread+0x10/0x10
[   27.880402]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.880436]  ? calculate_sigpending+0x7b/0xa0
[   27.880462]  ? __pfx_kthread+0x10/0x10
[   27.880485]  ret_from_fork+0x116/0x1d0
[   27.880505]  ? __pfx_kthread+0x10/0x10
[   27.880525]  ret_from_fork_asm+0x1a/0x30
[   27.880558]  </TASK>
[   27.880570] 
[   27.890536] Allocated by task 313:
[   27.890722]  kasan_save_stack+0x45/0x70
[   27.890967]  kasan_save_track+0x18/0x40
[   27.891103]  kasan_save_alloc_info+0x3b/0x50
[   27.891288]  __kasan_kmalloc+0xb7/0xc0
[   27.891924]  __kmalloc_cache_noprof+0x189/0x420
[   27.892118]  kasan_atomics+0x95/0x310
[   27.892413]  kunit_try_run_case+0x1a5/0x480
[   27.892554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.892829]  kthread+0x337/0x6f0
[   27.892990]  ret_from_fork+0x116/0x1d0
[   27.893140]  ret_from_fork_asm+0x1a/0x30
[   27.893569] 
[   27.893674] The buggy address belongs to the object at ffff8881053c7b80
[   27.893674]  which belongs to the cache kmalloc-64 of size 64
[   27.894497] The buggy address is located 0 bytes to the right of
[   27.894497]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.895109] 
[   27.895208] The buggy address belongs to the physical page:
[   27.895511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.896170] flags: 0x200000000000000(node=0|zone=2)
[   27.896397] page_type: f5(slab)
[   27.896571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.896938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.897463] page dumped because: kasan: bad access detected
[   27.897697] 
[   27.897782] Memory state around the buggy address:
[   27.898103]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.898577]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.898937] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.899364]                                      ^
[   27.899549]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.899951]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.900462] ==================================================================
[   27.452441] ==================================================================
[   27.452759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   27.453316] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.453623] 
[   27.453728] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.453780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.454136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.454173] Call Trace:
[   27.454194]  <TASK>
[   27.454212]  dump_stack_lvl+0x73/0xb0
[   27.454247]  print_report+0xd1/0x640
[   27.454518]  ? __virt_addr_valid+0x1db/0x2d0
[   27.454551]  ? kasan_atomics_helper+0xe78/0x5450
[   27.454575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.454601]  ? kasan_atomics_helper+0xe78/0x5450
[   27.454623]  kasan_report+0x141/0x180
[   27.454646]  ? kasan_atomics_helper+0xe78/0x5450
[   27.454680]  kasan_check_range+0x10c/0x1c0
[   27.454704]  __kasan_check_write+0x18/0x20
[   27.454729]  kasan_atomics_helper+0xe78/0x5450
[   27.454753]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.454777]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.455014]  ? kasan_atomics+0x152/0x310
[   27.455045]  kasan_atomics+0x1dc/0x310
[   27.455069]  ? __pfx_kasan_atomics+0x10/0x10
[   27.455094]  ? __pfx_read_tsc+0x10/0x10
[   27.455116]  ? ktime_get_ts64+0x86/0x230
[   27.455142]  kunit_try_run_case+0x1a5/0x480
[   27.455167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.455191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.455227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.455260]  ? __kthread_parkme+0x82/0x180
[   27.455282]  ? preempt_count_sub+0x50/0x80
[   27.455322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.455346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.455370]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.455394]  kthread+0x337/0x6f0
[   27.455414]  ? trace_preempt_on+0x20/0xc0
[   27.455438]  ? __pfx_kthread+0x10/0x10
[   27.455459]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.455490]  ? calculate_sigpending+0x7b/0xa0
[   27.455515]  ? __pfx_kthread+0x10/0x10
[   27.455537]  ret_from_fork+0x116/0x1d0
[   27.455556]  ? __pfx_kthread+0x10/0x10
[   27.455577]  ret_from_fork_asm+0x1a/0x30
[   27.455609]  </TASK>
[   27.455621] 
[   27.468403] Allocated by task 313:
[   27.468591]  kasan_save_stack+0x45/0x70
[   27.468786]  kasan_save_track+0x18/0x40
[   27.469627]  kasan_save_alloc_info+0x3b/0x50
[   27.470121]  __kasan_kmalloc+0xb7/0xc0
[   27.470389]  __kmalloc_cache_noprof+0x189/0x420
[   27.470609]  kasan_atomics+0x95/0x310
[   27.470784]  kunit_try_run_case+0x1a5/0x480
[   27.471365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.471602]  kthread+0x337/0x6f0
[   27.471755]  ret_from_fork+0x116/0x1d0
[   27.472074]  ret_from_fork_asm+0x1a/0x30
[   27.472252] 
[   27.472346] The buggy address belongs to the object at ffff8881053c7b80
[   27.472346]  which belongs to the cache kmalloc-64 of size 64
[   27.472821] The buggy address is located 0 bytes to the right of
[   27.472821]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.474079] 
[   27.474181] The buggy address belongs to the physical page:
[   27.474669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.475371] flags: 0x200000000000000(node=0|zone=2)
[   27.475833] page_type: f5(slab)
[   27.476124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.476786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.477385] page dumped because: kasan: bad access detected
[   27.477766] 
[   27.478028] Memory state around the buggy address:
[   27.478230]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.478543]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.479091] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.479569]                                      ^
[   27.480039]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.480543]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.480992] ==================================================================
[   27.223183] ==================================================================
[   27.223471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   27.223800] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.224379] 
[   27.224489] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.224558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.224584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.224608] Call Trace:
[   27.224639]  <TASK>
[   27.224668]  dump_stack_lvl+0x73/0xb0
[   27.224700]  print_report+0xd1/0x640
[   27.224736]  ? __virt_addr_valid+0x1db/0x2d0
[   27.224759]  ? kasan_atomics_helper+0x860/0x5450
[   27.224779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.224805]  ? kasan_atomics_helper+0x860/0x5450
[   27.224825]  kasan_report+0x141/0x180
[   27.224846]  ? kasan_atomics_helper+0x860/0x5450
[   27.224871]  kasan_check_range+0x10c/0x1c0
[   27.224895]  __kasan_check_write+0x18/0x20
[   27.224937]  kasan_atomics_helper+0x860/0x5450
[   27.224960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.224981]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.225006]  ? kasan_atomics+0x152/0x310
[   27.225030]  kasan_atomics+0x1dc/0x310
[   27.225052]  ? __pfx_kasan_atomics+0x10/0x10
[   27.225075]  ? __pfx_read_tsc+0x10/0x10
[   27.225096]  ? ktime_get_ts64+0x86/0x230
[   27.225120]  kunit_try_run_case+0x1a5/0x480
[   27.225144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.225166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.225200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.225329]  ? __kthread_parkme+0x82/0x180
[   27.225352]  ? preempt_count_sub+0x50/0x80
[   27.225375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.225399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.225421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.225443]  kthread+0x337/0x6f0
[   27.225463]  ? trace_preempt_on+0x20/0xc0
[   27.225485]  ? __pfx_kthread+0x10/0x10
[   27.225507]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.225559]  ? calculate_sigpending+0x7b/0xa0
[   27.225585]  ? __pfx_kthread+0x10/0x10
[   27.225606]  ret_from_fork+0x116/0x1d0
[   27.225639]  ? __pfx_kthread+0x10/0x10
[   27.225659]  ret_from_fork_asm+0x1a/0x30
[   27.225703]  </TASK>
[   27.225714] 
[   27.235726] Allocated by task 313:
[   27.235980]  kasan_save_stack+0x45/0x70
[   27.236160]  kasan_save_track+0x18/0x40
[   27.236338]  kasan_save_alloc_info+0x3b/0x50
[   27.236547]  __kasan_kmalloc+0xb7/0xc0
[   27.236727]  __kmalloc_cache_noprof+0x189/0x420
[   27.236921]  kasan_atomics+0x95/0x310
[   27.237099]  kunit_try_run_case+0x1a5/0x480
[   27.238210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.238464]  kthread+0x337/0x6f0
[   27.238597]  ret_from_fork+0x116/0x1d0
[   27.239020]  ret_from_fork_asm+0x1a/0x30
[   27.239356] 
[   27.239456] The buggy address belongs to the object at ffff8881053c7b80
[   27.239456]  which belongs to the cache kmalloc-64 of size 64
[   27.240206] The buggy address is located 0 bytes to the right of
[   27.240206]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.241005] 
[   27.241098] The buggy address belongs to the physical page:
[   27.241501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.241978] flags: 0x200000000000000(node=0|zone=2)
[   27.242325] page_type: f5(slab)
[   27.242458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.242951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.243352] page dumped because: kasan: bad access detected
[   27.243596] 
[   27.243666] Memory state around the buggy address:
[   27.244039]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.244352]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.244634] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.244920]                                      ^
[   27.245114]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.245901]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.246278] ==================================================================
[   26.920902] ==================================================================
[   26.922442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   26.923094] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   26.923392] 
[   26.923497] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   26.923548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.923560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.923583] Call Trace:
[   26.923597]  <TASK>
[   26.923615]  dump_stack_lvl+0x73/0xb0
[   26.923649]  print_report+0xd1/0x640
[   26.923672]  ? __virt_addr_valid+0x1db/0x2d0
[   26.923697]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.923718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.923743]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.923764]  kasan_report+0x141/0x180
[   26.923786]  ? kasan_atomics_helper+0x4bbc/0x5450
[   26.923869]  __asan_report_load4_noabort+0x18/0x20
[   26.923896]  kasan_atomics_helper+0x4bbc/0x5450
[   26.923918]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.923939]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.923964]  ? kasan_atomics+0x152/0x310
[   26.923990]  kasan_atomics+0x1dc/0x310
[   26.924013]  ? __pfx_kasan_atomics+0x10/0x10
[   26.924036]  ? __pfx_read_tsc+0x10/0x10
[   26.924057]  ? ktime_get_ts64+0x86/0x230
[   26.924082]  kunit_try_run_case+0x1a5/0x480
[   26.924107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.924128]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.924163]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.924196]  ? __kthread_parkme+0x82/0x180
[   26.924216]  ? preempt_count_sub+0x50/0x80
[   26.924239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.924262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.924297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.924320]  kthread+0x337/0x6f0
[   26.924338]  ? trace_preempt_on+0x20/0xc0
[   26.924361]  ? __pfx_kthread+0x10/0x10
[   26.924381]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.924411]  ? calculate_sigpending+0x7b/0xa0
[   26.924435]  ? __pfx_kthread+0x10/0x10
[   26.924456]  ret_from_fork+0x116/0x1d0
[   26.924474]  ? __pfx_kthread+0x10/0x10
[   26.924493]  ret_from_fork_asm+0x1a/0x30
[   26.924523]  </TASK>
[   26.924535] 
[   26.937467] Allocated by task 313:
[   26.937615]  kasan_save_stack+0x45/0x70
[   26.937762]  kasan_save_track+0x18/0x40
[   26.938523]  kasan_save_alloc_info+0x3b/0x50
[   26.938973]  __kasan_kmalloc+0xb7/0xc0
[   26.939408]  __kmalloc_cache_noprof+0x189/0x420
[   26.939817]  kasan_atomics+0x95/0x310
[   26.940250]  kunit_try_run_case+0x1a5/0x480
[   26.940482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.940658]  kthread+0x337/0x6f0
[   26.940772]  ret_from_fork+0x116/0x1d0
[   26.941162]  ret_from_fork_asm+0x1a/0x30
[   26.941591] 
[   26.941741] The buggy address belongs to the object at ffff8881053c7b80
[   26.941741]  which belongs to the cache kmalloc-64 of size 64
[   26.943102] The buggy address is located 0 bytes to the right of
[   26.943102]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   26.943689] 
[   26.943763] The buggy address belongs to the physical page:
[   26.944225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   26.944939] flags: 0x200000000000000(node=0|zone=2)
[   26.945456] page_type: f5(slab)
[   26.945621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.946026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.946855] page dumped because: kasan: bad access detected
[   26.947435] 
[   26.947591] Memory state around the buggy address:
[   26.948068]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.948297]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.948508] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.948714]                                      ^
[   26.948887]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.949257]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.949576] ==================================================================
[   27.636236] ==================================================================
[   27.636828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   27.637186] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.637523] 
[   27.637627] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.637674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.637687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.637710] Call Trace:
[   27.637728]  <TASK>
[   27.637744]  dump_stack_lvl+0x73/0xb0
[   27.637775]  print_report+0xd1/0x640
[   27.637822]  ? __virt_addr_valid+0x1db/0x2d0
[   27.637871]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.637893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.637919]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.637941]  kasan_report+0x141/0x180
[   27.637963]  ? kasan_atomics_helper+0x4a02/0x5450
[   27.637990]  __asan_report_load4_noabort+0x18/0x20
[   27.638013]  kasan_atomics_helper+0x4a02/0x5450
[   27.638036]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.638058]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.638083]  ? kasan_atomics+0x152/0x310
[   27.638109]  kasan_atomics+0x1dc/0x310
[   27.638132]  ? __pfx_kasan_atomics+0x10/0x10
[   27.638157]  ? __pfx_read_tsc+0x10/0x10
[   27.638179]  ? ktime_get_ts64+0x86/0x230
[   27.638205]  kunit_try_run_case+0x1a5/0x480
[   27.638231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.638253]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.638289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.638335]  ? __kthread_parkme+0x82/0x180
[   27.638356]  ? preempt_count_sub+0x50/0x80
[   27.638379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.638406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.638430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.638454]  kthread+0x337/0x6f0
[   27.638475]  ? trace_preempt_on+0x20/0xc0
[   27.638499]  ? __pfx_kthread+0x10/0x10
[   27.638520]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.638551]  ? calculate_sigpending+0x7b/0xa0
[   27.638575]  ? __pfx_kthread+0x10/0x10
[   27.638598]  ret_from_fork+0x116/0x1d0
[   27.638617]  ? __pfx_kthread+0x10/0x10
[   27.638638]  ret_from_fork_asm+0x1a/0x30
[   27.638674]  </TASK>
[   27.638686] 
[   27.645910] Allocated by task 313:
[   27.646058]  kasan_save_stack+0x45/0x70
[   27.646255]  kasan_save_track+0x18/0x40
[   27.646431]  kasan_save_alloc_info+0x3b/0x50
[   27.646633]  __kasan_kmalloc+0xb7/0xc0
[   27.646793]  __kmalloc_cache_noprof+0x189/0x420
[   27.646992]  kasan_atomics+0x95/0x310
[   27.647152]  kunit_try_run_case+0x1a5/0x480
[   27.647379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.647592]  kthread+0x337/0x6f0
[   27.647760]  ret_from_fork+0x116/0x1d0
[   27.647940]  ret_from_fork_asm+0x1a/0x30
[   27.648125] 
[   27.648213] The buggy address belongs to the object at ffff8881053c7b80
[   27.648213]  which belongs to the cache kmalloc-64 of size 64
[   27.648673] The buggy address is located 0 bytes to the right of
[   27.648673]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.649158] 
[   27.649251] The buggy address belongs to the physical page:
[   27.649547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.649792] flags: 0x200000000000000(node=0|zone=2)
[   27.649947] page_type: f5(slab)
[   27.650063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.650318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.650651] page dumped because: kasan: bad access detected
[   27.650900] 
[   27.650989] Memory state around the buggy address:
[   27.651207]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.651548]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.651860] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.652112]                                      ^
[   27.652260]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.652594]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.653250] ==================================================================
[   27.765914] ==================================================================
[   27.766634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   27.766984] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.767397] 
[   27.767486] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.767536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.767549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.767573] Call Trace:
[   27.767594]  <TASK>
[   27.767613]  dump_stack_lvl+0x73/0xb0
[   27.767645]  print_report+0xd1/0x640
[   27.767669]  ? __virt_addr_valid+0x1db/0x2d0
[   27.767693]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.767715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.767741]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.767763]  kasan_report+0x141/0x180
[   27.767786]  ? kasan_atomics_helper+0x13b5/0x5450
[   27.767822]  kasan_check_range+0x10c/0x1c0
[   27.767859]  __kasan_check_read+0x15/0x20
[   27.767884]  kasan_atomics_helper+0x13b5/0x5450
[   27.767908]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.767930]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.767955]  ? kasan_atomics+0x152/0x310
[   27.767982]  kasan_atomics+0x1dc/0x310
[   27.768004]  ? __pfx_kasan_atomics+0x10/0x10
[   27.768029]  ? __pfx_read_tsc+0x10/0x10
[   27.768051]  ? ktime_get_ts64+0x86/0x230
[   27.768078]  kunit_try_run_case+0x1a5/0x480
[   27.768103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.768126]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.768169]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.768203]  ? __kthread_parkme+0x82/0x180
[   27.768224]  ? preempt_count_sub+0x50/0x80
[   27.768248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.768272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.768296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.768333]  kthread+0x337/0x6f0
[   27.768353]  ? trace_preempt_on+0x20/0xc0
[   27.768377]  ? __pfx_kthread+0x10/0x10
[   27.768398]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.768429]  ? calculate_sigpending+0x7b/0xa0
[   27.768454]  ? __pfx_kthread+0x10/0x10
[   27.768476]  ret_from_fork+0x116/0x1d0
[   27.768497]  ? __pfx_kthread+0x10/0x10
[   27.768517]  ret_from_fork_asm+0x1a/0x30
[   27.768549]  </TASK>
[   27.768561] 
[   27.776213] Allocated by task 313:
[   27.776370]  kasan_save_stack+0x45/0x70
[   27.776509]  kasan_save_track+0x18/0x40
[   27.776633]  kasan_save_alloc_info+0x3b/0x50
[   27.776771]  __kasan_kmalloc+0xb7/0xc0
[   27.776963]  __kmalloc_cache_noprof+0x189/0x420
[   27.777178]  kasan_atomics+0x95/0x310
[   27.777375]  kunit_try_run_case+0x1a5/0x480
[   27.777593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.777910]  kthread+0x337/0x6f0
[   27.778022]  ret_from_fork+0x116/0x1d0
[   27.778143]  ret_from_fork_asm+0x1a/0x30
[   27.778273] 
[   27.778397] The buggy address belongs to the object at ffff8881053c7b80
[   27.778397]  which belongs to the cache kmalloc-64 of size 64
[   27.779216] The buggy address is located 0 bytes to the right of
[   27.779216]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.779844] 
[   27.779996] The buggy address belongs to the physical page:
[   27.780231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.780569] flags: 0x200000000000000(node=0|zone=2)
[   27.780790] page_type: f5(slab)
[   27.780919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.781137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.781552] page dumped because: kasan: bad access detected
[   27.781852] 
[   27.781920] Memory state around the buggy address:
[   27.782221]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.782602]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.783007] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.783209]                                      ^
[   27.783365]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.783569]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.783768] ==================================================================
[   27.901056] ==================================================================
[   27.901459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   27.901912] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.902196] 
[   27.902279] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.902337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.902351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.902374] Call Trace:
[   27.902653]  <TASK>
[   27.902682]  dump_stack_lvl+0x73/0xb0
[   27.902716]  print_report+0xd1/0x640
[   27.902738]  ? __virt_addr_valid+0x1db/0x2d0
[   27.902763]  ? kasan_atomics_helper+0x164f/0x5450
[   27.902784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.902821]  ? kasan_atomics_helper+0x164f/0x5450
[   27.902843]  kasan_report+0x141/0x180
[   27.902865]  ? kasan_atomics_helper+0x164f/0x5450
[   27.902891]  kasan_check_range+0x10c/0x1c0
[   27.902914]  __kasan_check_write+0x18/0x20
[   27.902937]  kasan_atomics_helper+0x164f/0x5450
[   27.902961]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.903119]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.903147]  ? kasan_atomics+0x152/0x310
[   27.903173]  kasan_atomics+0x1dc/0x310
[   27.903196]  ? __pfx_kasan_atomics+0x10/0x10
[   27.903220]  ? __pfx_read_tsc+0x10/0x10
[   27.903243]  ? ktime_get_ts64+0x86/0x230
[   27.903269]  kunit_try_run_case+0x1a5/0x480
[   27.903293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.903329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.903365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.903399]  ? __kthread_parkme+0x82/0x180
[   27.903420]  ? preempt_count_sub+0x50/0x80
[   27.903444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.903468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.903491]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.903515]  kthread+0x337/0x6f0
[   27.903535]  ? trace_preempt_on+0x20/0xc0
[   27.903559]  ? __pfx_kthread+0x10/0x10
[   27.903580]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.903611]  ? calculate_sigpending+0x7b/0xa0
[   27.903636]  ? __pfx_kthread+0x10/0x10
[   27.903661]  ret_from_fork+0x116/0x1d0
[   27.903681]  ? __pfx_kthread+0x10/0x10
[   27.903702]  ret_from_fork_asm+0x1a/0x30
[   27.903733]  </TASK>
[   27.903744] 
[   27.914532] Allocated by task 313:
[   27.914708]  kasan_save_stack+0x45/0x70
[   27.914875]  kasan_save_track+0x18/0x40
[   27.915163]  kasan_save_alloc_info+0x3b/0x50
[   27.915748]  __kasan_kmalloc+0xb7/0xc0
[   27.915978]  __kmalloc_cache_noprof+0x189/0x420
[   27.916279]  kasan_atomics+0x95/0x310
[   27.916510]  kunit_try_run_case+0x1a5/0x480
[   27.916712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.917070]  kthread+0x337/0x6f0
[   27.917375]  ret_from_fork+0x116/0x1d0
[   27.917828]  ret_from_fork_asm+0x1a/0x30
[   27.918024] 
[   27.918090] The buggy address belongs to the object at ffff8881053c7b80
[   27.918090]  which belongs to the cache kmalloc-64 of size 64
[   27.918602] The buggy address is located 0 bytes to the right of
[   27.918602]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.919481] 
[   27.919649] The buggy address belongs to the physical page:
[   27.920042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.920495] flags: 0x200000000000000(node=0|zone=2)
[   27.920825] page_type: f5(slab)
[   27.921069] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.921742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.922188] page dumped because: kasan: bad access detected
[   27.922424] 
[   27.922588] Memory state around the buggy address:
[   27.922775]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.923224]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.923666] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.924067]                                      ^
[   27.924277]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.924586]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.925197] ==================================================================
[   28.374616] ==================================================================
[   28.374926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   28.375361] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.375598] 
[   28.375969] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.376023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.376036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.376058] Call Trace:
[   28.376077]  <TASK>
[   28.376094]  dump_stack_lvl+0x73/0xb0
[   28.376125]  print_report+0xd1/0x640
[   28.376148]  ? __virt_addr_valid+0x1db/0x2d0
[   28.376171]  ? kasan_atomics_helper+0x4fb2/0x5450
[   28.376192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.376218]  ? kasan_atomics_helper+0x4fb2/0x5450
[   28.376241]  kasan_report+0x141/0x180
[   28.376264]  ? kasan_atomics_helper+0x4fb2/0x5450
[   28.376289]  __asan_report_load8_noabort+0x18/0x20
[   28.376315]  kasan_atomics_helper+0x4fb2/0x5450
[   28.376351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.376373]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.376398]  ? kasan_atomics+0x152/0x310
[   28.376423]  kasan_atomics+0x1dc/0x310
[   28.376446]  ? __pfx_kasan_atomics+0x10/0x10
[   28.376469]  ? __pfx_read_tsc+0x10/0x10
[   28.376491]  ? ktime_get_ts64+0x86/0x230
[   28.376515]  kunit_try_run_case+0x1a5/0x480
[   28.376540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.376562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.376596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.376630]  ? __kthread_parkme+0x82/0x180
[   28.376650]  ? preempt_count_sub+0x50/0x80
[   28.376673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.376696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.376720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.376743]  kthread+0x337/0x6f0
[   28.376763]  ? trace_preempt_on+0x20/0xc0
[   28.376786]  ? __pfx_kthread+0x10/0x10
[   28.376819]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.376850]  ? calculate_sigpending+0x7b/0xa0
[   28.376888]  ? __pfx_kthread+0x10/0x10
[   28.376909]  ret_from_fork+0x116/0x1d0
[   28.376928]  ? __pfx_kthread+0x10/0x10
[   28.376950]  ret_from_fork_asm+0x1a/0x30
[   28.376981]  </TASK>
[   28.376992] 
[   28.384576] Allocated by task 313:
[   28.384773]  kasan_save_stack+0x45/0x70
[   28.384973]  kasan_save_track+0x18/0x40
[   28.385185]  kasan_save_alloc_info+0x3b/0x50
[   28.385337]  __kasan_kmalloc+0xb7/0xc0
[   28.385464]  __kmalloc_cache_noprof+0x189/0x420
[   28.385613]  kasan_atomics+0x95/0x310
[   28.385739]  kunit_try_run_case+0x1a5/0x480
[   28.385889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.386223]  kthread+0x337/0x6f0
[   28.386405]  ret_from_fork+0x116/0x1d0
[   28.386589]  ret_from_fork_asm+0x1a/0x30
[   28.386797] 
[   28.386886] The buggy address belongs to the object at ffff8881053c7b80
[   28.386886]  which belongs to the cache kmalloc-64 of size 64
[   28.387268] The buggy address is located 0 bytes to the right of
[   28.387268]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.387639] 
[   28.387707] The buggy address belongs to the physical page:
[   28.388051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.388424] flags: 0x200000000000000(node=0|zone=2)
[   28.388658] page_type: f5(slab)
[   28.388827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.389452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.389740] page dumped because: kasan: bad access detected
[   28.389912] 
[   28.389974] Memory state around the buggy address:
[   28.390124]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.390344]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.390553] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.390920]                                      ^
[   28.391282]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.391601]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.391864] ==================================================================
[   27.925642] ==================================================================
[   27.926048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   27.926422] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.926643] 
[   27.926731] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.926777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.926791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.926814] Call Trace:
[   27.926830]  <TASK>
[   27.926843]  dump_stack_lvl+0x73/0xb0
[   27.926884]  print_report+0xd1/0x640
[   27.926907]  ? __virt_addr_valid+0x1db/0x2d0
[   27.926930]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.926952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.926979]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.927000]  kasan_report+0x141/0x180
[   27.927022]  ? kasan_atomics_helper+0x16e7/0x5450
[   27.927048]  kasan_check_range+0x10c/0x1c0
[   27.927072]  __kasan_check_write+0x18/0x20
[   27.927096]  kasan_atomics_helper+0x16e7/0x5450
[   27.927119]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.927141]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.927165]  ? kasan_atomics+0x152/0x310
[   27.927192]  kasan_atomics+0x1dc/0x310
[   27.927215]  ? __pfx_kasan_atomics+0x10/0x10
[   27.927240]  ? __pfx_read_tsc+0x10/0x10
[   27.927261]  ? ktime_get_ts64+0x86/0x230
[   27.927286]  kunit_try_run_case+0x1a5/0x480
[   27.927320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.927343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.927379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.927413]  ? __kthread_parkme+0x82/0x180
[   27.927433]  ? preempt_count_sub+0x50/0x80
[   27.927456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.927480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.927502]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.927527]  kthread+0x337/0x6f0
[   27.927546]  ? trace_preempt_on+0x20/0xc0
[   27.927569]  ? __pfx_kthread+0x10/0x10
[   27.927590]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.927620]  ? calculate_sigpending+0x7b/0xa0
[   27.927644]  ? __pfx_kthread+0x10/0x10
[   27.927666]  ret_from_fork+0x116/0x1d0
[   27.927686]  ? __pfx_kthread+0x10/0x10
[   27.927706]  ret_from_fork_asm+0x1a/0x30
[   27.927736]  </TASK>
[   27.927748] 
[   27.936089] Allocated by task 313:
[   27.936210]  kasan_save_stack+0x45/0x70
[   27.936354]  kasan_save_track+0x18/0x40
[   27.936544]  kasan_save_alloc_info+0x3b/0x50
[   27.936758]  __kasan_kmalloc+0xb7/0xc0
[   27.936936]  __kmalloc_cache_noprof+0x189/0x420
[   27.937151]  kasan_atomics+0x95/0x310
[   27.937355]  kunit_try_run_case+0x1a5/0x480
[   27.937557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.937753]  kthread+0x337/0x6f0
[   27.937868]  ret_from_fork+0x116/0x1d0
[   27.937995]  ret_from_fork_asm+0x1a/0x30
[   27.938144] 
[   27.938235] The buggy address belongs to the object at ffff8881053c7b80
[   27.938235]  which belongs to the cache kmalloc-64 of size 64
[   27.938761] The buggy address is located 0 bytes to the right of
[   27.938761]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.939250] 
[   27.939342] The buggy address belongs to the physical page:
[   27.939567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.939883] flags: 0x200000000000000(node=0|zone=2)
[   27.940090] page_type: f5(slab)
[   27.940238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.942151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.942471] page dumped because: kasan: bad access detected
[   27.942727] 
[   27.942832] Memory state around the buggy address:
[   27.943427]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.943706]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.944303] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.944632]                                      ^
[   27.944912]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.945193]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.945461] ==================================================================
[   28.241478] ==================================================================
[   28.241772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   28.242212] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.243291] 
[   28.243413] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.243580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.243598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.243623] Call Trace:
[   28.243642]  <TASK>
[   28.243658]  dump_stack_lvl+0x73/0xb0
[   28.243809]  print_report+0xd1/0x640
[   28.243877]  ? __virt_addr_valid+0x1db/0x2d0
[   28.243902]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.243924]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.243950]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.243972]  kasan_report+0x141/0x180
[   28.243994]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.244020]  kasan_check_range+0x10c/0x1c0
[   28.244043]  __kasan_check_write+0x18/0x20
[   28.244067]  kasan_atomics_helper+0x1f43/0x5450
[   28.244089]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.244111]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.244135]  ? kasan_atomics+0x152/0x310
[   28.244161]  kasan_atomics+0x1dc/0x310
[   28.244184]  ? __pfx_kasan_atomics+0x10/0x10
[   28.244208]  ? __pfx_read_tsc+0x10/0x10
[   28.244230]  ? ktime_get_ts64+0x86/0x230
[   28.244256]  kunit_try_run_case+0x1a5/0x480
[   28.244280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.244302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.244350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.244383]  ? __kthread_parkme+0x82/0x180
[   28.244404]  ? preempt_count_sub+0x50/0x80
[   28.244428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.244452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.244477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.244500]  kthread+0x337/0x6f0
[   28.244520]  ? trace_preempt_on+0x20/0xc0
[   28.244543]  ? __pfx_kthread+0x10/0x10
[   28.244564]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.244594]  ? calculate_sigpending+0x7b/0xa0
[   28.244620]  ? __pfx_kthread+0x10/0x10
[   28.244642]  ret_from_fork+0x116/0x1d0
[   28.244662]  ? __pfx_kthread+0x10/0x10
[   28.244683]  ret_from_fork_asm+0x1a/0x30
[   28.244714]  </TASK>
[   28.244726] 
[   28.255551] Allocated by task 313:
[   28.255682]  kasan_save_stack+0x45/0x70
[   28.255837]  kasan_save_track+0x18/0x40
[   28.255967]  kasan_save_alloc_info+0x3b/0x50
[   28.256112]  __kasan_kmalloc+0xb7/0xc0
[   28.256239]  __kmalloc_cache_noprof+0x189/0x420
[   28.256412]  kasan_atomics+0x95/0x310
[   28.256542]  kunit_try_run_case+0x1a5/0x480
[   28.256683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.256850]  kthread+0x337/0x6f0
[   28.256964]  ret_from_fork+0x116/0x1d0
[   28.257089]  ret_from_fork_asm+0x1a/0x30
[   28.257222] 
[   28.257288] The buggy address belongs to the object at ffff8881053c7b80
[   28.257288]  which belongs to the cache kmalloc-64 of size 64
[   28.258293] The buggy address is located 0 bytes to the right of
[   28.258293]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.259341] 
[   28.259495] The buggy address belongs to the physical page:
[   28.260115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.261049] flags: 0x200000000000000(node=0|zone=2)
[   28.261534] page_type: f5(slab)
[   28.261836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.262626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.263415] page dumped because: kasan: bad access detected
[   28.263967] 
[   28.264131] Memory state around the buggy address:
[   28.264675]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.265412]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.266097] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.266816]                                      ^
[   28.267437]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.268096]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.268801] ==================================================================
[   28.350927] ==================================================================
[   28.351153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   28.351402] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.351713] 
[   28.351801] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.352015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.352030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.352053] Call Trace:
[   28.352070]  <TASK>
[   28.352084]  dump_stack_lvl+0x73/0xb0
[   28.352115]  print_report+0xd1/0x640
[   28.352137]  ? __virt_addr_valid+0x1db/0x2d0
[   28.352161]  ? kasan_atomics_helper+0x20c8/0x5450
[   28.352182]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.352208]  ? kasan_atomics_helper+0x20c8/0x5450
[   28.352231]  kasan_report+0x141/0x180
[   28.352253]  ? kasan_atomics_helper+0x20c8/0x5450
[   28.352279]  kasan_check_range+0x10c/0x1c0
[   28.352303]  __kasan_check_write+0x18/0x20
[   28.352342]  kasan_atomics_helper+0x20c8/0x5450
[   28.352365]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.352388]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.352412]  ? kasan_atomics+0x152/0x310
[   28.352438]  kasan_atomics+0x1dc/0x310
[   28.352462]  ? __pfx_kasan_atomics+0x10/0x10
[   28.352486]  ? __pfx_read_tsc+0x10/0x10
[   28.352508]  ? ktime_get_ts64+0x86/0x230
[   28.352532]  kunit_try_run_case+0x1a5/0x480
[   28.352556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.352579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.352614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.352648]  ? __kthread_parkme+0x82/0x180
[   28.352668]  ? preempt_count_sub+0x50/0x80
[   28.352692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.352715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.352739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.352763]  kthread+0x337/0x6f0
[   28.352782]  ? trace_preempt_on+0x20/0xc0
[   28.352805]  ? __pfx_kthread+0x10/0x10
[   28.352827]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.353289]  ? calculate_sigpending+0x7b/0xa0
[   28.353320]  ? __pfx_kthread+0x10/0x10
[   28.353356]  ret_from_fork+0x116/0x1d0
[   28.353376]  ? __pfx_kthread+0x10/0x10
[   28.353397]  ret_from_fork_asm+0x1a/0x30
[   28.353427]  </TASK>
[   28.353438] 
[   28.363232] Allocated by task 313:
[   28.363557]  kasan_save_stack+0x45/0x70
[   28.363709]  kasan_save_track+0x18/0x40
[   28.363991]  kasan_save_alloc_info+0x3b/0x50
[   28.364484]  __kasan_kmalloc+0xb7/0xc0
[   28.364687]  __kmalloc_cache_noprof+0x189/0x420
[   28.364967]  kasan_atomics+0x95/0x310
[   28.365387]  kunit_try_run_case+0x1a5/0x480
[   28.365658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.366056]  kthread+0x337/0x6f0
[   28.366193]  ret_from_fork+0x116/0x1d0
[   28.366523]  ret_from_fork_asm+0x1a/0x30
[   28.366712] 
[   28.366801] The buggy address belongs to the object at ffff8881053c7b80
[   28.366801]  which belongs to the cache kmalloc-64 of size 64
[   28.367574] The buggy address is located 0 bytes to the right of
[   28.367574]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.368288] 
[   28.368459] The buggy address belongs to the physical page:
[   28.368755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.369359] flags: 0x200000000000000(node=0|zone=2)
[   28.369535] page_type: f5(slab)
[   28.369705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.370134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.370571] page dumped because: kasan: bad access detected
[   28.370871] 
[   28.371085] Memory state around the buggy address:
[   28.371451]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.371915]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.372260] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.372757]                                      ^
[   28.372964]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.373462]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.373920] ==================================================================
[   27.031149] ==================================================================
[   27.031875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   27.032556] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.033248] 
[   27.033437] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.033487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.033510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.033532] Call Trace:
[   27.033551]  <TASK>
[   27.033567]  dump_stack_lvl+0x73/0xb0
[   27.033619]  print_report+0xd1/0x640
[   27.033642]  ? __virt_addr_valid+0x1db/0x2d0
[   27.033665]  ? kasan_atomics_helper+0x3df/0x5450
[   27.033695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.033720]  ? kasan_atomics_helper+0x3df/0x5450
[   27.033741]  kasan_report+0x141/0x180
[   27.033762]  ? kasan_atomics_helper+0x3df/0x5450
[   27.033858]  kasan_check_range+0x10c/0x1c0
[   27.033885]  __kasan_check_read+0x15/0x20
[   27.033908]  kasan_atomics_helper+0x3df/0x5450
[   27.033930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.033954]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.033977]  ? kasan_atomics+0x152/0x310
[   27.034003]  kasan_atomics+0x1dc/0x310
[   27.034024]  ? __pfx_kasan_atomics+0x10/0x10
[   27.034047]  ? __pfx_read_tsc+0x10/0x10
[   27.034068]  ? ktime_get_ts64+0x86/0x230
[   27.034093]  kunit_try_run_case+0x1a5/0x480
[   27.034117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.034138]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.034173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.034205]  ? __kthread_parkme+0x82/0x180
[   27.034225]  ? preempt_count_sub+0x50/0x80
[   27.034247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.034270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.034304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.034326]  kthread+0x337/0x6f0
[   27.034346]  ? trace_preempt_on+0x20/0xc0
[   27.034368]  ? __pfx_kthread+0x10/0x10
[   27.034388]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.034418]  ? calculate_sigpending+0x7b/0xa0
[   27.034441]  ? __pfx_kthread+0x10/0x10
[   27.034462]  ret_from_fork+0x116/0x1d0
[   27.034480]  ? __pfx_kthread+0x10/0x10
[   27.034500]  ret_from_fork_asm+0x1a/0x30
[   27.034530]  </TASK>
[   27.034541] 
[   27.043434] Allocated by task 313:
[   27.043624]  kasan_save_stack+0x45/0x70
[   27.043940]  kasan_save_track+0x18/0x40
[   27.044138]  kasan_save_alloc_info+0x3b/0x50
[   27.044325]  __kasan_kmalloc+0xb7/0xc0
[   27.044507]  __kmalloc_cache_noprof+0x189/0x420
[   27.044655]  kasan_atomics+0x95/0x310
[   27.044778]  kunit_try_run_case+0x1a5/0x480
[   27.044935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.045191]  kthread+0x337/0x6f0
[   27.045378]  ret_from_fork+0x116/0x1d0
[   27.045633]  ret_from_fork_asm+0x1a/0x30
[   27.045976] 
[   27.046083] The buggy address belongs to the object at ffff8881053c7b80
[   27.046083]  which belongs to the cache kmalloc-64 of size 64
[   27.046514] The buggy address is located 0 bytes to the right of
[   27.046514]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.047215] 
[   27.047313] The buggy address belongs to the physical page:
[   27.047593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.048093] flags: 0x200000000000000(node=0|zone=2)
[   27.048319] page_type: f5(slab)
[   27.048438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.048662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.048879] page dumped because: kasan: bad access detected
[   27.049041] 
[   27.049102] Memory state around the buggy address:
[   27.049553]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.050263]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.050580] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.050793]                                      ^
[   27.050941]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.051147]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.051412] ==================================================================
[   28.417050] ==================================================================
[   28.417382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   28.417687] Read of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.418592] 
[   28.418825] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.418878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.418901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.418924] Call Trace:
[   28.418941]  <TASK>
[   28.419059]  dump_stack_lvl+0x73/0xb0
[   28.419097]  print_report+0xd1/0x640
[   28.419120]  ? __virt_addr_valid+0x1db/0x2d0
[   28.419145]  ? kasan_atomics_helper+0x4fa5/0x5450
[   28.419166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.419201]  ? kasan_atomics_helper+0x4fa5/0x5450
[   28.419224]  kasan_report+0x141/0x180
[   28.419247]  ? kasan_atomics_helper+0x4fa5/0x5450
[   28.419273]  __asan_report_load8_noabort+0x18/0x20
[   28.419297]  kasan_atomics_helper+0x4fa5/0x5450
[   28.419321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.419352]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.419377]  ? kasan_atomics+0x152/0x310
[   28.419403]  kasan_atomics+0x1dc/0x310
[   28.419426]  ? __pfx_kasan_atomics+0x10/0x10
[   28.419451]  ? __pfx_read_tsc+0x10/0x10
[   28.419473]  ? ktime_get_ts64+0x86/0x230
[   28.419498]  kunit_try_run_case+0x1a5/0x480
[   28.419523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.419545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.419581]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.419614]  ? __kthread_parkme+0x82/0x180
[   28.419635]  ? preempt_count_sub+0x50/0x80
[   28.419659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.419684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.419709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.419733]  kthread+0x337/0x6f0
[   28.419754]  ? trace_preempt_on+0x20/0xc0
[   28.419777]  ? __pfx_kthread+0x10/0x10
[   28.419834]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.419865]  ? calculate_sigpending+0x7b/0xa0
[   28.419890]  ? __pfx_kthread+0x10/0x10
[   28.419912]  ret_from_fork+0x116/0x1d0
[   28.419932]  ? __pfx_kthread+0x10/0x10
[   28.419954]  ret_from_fork_asm+0x1a/0x30
[   28.419986]  </TASK>
[   28.419997] 
[   28.432300] Allocated by task 313:
[   28.432664]  kasan_save_stack+0x45/0x70
[   28.433137]  kasan_save_track+0x18/0x40
[   28.433522]  kasan_save_alloc_info+0x3b/0x50
[   28.433693]  __kasan_kmalloc+0xb7/0xc0
[   28.434055]  __kmalloc_cache_noprof+0x189/0x420
[   28.434496]  kasan_atomics+0x95/0x310
[   28.434901]  kunit_try_run_case+0x1a5/0x480
[   28.435055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.435225]  kthread+0x337/0x6f0
[   28.435352]  ret_from_fork+0x116/0x1d0
[   28.435479]  ret_from_fork_asm+0x1a/0x30
[   28.435614] 
[   28.435679] The buggy address belongs to the object at ffff8881053c7b80
[   28.435679]  which belongs to the cache kmalloc-64 of size 64
[   28.436985] The buggy address is located 0 bytes to the right of
[   28.436985]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.438179] 
[   28.438353] The buggy address belongs to the physical page:
[   28.438904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.439650] flags: 0x200000000000000(node=0|zone=2)
[   28.440262] page_type: f5(slab)
[   28.440596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.441008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.441224] page dumped because: kasan: bad access detected
[   28.441601] 
[   28.441762] Memory state around the buggy address:
[   28.442271]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.442956]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.443579] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.444224]                                      ^
[   28.444406]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.444614]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.444980] ==================================================================
[   27.828641] ==================================================================
[   27.828973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   27.829556] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.829876] 
[   27.829979] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.830025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.830038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.830060] Call Trace:
[   27.830078]  <TASK>
[   27.830094]  dump_stack_lvl+0x73/0xb0
[   27.830124]  print_report+0xd1/0x640
[   27.830145]  ? __virt_addr_valid+0x1db/0x2d0
[   27.830168]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.830188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.830215]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.830236]  kasan_report+0x141/0x180
[   27.830258]  ? kasan_atomics_helper+0x50d4/0x5450
[   27.830283]  __asan_report_store8_noabort+0x1b/0x30
[   27.830318]  kasan_atomics_helper+0x50d4/0x5450
[   27.830341]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.830362]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.830386]  ? kasan_atomics+0x152/0x310
[   27.830411]  kasan_atomics+0x1dc/0x310
[   27.830434]  ? __pfx_kasan_atomics+0x10/0x10
[   27.830457]  ? __pfx_read_tsc+0x10/0x10
[   27.830479]  ? ktime_get_ts64+0x86/0x230
[   27.830506]  kunit_try_run_case+0x1a5/0x480
[   27.830530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.830552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.830588]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.830620]  ? __kthread_parkme+0x82/0x180
[   27.830640]  ? preempt_count_sub+0x50/0x80
[   27.830669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.830693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.830716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.830739]  kthread+0x337/0x6f0
[   27.830759]  ? trace_preempt_on+0x20/0xc0
[   27.830782]  ? __pfx_kthread+0x10/0x10
[   27.830802]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.830832]  ? calculate_sigpending+0x7b/0xa0
[   27.830857]  ? __pfx_kthread+0x10/0x10
[   27.830878]  ret_from_fork+0x116/0x1d0
[   27.830898]  ? __pfx_kthread+0x10/0x10
[   27.830937]  ret_from_fork_asm+0x1a/0x30
[   27.830970]  </TASK>
[   27.830981] 
[   27.838719] Allocated by task 313:
[   27.838917]  kasan_save_stack+0x45/0x70
[   27.839288]  kasan_save_track+0x18/0x40
[   27.839503]  kasan_save_alloc_info+0x3b/0x50
[   27.839737]  __kasan_kmalloc+0xb7/0xc0
[   27.839917]  __kmalloc_cache_noprof+0x189/0x420
[   27.840296]  kasan_atomics+0x95/0x310
[   27.840439]  kunit_try_run_case+0x1a5/0x480
[   27.840627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.840794]  kthread+0x337/0x6f0
[   27.841045]  ret_from_fork+0x116/0x1d0
[   27.841371]  ret_from_fork_asm+0x1a/0x30
[   27.841544] 
[   27.841613] The buggy address belongs to the object at ffff8881053c7b80
[   27.841613]  which belongs to the cache kmalloc-64 of size 64
[   27.841959] The buggy address is located 0 bytes to the right of
[   27.841959]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.843671] 
[   27.843831] The buggy address belongs to the physical page:
[   27.844105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.845730] flags: 0x200000000000000(node=0|zone=2)
[   27.846391] page_type: f5(slab)
[   27.846588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.847117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.847674] page dumped because: kasan: bad access detected
[   27.848026] 
[   27.848215] Memory state around the buggy address:
[   27.848719]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.849356]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.849770] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.850242]                                      ^
[   27.850625]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.851138]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.851636] ==================================================================
[   28.392294] ==================================================================
[   28.392540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   28.392766] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.393372] 
[   28.393478] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.393525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.393538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.393560] Call Trace:
[   28.393579]  <TASK>
[   28.393593]  dump_stack_lvl+0x73/0xb0
[   28.393643]  print_report+0xd1/0x640
[   28.393666]  ? __virt_addr_valid+0x1db/0x2d0
[   28.393690]  ? kasan_atomics_helper+0x218a/0x5450
[   28.393711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.393738]  ? kasan_atomics_helper+0x218a/0x5450
[   28.393759]  kasan_report+0x141/0x180
[   28.393781]  ? kasan_atomics_helper+0x218a/0x5450
[   28.393807]  kasan_check_range+0x10c/0x1c0
[   28.393832]  __kasan_check_write+0x18/0x20
[   28.393855]  kasan_atomics_helper+0x218a/0x5450
[   28.393878]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.393900]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.393925]  ? kasan_atomics+0x152/0x310
[   28.393951]  kasan_atomics+0x1dc/0x310
[   28.393973]  ? __pfx_kasan_atomics+0x10/0x10
[   28.393998]  ? __pfx_read_tsc+0x10/0x10
[   28.394020]  ? ktime_get_ts64+0x86/0x230
[   28.394045]  kunit_try_run_case+0x1a5/0x480
[   28.394070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.394093]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.394129]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.394162]  ? __kthread_parkme+0x82/0x180
[   28.394183]  ? preempt_count_sub+0x50/0x80
[   28.394207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.394231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.394255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.394278]  kthread+0x337/0x6f0
[   28.394298]  ? trace_preempt_on+0x20/0xc0
[   28.394322]  ? __pfx_kthread+0x10/0x10
[   28.394356]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.394386]  ? calculate_sigpending+0x7b/0xa0
[   28.394411]  ? __pfx_kthread+0x10/0x10
[   28.394433]  ret_from_fork+0x116/0x1d0
[   28.394453]  ? __pfx_kthread+0x10/0x10
[   28.394474]  ret_from_fork_asm+0x1a/0x30
[   28.394506]  </TASK>
[   28.394517] 
[   28.403057] Allocated by task 313:
[   28.403194]  kasan_save_stack+0x45/0x70
[   28.403362]  kasan_save_track+0x18/0x40
[   28.403715]  kasan_save_alloc_info+0x3b/0x50
[   28.404136]  __kasan_kmalloc+0xb7/0xc0
[   28.405033]  __kmalloc_cache_noprof+0x189/0x420
[   28.405417]  kasan_atomics+0x95/0x310
[   28.405602]  kunit_try_run_case+0x1a5/0x480
[   28.405798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.406307]  kthread+0x337/0x6f0
[   28.406760]  ret_from_fork+0x116/0x1d0
[   28.406962]  ret_from_fork_asm+0x1a/0x30
[   28.407107] 
[   28.407176] The buggy address belongs to the object at ffff8881053c7b80
[   28.407176]  which belongs to the cache kmalloc-64 of size 64
[   28.408582] The buggy address is located 0 bytes to the right of
[   28.408582]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.409525] 
[   28.409632] The buggy address belongs to the physical page:
[   28.410075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.410562] flags: 0x200000000000000(node=0|zone=2)
[   28.410791] page_type: f5(slab)
[   28.411219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.411692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.412325] page dumped because: kasan: bad access detected
[   28.412872] 
[   28.413102] Memory state around the buggy address:
[   28.413464]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.413759]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.414406] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.414729]                                      ^
[   28.414935]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.415785]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.416274] ==================================================================
[   26.972653] ==================================================================
[   26.973291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   26.973803] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   26.974226] 
[   26.974650] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   26.974778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.974793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.974817] Call Trace:
[   26.974837]  <TASK>
[   26.974855]  dump_stack_lvl+0x73/0xb0
[   26.974891]  print_report+0xd1/0x640
[   26.974914]  ? __virt_addr_valid+0x1db/0x2d0
[   26.974938]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.974958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.974984]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.975004]  kasan_report+0x141/0x180
[   26.975025]  ? kasan_atomics_helper+0x4b88/0x5450
[   26.975050]  __asan_report_load4_noabort+0x18/0x20
[   26.975074]  kasan_atomics_helper+0x4b88/0x5450
[   26.975095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.975118]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.975144]  ? kasan_atomics+0x152/0x310
[   26.975168]  kasan_atomics+0x1dc/0x310
[   26.975190]  ? __pfx_kasan_atomics+0x10/0x10
[   26.975213]  ? __pfx_read_tsc+0x10/0x10
[   26.975236]  ? ktime_get_ts64+0x86/0x230
[   26.975261]  kunit_try_run_case+0x1a5/0x480
[   26.975313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.975335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.975385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.975419]  ? __kthread_parkme+0x82/0x180
[   26.975439]  ? preempt_count_sub+0x50/0x80
[   26.975462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.975485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.975508]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.975530]  kthread+0x337/0x6f0
[   26.975549]  ? trace_preempt_on+0x20/0xc0
[   26.975572]  ? __pfx_kthread+0x10/0x10
[   26.975591]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.975621]  ? calculate_sigpending+0x7b/0xa0
[   26.975645]  ? __pfx_kthread+0x10/0x10
[   26.975666]  ret_from_fork+0x116/0x1d0
[   26.975684]  ? __pfx_kthread+0x10/0x10
[   26.975703]  ret_from_fork_asm+0x1a/0x30
[   26.975734]  </TASK>
[   26.975744] 
[   26.991572] Allocated by task 313:
[   26.991713]  kasan_save_stack+0x45/0x70
[   26.992413]  kasan_save_track+0x18/0x40
[   26.992768]  kasan_save_alloc_info+0x3b/0x50
[   26.993334]  __kasan_kmalloc+0xb7/0xc0
[   26.993743]  __kmalloc_cache_noprof+0x189/0x420
[   26.994224]  kasan_atomics+0x95/0x310
[   26.994427]  kunit_try_run_case+0x1a5/0x480
[   26.994619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.995036]  kthread+0x337/0x6f0
[   26.995183]  ret_from_fork+0x116/0x1d0
[   26.995364]  ret_from_fork_asm+0x1a/0x30
[   26.995557] 
[   26.995631] The buggy address belongs to the object at ffff8881053c7b80
[   26.995631]  which belongs to the cache kmalloc-64 of size 64
[   26.996691] The buggy address is located 0 bytes to the right of
[   26.996691]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   26.997456] 
[   26.997543] The buggy address belongs to the physical page:
[   26.997760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   26.998098] flags: 0x200000000000000(node=0|zone=2)
[   26.998324] page_type: f5(slab)
[   26.998464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.998783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.999078] page dumped because: kasan: bad access detected
[   26.999802] 
[   26.999897] Memory state around the buggy address:
[   27.000057]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.000723]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.001025] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.001664]                                      ^
[   27.001828]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.002039]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.002245] ==================================================================
[   27.739965] ==================================================================
[   27.740277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   27.740602] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.741204] 
[   27.741841] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.741898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.741913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.742049] Call Trace:
[   27.742072]  <TASK>
[   27.742090]  dump_stack_lvl+0x73/0xb0
[   27.742125]  print_report+0xd1/0x640
[   27.742149]  ? __virt_addr_valid+0x1db/0x2d0
[   27.742215]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.742239]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.742265]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.742287]  kasan_report+0x141/0x180
[   27.742319]  ? kasan_atomics_helper+0x49ce/0x5450
[   27.742346]  __asan_report_load4_noabort+0x18/0x20
[   27.742370]  kasan_atomics_helper+0x49ce/0x5450
[   27.742393]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.742415]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.742441]  ? kasan_atomics+0x152/0x310
[   27.742467]  kasan_atomics+0x1dc/0x310
[   27.742490]  ? __pfx_kasan_atomics+0x10/0x10
[   27.742514]  ? __pfx_read_tsc+0x10/0x10
[   27.742537]  ? ktime_get_ts64+0x86/0x230
[   27.742564]  kunit_try_run_case+0x1a5/0x480
[   27.742590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.742614]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.742650]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.742689]  ? __kthread_parkme+0x82/0x180
[   27.742711]  ? preempt_count_sub+0x50/0x80
[   27.742735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.742759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.742783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.742820]  kthread+0x337/0x6f0
[   27.742849]  ? trace_preempt_on+0x20/0xc0
[   27.742873]  ? __pfx_kthread+0x10/0x10
[   27.742895]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.742927]  ? calculate_sigpending+0x7b/0xa0
[   27.742952]  ? __pfx_kthread+0x10/0x10
[   27.742974]  ret_from_fork+0x116/0x1d0
[   27.742994]  ? __pfx_kthread+0x10/0x10
[   27.743014]  ret_from_fork_asm+0x1a/0x30
[   27.743046]  </TASK>
[   27.743058] 
[   27.754558] Allocated by task 313:
[   27.754739]  kasan_save_stack+0x45/0x70
[   27.755015]  kasan_save_track+0x18/0x40
[   27.755204]  kasan_save_alloc_info+0x3b/0x50
[   27.755420]  __kasan_kmalloc+0xb7/0xc0
[   27.755571]  __kmalloc_cache_noprof+0x189/0x420
[   27.756103]  kasan_atomics+0x95/0x310
[   27.756354]  kunit_try_run_case+0x1a5/0x480
[   27.756535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.756757]  kthread+0x337/0x6f0
[   27.757073]  ret_from_fork+0x116/0x1d0
[   27.757210]  ret_from_fork_asm+0x1a/0x30
[   27.757753] 
[   27.757928] The buggy address belongs to the object at ffff8881053c7b80
[   27.757928]  which belongs to the cache kmalloc-64 of size 64
[   27.758646] The buggy address is located 0 bytes to the right of
[   27.758646]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.759572] 
[   27.759737] The buggy address belongs to the physical page:
[   27.760119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.760591] flags: 0x200000000000000(node=0|zone=2)
[   27.760898] page_type: f5(slab)
[   27.761102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.761566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.761882] page dumped because: kasan: bad access detected
[   27.762235] 
[   27.762547] Memory state around the buggy address:
[   27.762718]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.763030]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.763550] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.764032]                                      ^
[   27.764255]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.764717]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.765196] ==================================================================
[   27.272283] ==================================================================
[   27.272602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   27.273076] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.273566] 
[   27.273665] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.273779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.273794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.273818] Call Trace:
[   27.273832]  <TASK>
[   27.273848]  dump_stack_lvl+0x73/0xb0
[   27.273882]  print_report+0xd1/0x640
[   27.273903]  ? __virt_addr_valid+0x1db/0x2d0
[   27.273927]  ? kasan_atomics_helper+0x992/0x5450
[   27.274017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.274043]  ? kasan_atomics_helper+0x992/0x5450
[   27.274064]  kasan_report+0x141/0x180
[   27.274086]  ? kasan_atomics_helper+0x992/0x5450
[   27.274111]  kasan_check_range+0x10c/0x1c0
[   27.274134]  __kasan_check_write+0x18/0x20
[   27.274157]  kasan_atomics_helper+0x992/0x5450
[   27.274178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.274199]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.274223]  ? kasan_atomics+0x152/0x310
[   27.274248]  kasan_atomics+0x1dc/0x310
[   27.274270]  ? __pfx_kasan_atomics+0x10/0x10
[   27.274305]  ? __pfx_read_tsc+0x10/0x10
[   27.274328]  ? ktime_get_ts64+0x86/0x230
[   27.274352]  kunit_try_run_case+0x1a5/0x480
[   27.274376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.274397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.274431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.274463]  ? __kthread_parkme+0x82/0x180
[   27.274483]  ? preempt_count_sub+0x50/0x80
[   27.274505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.274528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.274551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.274573]  kthread+0x337/0x6f0
[   27.274593]  ? trace_preempt_on+0x20/0xc0
[   27.274615]  ? __pfx_kthread+0x10/0x10
[   27.274634]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.274667]  ? calculate_sigpending+0x7b/0xa0
[   27.274691]  ? __pfx_kthread+0x10/0x10
[   27.274712]  ret_from_fork+0x116/0x1d0
[   27.274730]  ? __pfx_kthread+0x10/0x10
[   27.274750]  ret_from_fork_asm+0x1a/0x30
[   27.274780]  </TASK>
[   27.274790] 
[   27.285435] Allocated by task 313:
[   27.285632]  kasan_save_stack+0x45/0x70
[   27.285812]  kasan_save_track+0x18/0x40
[   27.285946]  kasan_save_alloc_info+0x3b/0x50
[   27.286153]  __kasan_kmalloc+0xb7/0xc0
[   27.286327]  __kmalloc_cache_noprof+0x189/0x420
[   27.286524]  kasan_atomics+0x95/0x310
[   27.286695]  kunit_try_run_case+0x1a5/0x480
[   27.286865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.287107]  kthread+0x337/0x6f0
[   27.287257]  ret_from_fork+0x116/0x1d0
[   27.288209]  ret_from_fork_asm+0x1a/0x30
[   27.288380] 
[   27.288714] The buggy address belongs to the object at ffff8881053c7b80
[   27.288714]  which belongs to the cache kmalloc-64 of size 64
[   27.289633] The buggy address is located 0 bytes to the right of
[   27.289633]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.290206] 
[   27.290323] The buggy address belongs to the physical page:
[   27.290776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.291301] flags: 0x200000000000000(node=0|zone=2)
[   27.291536] page_type: f5(slab)
[   27.292053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.292534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.292991] page dumped because: kasan: bad access detected
[   27.293193] 
[   27.293436] Memory state around the buggy address:
[   27.293701]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.294167]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.294469] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.294759]                                      ^
[   27.294954]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.295243]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.295554] ==================================================================
[   27.966558] ==================================================================
[   27.967136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   27.967464] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.967758] 
[   27.967914] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.967960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.967973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.968051] Call Trace:
[   27.968070]  <TASK>
[   27.968086]  dump_stack_lvl+0x73/0xb0
[   27.968116]  print_report+0xd1/0x640
[   27.968139]  ? __virt_addr_valid+0x1db/0x2d0
[   27.968163]  ? kasan_atomics_helper+0x1818/0x5450
[   27.968184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.968211]  ? kasan_atomics_helper+0x1818/0x5450
[   27.968234]  kasan_report+0x141/0x180
[   27.968255]  ? kasan_atomics_helper+0x1818/0x5450
[   27.968282]  kasan_check_range+0x10c/0x1c0
[   27.968310]  __kasan_check_write+0x18/0x20
[   27.968350]  kasan_atomics_helper+0x1818/0x5450
[   27.968373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.968396]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.968421]  ? kasan_atomics+0x152/0x310
[   27.968448]  kasan_atomics+0x1dc/0x310
[   27.968471]  ? __pfx_kasan_atomics+0x10/0x10
[   27.968495]  ? __pfx_read_tsc+0x10/0x10
[   27.968517]  ? ktime_get_ts64+0x86/0x230
[   27.968542]  kunit_try_run_case+0x1a5/0x480
[   27.968567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.968590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.968625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.968658]  ? __kthread_parkme+0x82/0x180
[   27.968679]  ? preempt_count_sub+0x50/0x80
[   27.968703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.968727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.968751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.968774]  kthread+0x337/0x6f0
[   27.968878]  ? trace_preempt_on+0x20/0xc0
[   27.968905]  ? __pfx_kthread+0x10/0x10
[   27.968927]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.968959]  ? calculate_sigpending+0x7b/0xa0
[   27.968984]  ? __pfx_kthread+0x10/0x10
[   27.969007]  ret_from_fork+0x116/0x1d0
[   27.969027]  ? __pfx_kthread+0x10/0x10
[   27.969048]  ret_from_fork_asm+0x1a/0x30
[   27.969079]  </TASK>
[   27.969090] 
[   27.980160] Allocated by task 313:
[   27.980353]  kasan_save_stack+0x45/0x70
[   27.980543]  kasan_save_track+0x18/0x40
[   27.980716]  kasan_save_alloc_info+0x3b/0x50
[   27.980898]  __kasan_kmalloc+0xb7/0xc0
[   27.981063]  __kmalloc_cache_noprof+0x189/0x420
[   27.981215]  kasan_atomics+0x95/0x310
[   27.981354]  kunit_try_run_case+0x1a5/0x480
[   27.981497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.981678]  kthread+0x337/0x6f0
[   27.982114]  ret_from_fork+0x116/0x1d0
[   27.982307]  ret_from_fork_asm+0x1a/0x30
[   27.982512] 
[   27.982602] The buggy address belongs to the object at ffff8881053c7b80
[   27.982602]  which belongs to the cache kmalloc-64 of size 64
[   27.983096] The buggy address is located 0 bytes to the right of
[   27.983096]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.983764] 
[   27.983919] The buggy address belongs to the physical page:
[   27.984155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.984448] flags: 0x200000000000000(node=0|zone=2)
[   27.984626] page_type: f5(slab)
[   27.984791] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.985216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.985537] page dumped because: kasan: bad access detected
[   27.985725] 
[   27.985790] Memory state around the buggy address:
[   27.986066]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.986362]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.986631] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.987045]                                      ^
[   27.987249]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.987530]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.987807] ==================================================================
[   27.598451] ==================================================================
[   27.598693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   27.599038] Read of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.599334] 
[   27.599449] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.599778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.599793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.599817] Call Trace:
[   27.599835]  <TASK>
[   27.599850]  dump_stack_lvl+0x73/0xb0
[   27.599881]  print_report+0xd1/0x640
[   27.599904]  ? __virt_addr_valid+0x1db/0x2d0
[   27.599928]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.599949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.599976]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.599998]  kasan_report+0x141/0x180
[   27.600042]  ? kasan_atomics_helper+0x4a1c/0x5450
[   27.600075]  __asan_report_load4_noabort+0x18/0x20
[   27.600100]  kasan_atomics_helper+0x4a1c/0x5450
[   27.600123]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.600146]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.600172]  ? kasan_atomics+0x152/0x310
[   27.600198]  kasan_atomics+0x1dc/0x310
[   27.600221]  ? __pfx_kasan_atomics+0x10/0x10
[   27.600245]  ? __pfx_read_tsc+0x10/0x10
[   27.600268]  ? ktime_get_ts64+0x86/0x230
[   27.600294]  kunit_try_run_case+0x1a5/0x480
[   27.600331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.600354]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.600390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.600423]  ? __kthread_parkme+0x82/0x180
[   27.600444]  ? preempt_count_sub+0x50/0x80
[   27.600468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.600492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.600515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.600539]  kthread+0x337/0x6f0
[   27.600559]  ? trace_preempt_on+0x20/0xc0
[   27.600582]  ? __pfx_kthread+0x10/0x10
[   27.600605]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.600635]  ? calculate_sigpending+0x7b/0xa0
[   27.600660]  ? __pfx_kthread+0x10/0x10
[   27.600682]  ret_from_fork+0x116/0x1d0
[   27.600701]  ? __pfx_kthread+0x10/0x10
[   27.600722]  ret_from_fork_asm+0x1a/0x30
[   27.600754]  </TASK>
[   27.600766] 
[   27.609219] Allocated by task 313:
[   27.609443]  kasan_save_stack+0x45/0x70
[   27.609587]  kasan_save_track+0x18/0x40
[   27.609716]  kasan_save_alloc_info+0x3b/0x50
[   27.609859]  __kasan_kmalloc+0xb7/0xc0
[   27.610203]  __kmalloc_cache_noprof+0x189/0x420
[   27.610523]  kasan_atomics+0x95/0x310
[   27.610701]  kunit_try_run_case+0x1a5/0x480
[   27.611017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.611247]  kthread+0x337/0x6f0
[   27.611397]  ret_from_fork+0x116/0x1d0
[   27.611624]  ret_from_fork_asm+0x1a/0x30
[   27.611785] 
[   27.611917] The buggy address belongs to the object at ffff8881053c7b80
[   27.611917]  which belongs to the cache kmalloc-64 of size 64
[   27.612462] The buggy address is located 0 bytes to the right of
[   27.612462]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.612872] 
[   27.612938] The buggy address belongs to the physical page:
[   27.613104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.613644] flags: 0x200000000000000(node=0|zone=2)
[   27.613889] page_type: f5(slab)
[   27.614143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.614405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.614907] page dumped because: kasan: bad access detected
[   27.615128] 
[   27.615215] Memory state around the buggy address:
[   27.615395]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.615604]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.615810] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.616015]                                      ^
[   27.616161]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.616375]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.616950] ==================================================================
[   27.072520] ==================================================================
[   27.073109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   27.073468] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.073839] 
[   27.073946] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.073994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.074005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.074121] Call Trace:
[   27.074140]  <TASK>
[   27.074154]  dump_stack_lvl+0x73/0xb0
[   27.074187]  print_report+0xd1/0x640
[   27.074210]  ? __virt_addr_valid+0x1db/0x2d0
[   27.074233]  ? kasan_atomics_helper+0x4a0/0x5450
[   27.074253]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.074291]  ? kasan_atomics_helper+0x4a0/0x5450
[   27.074313]  kasan_report+0x141/0x180
[   27.074334]  ? kasan_atomics_helper+0x4a0/0x5450
[   27.074359]  kasan_check_range+0x10c/0x1c0
[   27.074381]  __kasan_check_write+0x18/0x20
[   27.074404]  kasan_atomics_helper+0x4a0/0x5450
[   27.074425]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.074446]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.074470]  ? kasan_atomics+0x152/0x310
[   27.074495]  kasan_atomics+0x1dc/0x310
[   27.074517]  ? __pfx_kasan_atomics+0x10/0x10
[   27.074540]  ? __pfx_read_tsc+0x10/0x10
[   27.074561]  ? ktime_get_ts64+0x86/0x230
[   27.074586]  kunit_try_run_case+0x1a5/0x480
[   27.074609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.074630]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.074679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.074712]  ? __kthread_parkme+0x82/0x180
[   27.074731]  ? preempt_count_sub+0x50/0x80
[   27.074773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.074797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.074819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.074895]  kthread+0x337/0x6f0
[   27.074919]  ? trace_preempt_on+0x20/0xc0
[   27.074941]  ? __pfx_kthread+0x10/0x10
[   27.074961]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.075005]  ? calculate_sigpending+0x7b/0xa0
[   27.075030]  ? __pfx_kthread+0x10/0x10
[   27.075051]  ret_from_fork+0x116/0x1d0
[   27.075080]  ? __pfx_kthread+0x10/0x10
[   27.075100]  ret_from_fork_asm+0x1a/0x30
[   27.075132]  </TASK>
[   27.075143] 
[   27.083445] Allocated by task 313:
[   27.083623]  kasan_save_stack+0x45/0x70
[   27.083801]  kasan_save_track+0x18/0x40
[   27.083969]  kasan_save_alloc_info+0x3b/0x50
[   27.084164]  __kasan_kmalloc+0xb7/0xc0
[   27.084327]  __kmalloc_cache_noprof+0x189/0x420
[   27.084534]  kasan_atomics+0x95/0x310
[   27.084683]  kunit_try_run_case+0x1a5/0x480
[   27.084885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.085093]  kthread+0x337/0x6f0
[   27.085242]  ret_from_fork+0x116/0x1d0
[   27.085572]  ret_from_fork_asm+0x1a/0x30
[   27.085767] 
[   27.086000] The buggy address belongs to the object at ffff8881053c7b80
[   27.086000]  which belongs to the cache kmalloc-64 of size 64
[   27.086394] The buggy address is located 0 bytes to the right of
[   27.086394]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.086759] 
[   27.086844] The buggy address belongs to the physical page:
[   27.087085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.087606] flags: 0x200000000000000(node=0|zone=2)
[   27.087878] page_type: f5(slab)
[   27.088054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.088634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.088851] page dumped because: kasan: bad access detected
[   27.089012] 
[   27.089168] Memory state around the buggy address:
[   27.089395]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.090045]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.090396] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.090699]                                      ^
[   27.090906]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.091259]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.091563] ==================================================================
[   26.950165] ==================================================================
[   26.950530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   26.951055] Write of size 4 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   26.951358] 
[   26.951466] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   26.951514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.951526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.951549] Call Trace:
[   26.951562]  <TASK>
[   26.951579]  dump_stack_lvl+0x73/0xb0
[   26.951610]  print_report+0xd1/0x640
[   26.951633]  ? __virt_addr_valid+0x1db/0x2d0
[   26.951656]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.951676]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.951702]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.951723]  kasan_report+0x141/0x180
[   26.951744]  ? kasan_atomics_helper+0x4ba2/0x5450
[   26.951769]  __asan_report_store4_noabort+0x1b/0x30
[   26.951793]  kasan_atomics_helper+0x4ba2/0x5450
[   26.951877]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.951901]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.951927]  ? kasan_atomics+0x152/0x310
[   26.951952]  kasan_atomics+0x1dc/0x310
[   26.951974]  ? __pfx_kasan_atomics+0x10/0x10
[   26.951998]  ? __pfx_read_tsc+0x10/0x10
[   26.952020]  ? ktime_get_ts64+0x86/0x230
[   26.952045]  kunit_try_run_case+0x1a5/0x480
[   26.952069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.952093]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.952128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.952160]  ? __kthread_parkme+0x82/0x180
[   26.952181]  ? preempt_count_sub+0x50/0x80
[   26.952205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.952229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.952250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.952285]  kthread+0x337/0x6f0
[   26.952305]  ? trace_preempt_on+0x20/0xc0
[   26.952327]  ? __pfx_kthread+0x10/0x10
[   26.952348]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.952378]  ? calculate_sigpending+0x7b/0xa0
[   26.952403]  ? __pfx_kthread+0x10/0x10
[   26.952423]  ret_from_fork+0x116/0x1d0
[   26.952442]  ? __pfx_kthread+0x10/0x10
[   26.952461]  ret_from_fork_asm+0x1a/0x30
[   26.952491]  </TASK>
[   26.952502] 
[   26.960411] Allocated by task 313:
[   26.960555]  kasan_save_stack+0x45/0x70
[   26.960699]  kasan_save_track+0x18/0x40
[   26.960827]  kasan_save_alloc_info+0x3b/0x50
[   26.960969]  __kasan_kmalloc+0xb7/0xc0
[   26.961092]  __kmalloc_cache_noprof+0x189/0x420
[   26.961315]  kasan_atomics+0x95/0x310
[   26.961492]  kunit_try_run_case+0x1a5/0x480
[   26.961663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.961839]  kthread+0x337/0x6f0
[   26.961955]  ret_from_fork+0x116/0x1d0
[   26.962082]  ret_from_fork_asm+0x1a/0x30
[   26.962215] 
[   26.962287] The buggy address belongs to the object at ffff8881053c7b80
[   26.962287]  which belongs to the cache kmalloc-64 of size 64
[   26.962676] The buggy address is located 0 bytes to the right of
[   26.962676]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   26.964401] 
[   26.964483] The buggy address belongs to the physical page:
[   26.964649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   26.964908] flags: 0x200000000000000(node=0|zone=2)
[   26.965067] page_type: f5(slab)
[   26.965186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.967472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.968737] page dumped because: kasan: bad access detected
[   26.969204] 
[   26.969321] Memory state around the buggy address:
[   26.969551]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.969953]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.970287] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.970552]                                      ^
[   26.970758]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.971047]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.972029] ==================================================================
[   28.064603] ==================================================================
[   28.064992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   28.065307] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.065603] 
[   28.065697] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.065743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.065755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.065778] Call Trace:
[   28.065812]  <TASK>
[   28.065826]  dump_stack_lvl+0x73/0xb0
[   28.065859]  print_report+0xd1/0x640
[   28.065881]  ? __virt_addr_valid+0x1db/0x2d0
[   28.065906]  ? kasan_atomics_helper+0x1b22/0x5450
[   28.065927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.065954]  ? kasan_atomics_helper+0x1b22/0x5450
[   28.065976]  kasan_report+0x141/0x180
[   28.065999]  ? kasan_atomics_helper+0x1b22/0x5450
[   28.066025]  kasan_check_range+0x10c/0x1c0
[   28.066049]  __kasan_check_write+0x18/0x20
[   28.066073]  kasan_atomics_helper+0x1b22/0x5450
[   28.066096]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.066118]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.066143]  ? kasan_atomics+0x152/0x310
[   28.066169]  kasan_atomics+0x1dc/0x310
[   28.066193]  ? __pfx_kasan_atomics+0x10/0x10
[   28.066217]  ? __pfx_read_tsc+0x10/0x10
[   28.066239]  ? ktime_get_ts64+0x86/0x230
[   28.066264]  kunit_try_run_case+0x1a5/0x480
[   28.066289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.066311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.066358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.066392]  ? __kthread_parkme+0x82/0x180
[   28.066412]  ? preempt_count_sub+0x50/0x80
[   28.066436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.066461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.066485]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.066509]  kthread+0x337/0x6f0
[   28.066529]  ? trace_preempt_on+0x20/0xc0
[   28.066553]  ? __pfx_kthread+0x10/0x10
[   28.066575]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.066605]  ? calculate_sigpending+0x7b/0xa0
[   28.066630]  ? __pfx_kthread+0x10/0x10
[   28.066653]  ret_from_fork+0x116/0x1d0
[   28.066677]  ? __pfx_kthread+0x10/0x10
[   28.066698]  ret_from_fork_asm+0x1a/0x30
[   28.066729]  </TASK>
[   28.066740] 
[   28.074696] Allocated by task 313:
[   28.074823]  kasan_save_stack+0x45/0x70
[   28.074961]  kasan_save_track+0x18/0x40
[   28.075089]  kasan_save_alloc_info+0x3b/0x50
[   28.075230]  __kasan_kmalloc+0xb7/0xc0
[   28.075391]  __kmalloc_cache_noprof+0x189/0x420
[   28.075776]  kasan_atomics+0x95/0x310
[   28.075981]  kunit_try_run_case+0x1a5/0x480
[   28.076181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.076439]  kthread+0x337/0x6f0
[   28.076601]  ret_from_fork+0x116/0x1d0
[   28.076783]  ret_from_fork_asm+0x1a/0x30
[   28.076973] 
[   28.077065] The buggy address belongs to the object at ffff8881053c7b80
[   28.077065]  which belongs to the cache kmalloc-64 of size 64
[   28.077608] The buggy address is located 0 bytes to the right of
[   28.077608]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.078182] 
[   28.078277] The buggy address belongs to the physical page:
[   28.078501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.078784] flags: 0x200000000000000(node=0|zone=2)
[   28.079164] page_type: f5(slab)
[   28.079345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.079606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.079913] page dumped because: kasan: bad access detected
[   28.080223] 
[   28.080313] Memory state around the buggy address:
[   28.080547]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.080771]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.081168] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.081410]                                      ^
[   28.081560]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.081849]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.082160] ==================================================================
[   27.809591] ==================================================================
[   27.810442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   27.810771] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   27.811515] 
[   27.811630] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   27.811690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.811704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.811729] Call Trace:
[   27.811750]  <TASK>
[   27.811768]  dump_stack_lvl+0x73/0xb0
[   27.811804]  print_report+0xd1/0x640
[   27.811828]  ? __virt_addr_valid+0x1db/0x2d0
[   27.811986]  ? kasan_atomics_helper+0x1467/0x5450
[   27.812010]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.812037]  ? kasan_atomics_helper+0x1467/0x5450
[   27.812059]  kasan_report+0x141/0x180
[   27.812117]  ? kasan_atomics_helper+0x1467/0x5450
[   27.812146]  kasan_check_range+0x10c/0x1c0
[   27.812173]  __kasan_check_write+0x18/0x20
[   27.812197]  kasan_atomics_helper+0x1467/0x5450
[   27.812219]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.812242]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.812267]  ? kasan_atomics+0x152/0x310
[   27.812293]  kasan_atomics+0x1dc/0x310
[   27.812328]  ? __pfx_kasan_atomics+0x10/0x10
[   27.812352]  ? __pfx_read_tsc+0x10/0x10
[   27.812375]  ? ktime_get_ts64+0x86/0x230
[   27.812401]  kunit_try_run_case+0x1a5/0x480
[   27.812427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.812451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.812487]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.812521]  ? __kthread_parkme+0x82/0x180
[   27.812542]  ? preempt_count_sub+0x50/0x80
[   27.812566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.812591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.812614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.812638]  kthread+0x337/0x6f0
[   27.812659]  ? trace_preempt_on+0x20/0xc0
[   27.812683]  ? __pfx_kthread+0x10/0x10
[   27.812704]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.812738]  ? calculate_sigpending+0x7b/0xa0
[   27.812765]  ? __pfx_kthread+0x10/0x10
[   27.812789]  ret_from_fork+0x116/0x1d0
[   27.812822]  ? __pfx_kthread+0x10/0x10
[   27.812851]  ret_from_fork_asm+0x1a/0x30
[   27.812884]  </TASK>
[   27.812896] 
[   27.820372] Allocated by task 313:
[   27.820562]  kasan_save_stack+0x45/0x70
[   27.820759]  kasan_save_track+0x18/0x40
[   27.820945]  kasan_save_alloc_info+0x3b/0x50
[   27.821217]  __kasan_kmalloc+0xb7/0xc0
[   27.821630]  __kmalloc_cache_noprof+0x189/0x420
[   27.821857]  kasan_atomics+0x95/0x310
[   27.821987]  kunit_try_run_case+0x1a5/0x480
[   27.822129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.822684]  kthread+0x337/0x6f0
[   27.822958]  ret_from_fork+0x116/0x1d0
[   27.823122]  ret_from_fork_asm+0x1a/0x30
[   27.823327] 
[   27.823410] The buggy address belongs to the object at ffff8881053c7b80
[   27.823410]  which belongs to the cache kmalloc-64 of size 64
[   27.823758] The buggy address is located 0 bytes to the right of
[   27.823758]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   27.824260] 
[   27.824365] The buggy address belongs to the physical page:
[   27.824612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   27.824965] flags: 0x200000000000000(node=0|zone=2)
[   27.825200] page_type: f5(slab)
[   27.825517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.825961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.826371] page dumped because: kasan: bad access detected
[   27.826538] 
[   27.826625] Memory state around the buggy address:
[   27.826849]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.827202]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.827470] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.827708]                                      ^
[   27.827857]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.828064]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.828271] ==================================================================
[   28.046022] ==================================================================
[   28.046357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   28.046692] Write of size 8 at addr ffff8881053c7bb0 by task kunit_try_catch/313
[   28.047550] 
[   28.047717] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   28.047771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.047784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.047864] Call Trace:
[   28.047884]  <TASK>
[   28.047901]  dump_stack_lvl+0x73/0xb0
[   28.047934]  print_report+0xd1/0x640
[   28.047958]  ? __virt_addr_valid+0x1db/0x2d0
[   28.047981]  ? kasan_atomics_helper+0x1a7f/0x5450
[   28.048003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.048029]  ? kasan_atomics_helper+0x1a7f/0x5450
[   28.048053]  kasan_report+0x141/0x180
[   28.048076]  ? kasan_atomics_helper+0x1a7f/0x5450
[   28.048102]  kasan_check_range+0x10c/0x1c0
[   28.048126]  __kasan_check_write+0x18/0x20
[   28.048150]  kasan_atomics_helper+0x1a7f/0x5450
[   28.048176]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.048200]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.048228]  ? kasan_atomics+0x152/0x310
[   28.048256]  kasan_atomics+0x1dc/0x310
[   28.048278]  ? __pfx_kasan_atomics+0x10/0x10
[   28.048303]  ? __pfx_read_tsc+0x10/0x10
[   28.048340]  ? ktime_get_ts64+0x86/0x230
[   28.048367]  kunit_try_run_case+0x1a5/0x480
[   28.048392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.048416]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.048453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.048487]  ? __kthread_parkme+0x82/0x180
[   28.048509]  ? preempt_count_sub+0x50/0x80
[   28.048533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.048557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.048581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.048606]  kthread+0x337/0x6f0
[   28.048627]  ? trace_preempt_on+0x20/0xc0
[   28.048651]  ? __pfx_kthread+0x10/0x10
[   28.048673]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.048704]  ? calculate_sigpending+0x7b/0xa0
[   28.048729]  ? __pfx_kthread+0x10/0x10
[   28.048752]  ret_from_fork+0x116/0x1d0
[   28.048772]  ? __pfx_kthread+0x10/0x10
[   28.048894]  ret_from_fork_asm+0x1a/0x30
[   28.048929]  </TASK>
[   28.048942] 
[   28.056749] Allocated by task 313:
[   28.056963]  kasan_save_stack+0x45/0x70
[   28.057132]  kasan_save_track+0x18/0x40
[   28.057332]  kasan_save_alloc_info+0x3b/0x50
[   28.057507]  __kasan_kmalloc+0xb7/0xc0
[   28.057676]  __kmalloc_cache_noprof+0x189/0x420
[   28.057861]  kasan_atomics+0x95/0x310
[   28.058025]  kunit_try_run_case+0x1a5/0x480
[   28.058223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.058404]  kthread+0x337/0x6f0
[   28.058521]  ret_from_fork+0x116/0x1d0
[   28.058648]  ret_from_fork_asm+0x1a/0x30
[   28.058788] 
[   28.058853] The buggy address belongs to the object at ffff8881053c7b80
[   28.058853]  which belongs to the cache kmalloc-64 of size 64
[   28.059201] The buggy address is located 0 bytes to the right of
[   28.059201]  allocated 48-byte region [ffff8881053c7b80, ffff8881053c7bb0)
[   28.059875] 
[   28.059976] The buggy address belongs to the physical page:
[   28.060225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053c7
[   28.060587] flags: 0x200000000000000(node=0|zone=2)
[   28.060816] page_type: f5(slab)
[   28.060976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.061309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.061608] page dumped because: kasan: bad access detected
[   28.061774] 
[   28.061837] Memory state around the buggy address:
[   28.061985]  ffff8881053c7a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.062514]  ffff8881053c7b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.062788] >ffff8881053c7b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.063256]                                      ^
[   28.063456]  ffff8881053c7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.063753]  ffff8881053c7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.064132] ==================================================================