Hay
Date
July 22, 2025, 5:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.134047] ==================================================================
[   33.134436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.134524] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.134578] 
[   33.134844] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.134955] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.134988] Hardware name: linux,dummy-virt (DT)
[   33.135176] Call trace:
[   33.135211]  show_stack+0x20/0x38 (C)
[   33.135269]  dump_stack_lvl+0x8c/0xd0
[   33.135320]  print_report+0x118/0x5e8
[   33.135367]  kasan_report+0xdc/0x128
[   33.135413]  __asan_report_store8_noabort+0x20/0x30
[   33.135466]  kasan_atomics_helper+0x3e5c/0x4858
[   33.135518]  kasan_atomics+0x198/0x2e0
[   33.136371]  kunit_try_run_case+0x170/0x3f0
[   33.136694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.136774]  kthread+0x328/0x630
[   33.136836]  ret_from_fork+0x10/0x20
[   33.136887] 
[   33.136994] Allocated by task 296:
[   33.137041]  kasan_save_stack+0x3c/0x68
[   33.137089]  kasan_save_track+0x20/0x40
[   33.137128]  kasan_save_alloc_info+0x40/0x58
[   33.137532]  __kasan_kmalloc+0xd4/0xd8
[   33.137890]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.137963]  kasan_atomics+0xb8/0x2e0
[   33.138324]  kunit_try_run_case+0x170/0x3f0
[   33.138722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.138839]  kthread+0x328/0x630
[   33.138937]  ret_from_fork+0x10/0x20
[   33.139045] 
[   33.139454] The buggy address belongs to the object at fff00000c9225780
[   33.139454]  which belongs to the cache kmalloc-64 of size 64
[   33.139558] The buggy address is located 0 bytes to the right of
[   33.139558]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.139706] 
[   33.139778] The buggy address belongs to the physical page:
[   33.139869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.140124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.140273] page_type: f5(slab)
[   33.140618] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.141088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.141160] page dumped because: kasan: bad access detected
[   33.141372] 
[   33.141491] Memory state around the buggy address:
[   33.141573]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.141652]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.141707] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.141746]                                      ^
[   33.142098]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.142262]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.142356] ==================================================================
[   33.014526] ==================================================================
[   33.014699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.014762] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.014879] 
[   33.014916] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.015040] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.015073] Hardware name: linux,dummy-virt (DT)
[   33.015383] Call trace:
[   33.015426]  show_stack+0x20/0x38 (C)
[   33.015541]  dump_stack_lvl+0x8c/0xd0
[   33.015593]  print_report+0x118/0x5e8
[   33.015639]  kasan_report+0xdc/0x128
[   33.015753]  __asan_report_load4_noabort+0x20/0x30
[   33.016027]  kasan_atomics_helper+0x3dcc/0x4858
[   33.016102]  kasan_atomics+0x198/0x2e0
[   33.016155]  kunit_try_run_case+0x170/0x3f0
[   33.016207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.016260]  kthread+0x328/0x630
[   33.017017]  kasan_save_track+0x20/0x40
[   33.017575]  kasan_atomics+0xb8/0x2e0
[   33.017690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.018703] 
[   33.020438] page_type: f5(slab)
[   33.021285] page dumped because: kasan: bad access detected
[   33.021358] 
[   33.021479] Memory state around the buggy address:
[   33.021622]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.022454] ==================================================================
[   33.347547] ==================================================================
[   33.347593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.347664] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.347715] 
[   33.347745] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.347846] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.347875] Hardware name: linux,dummy-virt (DT)
[   33.347906] Call trace:
[   33.347931]  show_stack+0x20/0x38 (C)
[   33.347979]  dump_stack_lvl+0x8c/0xd0
[   33.348062]  print_report+0x118/0x5e8
[   33.348109]  kasan_report+0xdc/0x128
[   33.348155]  __asan_report_load8_noabort+0x20/0x30
[   33.348206]  kasan_atomics_helper+0x3e20/0x4858
[   33.348657]  kasan_atomics+0x198/0x2e0
[   33.348765]  kunit_try_run_case+0x170/0x3f0
[   33.348949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.349064]  kthread+0x328/0x630
[   33.349112]  ret_from_fork+0x10/0x20
[   33.349212] 
[   33.349283] Allocated by task 296:
[   33.349431]  kasan_save_stack+0x3c/0x68
[   33.349882]  kasan_save_track+0x20/0x40
[   33.349954]  kasan_save_alloc_info+0x40/0x58
[   33.350070]  __kasan_kmalloc+0xd4/0xd8
[   33.350139]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.350200]  kasan_atomics+0xb8/0x2e0
[   33.350240]  kunit_try_run_case+0x170/0x3f0
[   33.350280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.350324]  kthread+0x328/0x630
[   33.350473]  ret_from_fork+0x10/0x20
[   33.350518] 
[   33.350539] The buggy address belongs to the object at fff00000c9225780
[   33.350539]  which belongs to the cache kmalloc-64 of size 64
[   33.350701] The buggy address is located 0 bytes to the right of
[   33.350701]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.350886] 
[   33.350969] The buggy address belongs to the physical page:
[   33.351016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.351113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.351472] page_type: f5(slab)
[   33.351538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.351642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.351846] page dumped because: kasan: bad access detected
[   33.351878] 
[   33.351899] Memory state around the buggy address:
[   33.351931]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.351977]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.352021] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.352061]                                      ^
[   33.352246]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352403]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.352505] ==================================================================
[   33.178914] ==================================================================
[   33.178970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.179033] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.179086] 
[   33.179117] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.179209] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.179252] Hardware name: linux,dummy-virt (DT)
[   33.179286] Call trace:
[   33.179320]  show_stack+0x20/0x38 (C)
[   33.179372]  dump_stack_lvl+0x8c/0xd0
[   33.179430]  print_report+0x118/0x5e8
[   33.179477]  kasan_report+0xdc/0x128
[   33.179529]  kasan_check_range+0x100/0x1a8
[   33.179577]  __kasan_check_write+0x20/0x30
[   33.179625]  kasan_atomics_helper+0x1058/0x4858
[   33.179676]  kasan_atomics+0x198/0x2e0
[   33.179725]  kunit_try_run_case+0x170/0x3f0
[   33.179772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.179859]  kthread+0x328/0x630
[   33.180357]  ret_from_fork+0x10/0x20
[   33.180825] 
[   33.180875] Allocated by task 296:
[   33.180933]  kasan_save_stack+0x3c/0x68
[   33.181002]  kasan_save_track+0x20/0x40
[   33.181067]  kasan_save_alloc_info+0x40/0x58
[   33.181133]  __kasan_kmalloc+0xd4/0xd8
[   33.181448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.181505]  kasan_atomics+0xb8/0x2e0
[   33.181546]  kunit_try_run_case+0x170/0x3f0
[   33.181585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.181978]  kthread+0x328/0x630
[   33.182054]  ret_from_fork+0x10/0x20
[   33.182284] 
[   33.182365] The buggy address belongs to the object at fff00000c9225780
[   33.182365]  which belongs to the cache kmalloc-64 of size 64
[   33.182662] The buggy address is located 0 bytes to the right of
[   33.182662]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.182923] 
[   33.182992] The buggy address belongs to the physical page:
[   33.183295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.183542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.183711] page_type: f5(slab)
[   33.183860] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.183961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.184029] page dumped because: kasan: bad access detected
[   33.184138] 
[   33.184160] Memory state around the buggy address:
[   33.184302]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.184543]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.184875] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.184964]                                      ^
[   33.185081]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.185213]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.185290] ==================================================================
[   33.236213] ==================================================================
[   33.236398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.236500] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.236826] 
[   33.236878] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.236975] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.237044] Hardware name: linux,dummy-virt (DT)
[   33.237091] Call trace:
[   33.237124]  show_stack+0x20/0x38 (C)
[   33.237188]  dump_stack_lvl+0x8c/0xd0
[   33.237237]  print_report+0x118/0x5e8
[   33.237289]  kasan_report+0xdc/0x128
[   33.237335]  kasan_check_range+0x100/0x1a8
[   33.237396]  __kasan_check_write+0x20/0x30
[   33.237454]  kasan_atomics_helper+0x12d8/0x4858
[   33.237514]  kasan_atomics+0x198/0x2e0
[   33.237562]  kunit_try_run_case+0x170/0x3f0
[   33.237611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.237672]  kthread+0x328/0x630
[   33.237723]  ret_from_fork+0x10/0x20
[   33.237772] 
[   33.237794] Allocated by task 296:
[   33.237986]  kasan_save_stack+0x3c/0x68
[   33.238572]  kasan_save_track+0x20/0x40
[   33.238634]  kasan_save_alloc_info+0x40/0x58
[   33.238677]  __kasan_kmalloc+0xd4/0xd8
[   33.238715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.238840]  kasan_atomics+0xb8/0x2e0
[   33.238926]  kunit_try_run_case+0x170/0x3f0
[   33.239343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.239589]  kthread+0x328/0x630
[   33.239638]  ret_from_fork+0x10/0x20
[   33.239959] 
[   33.240235] The buggy address belongs to the object at fff00000c9225780
[   33.240235]  which belongs to the cache kmalloc-64 of size 64
[   33.240380] The buggy address is located 0 bytes to the right of
[   33.240380]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.240629] 
[   33.240665] The buggy address belongs to the physical page:
[   33.240848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.240941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.241381] page_type: f5(slab)
[   33.241561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.241839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.241930] page dumped because: kasan: bad access detected
[   33.241964] 
[   33.242435] Memory state around the buggy address:
[   33.242570]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.242757]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.242994] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.243186]                                      ^
[   33.243409]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.243526]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.243669] ==================================================================
[   33.283489] ==================================================================
[   33.283550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.283911] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.284161] 
[   33.284225] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.284470] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.284514] Hardware name: linux,dummy-virt (DT)
[   33.284584] Call trace:
[   33.284611]  show_stack+0x20/0x38 (C)
[   33.284757]  dump_stack_lvl+0x8c/0xd0
[   33.284811]  print_report+0x118/0x5e8
[   33.284997]  kasan_report+0xdc/0x128
[   33.285148]  kasan_check_range+0x100/0x1a8
[   33.285215]  __kasan_check_write+0x20/0x30
[   33.285714]  kasan_atomics_helper+0x14e4/0x4858
[   33.286167]  kasan_atomics+0x198/0x2e0
[   33.286232]  kunit_try_run_case+0x170/0x3f0
[   33.286378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.286768]  kthread+0x328/0x630
[   33.286998]  ret_from_fork+0x10/0x20
[   33.287057] 
[   33.287080] Allocated by task 296:
[   33.287396]  kasan_save_stack+0x3c/0x68
[   33.287714]  kasan_save_track+0x20/0x40
[   33.288000]  kasan_save_alloc_info+0x40/0x58
[   33.288316]  __kasan_kmalloc+0xd4/0xd8
[   33.289168]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.289433]  kasan_atomics+0xb8/0x2e0
[   33.289904]  kunit_try_run_case+0x170/0x3f0
[   33.290001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.290637]  kthread+0x328/0x630
[   33.291022]  ret_from_fork+0x10/0x20
[   33.291168] 
[   33.291197] The buggy address belongs to the object at fff00000c9225780
[   33.291197]  which belongs to the cache kmalloc-64 of size 64
[   33.291395] The buggy address is located 0 bytes to the right of
[   33.291395]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.291623] 
[   33.291664] The buggy address belongs to the physical page:
[   33.292126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.292348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.292446] page_type: f5(slab)
[   33.292897] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.293002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.293046] page dumped because: kasan: bad access detected
[   33.293505] 
[   33.293708] Memory state around the buggy address:
[   33.293870]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.294106]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.294329] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.294647]                                      ^
[   33.295144]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.295225]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.295285] ==================================================================
[   32.855544] ==================================================================
[   32.855624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   32.855937] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.856827]  kasan_report+0xdc/0x128
[   32.857327]  kunit_try_run_case+0x170/0x3f0
[   32.857826]  ret_from_fork+0x10/0x20
[   32.858372]  __kasan_kmalloc+0xd4/0xd8
[   32.858572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.858794] The buggy address is located 0 bytes to the right of
[   32.858794]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.859981] ==================================================================
[   33.089974] ==================================================================
[   33.090026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.090093] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.090154] 
[   33.090191] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.090281] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.090323] Hardware name: linux,dummy-virt (DT)
[   33.090365] Call trace:
[   33.090390]  show_stack+0x20/0x38 (C)
[   33.090441]  dump_stack_lvl+0x8c/0xd0
[   33.090498]  print_report+0x118/0x5e8
[   33.090545]  kasan_report+0xdc/0x128
[   33.090591]  __asan_report_load4_noabort+0x20/0x30
[   33.090642]  kasan_atomics_helper+0x3e04/0x4858
[   33.090694]  kasan_atomics+0x198/0x2e0
[   33.090743]  kunit_try_run_case+0x170/0x3f0
[   33.090790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.091268]  kthread+0x328/0x630
[   33.091321]  ret_from_fork+0x10/0x20
[   33.091689] 
[   33.091742] Allocated by task 296:
[   33.091787]  kasan_save_stack+0x3c/0x68
[   33.091846]  kasan_save_track+0x20/0x40
[   33.091883]  kasan_save_alloc_info+0x40/0x58
[   33.092282]  __kasan_kmalloc+0xd4/0xd8
[   33.092343]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.092387]  kasan_atomics+0xb8/0x2e0
[   33.092670]  kunit_try_run_case+0x170/0x3f0
[   33.092722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.093091]  kthread+0x328/0x630
[   33.093262]  ret_from_fork+0x10/0x20
[   33.093337] 
[   33.093476] The buggy address belongs to the object at fff00000c9225780
[   33.093476]  which belongs to the cache kmalloc-64 of size 64
[   33.093593] The buggy address is located 0 bytes to the right of
[   33.093593]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.093711] 
[   33.093733] The buggy address belongs to the physical page:
[   33.093769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.093835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.093884] page_type: f5(slab)
[   33.094484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.094736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.094808] page dumped because: kasan: bad access detected
[   33.095021] 
[   33.095061] Memory state around the buggy address:
[   33.095097]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.095394]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.095588] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.095790]                                      ^
[   33.096055]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.096244]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.096344] ==================================================================
[   33.307550] ==================================================================
[   33.307602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.307655] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.307707] 
[   33.307740] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.307846] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.307878] Hardware name: linux,dummy-virt (DT)
[   33.307910] Call trace:
[   33.307947]  show_stack+0x20/0x38 (C)
[   33.308009]  dump_stack_lvl+0x8c/0xd0
[   33.308063]  print_report+0x118/0x5e8
[   33.308111]  kasan_report+0xdc/0x128
[   33.308161]  kasan_check_range+0x100/0x1a8
[   33.308209]  __kasan_check_write+0x20/0x30
[   33.308263]  kasan_atomics_helper+0x15b4/0x4858
[   33.308329]  kasan_atomics+0x198/0x2e0
[   33.308378]  kunit_try_run_case+0x170/0x3f0
[   33.308429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.308485]  kthread+0x328/0x630
[   33.308529]  ret_from_fork+0x10/0x20
[   33.308578] 
[   33.308600] Allocated by task 296:
[   33.308640]  kasan_save_stack+0x3c/0x68
[   33.308693]  kasan_save_track+0x20/0x40
[   33.308732]  kasan_save_alloc_info+0x40/0x58
[   33.308773]  __kasan_kmalloc+0xd4/0xd8
[   33.308810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.308862]  kasan_atomics+0xb8/0x2e0
[   33.308902]  kunit_try_run_case+0x170/0x3f0
[   33.308941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.309035]  kthread+0x328/0x630
[   33.309322]  ret_from_fork+0x10/0x20
[   33.309367] 
[   33.309390] The buggy address belongs to the object at fff00000c9225780
[   33.309390]  which belongs to the cache kmalloc-64 of size 64
[   33.309448] The buggy address is located 0 bytes to the right of
[   33.309448]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.309510] 
[   33.309533] The buggy address belongs to the physical page:
[   33.309567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.309622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.310105] page_type: f5(slab)
[   33.310165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.310447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.310575] page dumped because: kasan: bad access detected
[   33.310676] 
[   33.310735] Memory state around the buggy address:
[   33.310891]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.311030]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.311119] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.311184]                                      ^
[   33.311237]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.311301]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.311340] ==================================================================
[   33.170737] ==================================================================
[   33.170789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.170861] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.170910] 
[   33.170940] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.171033] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.171066] Hardware name: linux,dummy-virt (DT)
[   33.171098] Call trace:
[   33.171122]  show_stack+0x20/0x38 (C)
[   33.171172]  dump_stack_lvl+0x8c/0xd0
[   33.171218]  print_report+0x118/0x5e8
[   33.171843]  kasan_report+0xdc/0x128
[   33.171916]  kasan_check_range+0x100/0x1a8
[   33.171967]  __kasan_check_write+0x20/0x30
[   33.172371]  kasan_atomics_helper+0xff0/0x4858
[   33.172770]  kasan_atomics+0x198/0x2e0
[   33.172846]  kunit_try_run_case+0x170/0x3f0
[   33.173182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.173275]  kthread+0x328/0x630
[   33.173489]  ret_from_fork+0x10/0x20
[   33.173981] 
[   33.174049] Allocated by task 296:
[   33.174316]  kasan_save_stack+0x3c/0x68
[   33.174505]  kasan_save_track+0x20/0x40
[   33.174575]  kasan_save_alloc_info+0x40/0x58
[   33.174630]  __kasan_kmalloc+0xd4/0xd8
[   33.174666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.175027]  kasan_atomics+0xb8/0x2e0
[   33.175140]  kunit_try_run_case+0x170/0x3f0
[   33.175569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.175627]  kthread+0x328/0x630
[   33.175982]  ret_from_fork+0x10/0x20
[   33.176228] 
[   33.176430] The buggy address belongs to the object at fff00000c9225780
[   33.176430]  which belongs to the cache kmalloc-64 of size 64
[   33.176565] The buggy address is located 0 bytes to the right of
[   33.176565]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.176706] 
[   33.176774] The buggy address belongs to the physical page:
[   33.177170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.177262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.177418] page_type: f5(slab)
[   33.177524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.177584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.177627] page dumped because: kasan: bad access detected
[   33.177661] 
[   33.177682] Memory state around the buggy address:
[   33.177943]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.178176]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.178227] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.178278]                                      ^
[   33.178322]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.178375]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.178418] ==================================================================
[   33.152708] ==================================================================
[   33.152840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.152986] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.153131] 
[   33.153209] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.153387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.153425] Hardware name: linux,dummy-virt (DT)
[   33.153458] Call trace:
[   33.153691]  show_stack+0x20/0x38 (C)
[   33.154129]  dump_stack_lvl+0x8c/0xd0
[   33.154304]  print_report+0x118/0x5e8
[   33.154356]  kasan_report+0xdc/0x128
[   33.154590]  kasan_check_range+0x100/0x1a8
[   33.154845]  __kasan_check_write+0x20/0x30
[   33.155064]  kasan_atomics_helper+0xf20/0x4858
[   33.155265]  kasan_atomics+0x198/0x2e0
[   33.155349]  kunit_try_run_case+0x170/0x3f0
[   33.155551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.155784]  kthread+0x328/0x630
[   33.155851]  ret_from_fork+0x10/0x20
[   33.156153] 
[   33.156474] Allocated by task 296:
[   33.156657]  kasan_save_stack+0x3c/0x68
[   33.156722]  kasan_save_track+0x20/0x40
[   33.157065]  kasan_save_alloc_info+0x40/0x58
[   33.157297]  __kasan_kmalloc+0xd4/0xd8
[   33.157430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.157605]  kasan_atomics+0xb8/0x2e0
[   33.157706]  kunit_try_run_case+0x170/0x3f0
[   33.157746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.157975]  kthread+0x328/0x630
[   33.158528]  ret_from_fork+0x10/0x20
[   33.158648] 
[   33.158722] The buggy address belongs to the object at fff00000c9225780
[   33.158722]  which belongs to the cache kmalloc-64 of size 64
[   33.158831] The buggy address is located 0 bytes to the right of
[   33.158831]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.158927] 
[   33.158970] The buggy address belongs to the physical page:
[   33.159008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.159074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.159132] page_type: f5(slab)
[   33.159175] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.159227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.159269] page dumped because: kasan: bad access detected
[   33.159317] 
[   33.159337] Memory state around the buggy address:
[   33.159371]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.159415]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.159474] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.159513]                                      ^
[   33.159557]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.159610]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.159649] ==================================================================
[   33.343396] ==================================================================
[   33.343557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.343660] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.343742] 
[   33.343797] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.343938] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.343969] Hardware name: linux,dummy-virt (DT)
[   33.344065] Call trace:
[   33.344091]  show_stack+0x20/0x38 (C)
[   33.344139]  dump_stack_lvl+0x8c/0xd0
[   33.344186]  print_report+0x118/0x5e8
[   33.344250]  kasan_report+0xdc/0x128
[   33.344528]  kasan_check_range+0x100/0x1a8
[   33.344674]  __kasan_check_write+0x20/0x30
[   33.344879]  kasan_atomics_helper+0x175c/0x4858
[   33.345079]  kasan_atomics+0x198/0x2e0
[   33.345149]  kunit_try_run_case+0x170/0x3f0
[   33.345199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.345408]  kthread+0x328/0x630
[   33.345455]  ret_from_fork+0x10/0x20
[   33.345771] 
[   33.345844] Allocated by task 296:
[   33.345995]  kasan_save_stack+0x3c/0x68
[   33.346075]  kasan_save_track+0x20/0x40
[   33.346145]  kasan_save_alloc_info+0x40/0x58
[   33.346205]  __kasan_kmalloc+0xd4/0xd8
[   33.346246]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.346291]  kasan_atomics+0xb8/0x2e0
[   33.346331]  kunit_try_run_case+0x170/0x3f0
[   33.346381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.346427]  kthread+0x328/0x630
[   33.346466]  ret_from_fork+0x10/0x20
[   33.346505] 
[   33.346536] The buggy address belongs to the object at fff00000c9225780
[   33.346536]  which belongs to the cache kmalloc-64 of size 64
[   33.346596] The buggy address is located 0 bytes to the right of
[   33.346596]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.346658] 
[   33.346679] The buggy address belongs to the physical page:
[   33.346718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.346774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.346843] page_type: f5(slab)
[   33.346882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.346935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.346983] page dumped because: kasan: bad access detected
[   33.347016] 
[   33.347035] Memory state around the buggy address:
[   33.347069]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.347124]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.347174] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.347219]                                      ^
[   33.347261]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.347306]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.347345] ==================================================================
[   33.318256] ==================================================================
[   33.318372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.318439] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.318491] 
[   33.318523] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.318613] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.318807] Hardware name: linux,dummy-virt (DT)
[   33.318857] Call trace:
[   33.319032]  show_stack+0x20/0x38 (C)
[   33.319093]  dump_stack_lvl+0x8c/0xd0
[   33.319164]  print_report+0x118/0x5e8
[   33.319513]  kasan_report+0xdc/0x128
[   33.319584]  kasan_check_range+0x100/0x1a8
[   33.319636]  __kasan_check_write+0x20/0x30
[   33.319703]  kasan_atomics_helper+0x1644/0x4858
[   33.319755]  kasan_atomics+0x198/0x2e0
[   33.319801]  kunit_try_run_case+0x170/0x3f0
[   33.319883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.319954]  kthread+0x328/0x630
[   33.320000]  ret_from_fork+0x10/0x20
[   33.320050] 
[   33.320214] Allocated by task 296:
[   33.320249]  kasan_save_stack+0x3c/0x68
[   33.320480]  kasan_save_track+0x20/0x40
[   33.320533]  kasan_save_alloc_info+0x40/0x58
[   33.320623]  __kasan_kmalloc+0xd4/0xd8
[   33.320891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.321035]  kasan_atomics+0xb8/0x2e0
[   33.321144]  kunit_try_run_case+0x170/0x3f0
[   33.321205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.321282]  kthread+0x328/0x630
[   33.321319]  ret_from_fork+0x10/0x20
[   33.321522] 
[   33.321685] The buggy address belongs to the object at fff00000c9225780
[   33.321685]  which belongs to the cache kmalloc-64 of size 64
[   33.321783] The buggy address is located 0 bytes to the right of
[   33.321783]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.321909] 
[   33.322100] The buggy address belongs to the physical page:
[   33.322338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.322463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.322513] page_type: f5(slab)
[   33.322596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.322850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.323029] page dumped because: kasan: bad access detected
[   33.323280] 
[   33.323399] Memory state around the buggy address:
[   33.323535]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.323600]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.323662] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.324015]                                      ^
[   33.324061]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.324230]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.324446] ==================================================================
[   33.324948] ==================================================================
[   33.325029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.325121] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.325208] 
[   33.325251] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.325340] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.325372] Hardware name: linux,dummy-virt (DT)
[   33.325406] Call trace:
[   33.325445]  show_stack+0x20/0x38 (C)
[   33.325498]  dump_stack_lvl+0x8c/0xd0
[   33.325555]  print_report+0x118/0x5e8
[   33.325611]  kasan_report+0xdc/0x128
[   33.325657]  __asan_report_load8_noabort+0x20/0x30
[   33.325709]  kasan_atomics_helper+0x3df4/0x4858
[   33.325761]  kasan_atomics+0x198/0x2e0
[   33.325833]  kunit_try_run_case+0x170/0x3f0
[   33.325883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.325946]  kthread+0x328/0x630
[   33.326006]  ret_from_fork+0x10/0x20
[   33.326075] 
[   33.326123] Allocated by task 296:
[   33.326165]  kasan_save_stack+0x3c/0x68
[   33.326224]  kasan_save_track+0x20/0x40
[   33.326261]  kasan_save_alloc_info+0x40/0x58
[   33.326302]  __kasan_kmalloc+0xd4/0xd8
[   33.326339]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.326382]  kasan_atomics+0xb8/0x2e0
[   33.326437]  kunit_try_run_case+0x170/0x3f0
[   33.326476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.326520]  kthread+0x328/0x630
[   33.326575]  ret_from_fork+0x10/0x20
[   33.326622] 
[   33.326653] The buggy address belongs to the object at fff00000c9225780
[   33.326653]  which belongs to the cache kmalloc-64 of size 64
[   33.326711] The buggy address is located 0 bytes to the right of
[   33.326711]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.326775] 
[   33.326796] The buggy address belongs to the physical page:
[   33.326849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.326903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.326950] page_type: f5(slab)
[   33.326989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.327041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.327082] page dumped because: kasan: bad access detected
[   33.327113] 
[   33.327132] Memory state around the buggy address:
[   33.327165]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.327351]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.327837] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.327929]                                      ^
[   33.327996]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.328093]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.328200] ==================================================================
[   32.970986] ==================================================================
[   32.971043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.971113] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   32.971183] 
[   32.971215] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.971304] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.971337] Hardware name: linux,dummy-virt (DT)
[   32.971369] Call trace:
[   32.971392]  show_stack+0x20/0x38 (C)
[   32.971444]  dump_stack_lvl+0x8c/0xd0
[   32.971492]  print_report+0x118/0x5e8
[   32.971539]  kasan_report+0xdc/0x128
[   32.971594]  __asan_report_load4_noabort+0x20/0x30
[   32.971804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.972537] The buggy address is located 0 bytes to the right of
[   32.972537]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.973769] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.975189] 
[   32.975750]  print_report+0x118/0x5e8
[   32.978399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.978727] 
[   32.978751] The buggy address belongs to the object at fff00000c9225780
[   32.978751]  which belongs to the cache kmalloc-64 of size 64
[   32.979021] The buggy address is located 0 bytes to the right of
[   32.979021]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.979166] 
[   32.979245] The buggy address belongs to the physical page:
[   32.979445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   32.979556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.979696] page_type: f5(slab)
[   32.979763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.979970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.980181] page dumped because: kasan: bad access detected
[   32.980289] 
[   32.980395] Memory state around the buggy address:
[   32.980465]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.980540]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.980597] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.980705]                                      ^
[   32.980741]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.981010]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.981084] ==================================================================
[   33.328878] ==================================================================
[   33.328935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.329015] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.329099] 
[   33.329186] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.329294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.329325] Hardware name: linux,dummy-virt (DT)
[   33.329357] Call trace:
[   33.329381]  show_stack+0x20/0x38 (C)
[   33.329431]  dump_stack_lvl+0x8c/0xd0
[   33.329479]  print_report+0x118/0x5e8
[   33.329654]  kasan_report+0xdc/0x128
[   33.329860]  kasan_check_range+0x100/0x1a8
[   33.329955]  __kasan_check_write+0x20/0x30
[   33.330057]  kasan_atomics_helper+0x16d0/0x4858
[   33.330332]  kasan_atomics+0x198/0x2e0
[   33.330499]  kunit_try_run_case+0x170/0x3f0
[   33.330635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.330690]  kthread+0x328/0x630
[   33.330944]  ret_from_fork+0x10/0x20
[   33.331186] 
[   33.331344] Allocated by task 296:
[   33.331483]  kasan_save_stack+0x3c/0x68
[   33.331675]  kasan_save_track+0x20/0x40
[   33.331805]  kasan_save_alloc_info+0x40/0x58
[   33.331963]  __kasan_kmalloc+0xd4/0xd8
[   33.332040]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.332087]  kasan_atomics+0xb8/0x2e0
[   33.332127]  kunit_try_run_case+0x170/0x3f0
[   33.332386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.332514]  kthread+0x328/0x630
[   33.332707]  ret_from_fork+0x10/0x20
[   33.332908] 
[   33.333232] The buggy address belongs to the object at fff00000c9225780
[   33.333232]  which belongs to the cache kmalloc-64 of size 64
[   33.333399] The buggy address is located 0 bytes to the right of
[   33.333399]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.333475] 
[   33.333496] The buggy address belongs to the physical page:
[   33.333686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.333849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.334019] page_type: f5(slab)
[   33.334109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.334206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.334555] page dumped because: kasan: bad access detected
[   33.334694] 
[   33.334764] Memory state around the buggy address:
[   33.334862]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.334939]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.335038] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.335174]                                      ^
[   33.335235]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.335279]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.335345] ==================================================================
[   33.186073] ==================================================================
[   33.186126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.186186] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.186239] 
[   33.186688] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.186936] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.186968] Hardware name: linux,dummy-virt (DT)
[   33.187174] Call trace:
[   33.187202]  show_stack+0x20/0x38 (C)
[   33.187696]  dump_stack_lvl+0x8c/0xd0
[   33.187793]  print_report+0x118/0x5e8
[   33.187867]  kasan_report+0xdc/0x128
[   33.188160]  kasan_check_range+0x100/0x1a8
[   33.188359]  __kasan_check_write+0x20/0x30
[   33.188417]  kasan_atomics_helper+0x10c0/0x4858
[   33.188804]  kasan_atomics+0x198/0x2e0
[   33.189084]  kunit_try_run_case+0x170/0x3f0
[   33.189292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.189502]  kthread+0x328/0x630
[   33.189689]  ret_from_fork+0x10/0x20
[   33.189794] 
[   33.190057] Allocated by task 296:
[   33.190228]  kasan_save_stack+0x3c/0x68
[   33.190329]  kasan_save_track+0x20/0x40
[   33.190368]  kasan_save_alloc_info+0x40/0x58
[   33.190574]  __kasan_kmalloc+0xd4/0xd8
[   33.190795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.190888]  kasan_atomics+0xb8/0x2e0
[   33.191099]  kunit_try_run_case+0x170/0x3f0
[   33.191190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.191355]  kthread+0x328/0x630
[   33.191589]  ret_from_fork+0x10/0x20
[   33.191767] 
[   33.191977] The buggy address belongs to the object at fff00000c9225780
[   33.191977]  which belongs to the cache kmalloc-64 of size 64
[   33.192054] The buggy address is located 0 bytes to the right of
[   33.192054]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.192384] 
[   33.192535] The buggy address belongs to the physical page:
[   33.192918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.193084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.193237] page_type: f5(slab)
[   33.193320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.193546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.193737] page dumped because: kasan: bad access detected
[   33.193830] 
[   33.193951] Memory state around the buggy address:
[   33.194012]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.194100]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.194312] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.194569]                                      ^
[   33.194624]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.194669]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.195122] ==================================================================
[   32.870150] ==================================================================
[   32.870372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   32.870746] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.871297]  print_report+0x118/0x5e8
[   32.871671]  kasan_atomics_helper+0x3f94/0x4858
[   32.872433]  kthread+0x328/0x630
[   32.872592]  kasan_save_stack+0x3c/0x68
[   32.873409]  __kasan_kmalloc+0xd4/0xd8
[   32.873991]  kthread+0x328/0x630
[   32.874496] The buggy address is located 0 bytes to the right of
[   32.874496]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.875969] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.876422] ==================================================================
[   33.008880] ==================================================================
[   33.008970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.009337] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.009502] 
[   33.009578] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.009734] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.009860] Hardware name: linux,dummy-virt (DT)
[   33.009895] Call trace:
[   33.009919]  show_stack+0x20/0x38 (C)
[   33.010353]  dump_stack_lvl+0x8c/0xd0
[   33.010575]  print_report+0x118/0x5e8
[   33.010787]  kasan_report+0xdc/0x128
[   33.010862]  kasan_check_range+0x100/0x1a8
[   33.010948]  __kasan_check_write+0x20/0x30
[   33.011020]  kasan_atomics_helper+0xad4/0x4858
[   33.011078]  kasan_atomics+0x198/0x2e0
[   33.011124]  kunit_try_run_case+0x170/0x3f0
[   33.011176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.011241]  kthread+0x328/0x630
[   33.011314]  ret_from_fork+0x10/0x20
[   33.011362] 
[   33.011385] Allocated by task 296:
[   33.011423]  kasan_save_stack+0x3c/0x68
[   33.011488]  kasan_save_track+0x20/0x40
[   33.011539]  kasan_save_alloc_info+0x40/0x58
[   33.011587]  __kasan_kmalloc+0xd4/0xd8
[   33.011626]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.011669]  kasan_atomics+0xb8/0x2e0
[   33.011717]  kunit_try_run_case+0x170/0x3f0
[   33.011766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.011809]  kthread+0x328/0x630
[   33.011855]  ret_from_fork+0x10/0x20
[   33.011891] 
[   33.011913] The buggy address belongs to the object at fff00000c9225780
[   33.011913]  which belongs to the cache kmalloc-64 of size 64
[   33.011972] The buggy address is located 0 bytes to the right of
[   33.011972]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.012101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.012356] page dumped because: kasan: bad access detected
[   33.012389] 
[   33.012411] Memory state around the buggy address:
[   33.012450]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.012509]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.012554] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.012605]                                      ^
[   33.012647]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.012691]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.012739] ==================================================================
[   33.144642] ==================================================================
[   33.144695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.144793] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.144875] 
[   33.144930] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.145335] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.145389] Hardware name: linux,dummy-virt (DT)
[   33.145423] Call trace:
[   33.145447]  show_stack+0x20/0x38 (C)
[   33.145862]  dump_stack_lvl+0x8c/0xd0
[   33.145949]  print_report+0x118/0x5e8
[   33.146034]  kasan_report+0xdc/0x128
[   33.146259]  kasan_check_range+0x100/0x1a8
[   33.146450]  __kasan_check_write+0x20/0x30
[   33.146531]  kasan_atomics_helper+0xeb8/0x4858
[   33.146771]  kasan_atomics+0x198/0x2e0
[   33.147274]  kunit_try_run_case+0x170/0x3f0
[   33.147369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.147586]  kthread+0x328/0x630
[   33.147972]  ret_from_fork+0x10/0x20
[   33.148152] 
[   33.148219] Allocated by task 296:
[   33.148253]  kasan_save_stack+0x3c/0x68
[   33.148473]  kasan_save_track+0x20/0x40
[   33.148632]  kasan_save_alloc_info+0x40/0x58
[   33.148713]  __kasan_kmalloc+0xd4/0xd8
[   33.148762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.149124]  kasan_atomics+0xb8/0x2e0
[   33.149178]  kunit_try_run_case+0x170/0x3f0
[   33.149218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.149263]  kthread+0x328/0x630
[   33.149298]  ret_from_fork+0x10/0x20
[   33.149336] 
[   33.149360] The buggy address belongs to the object at fff00000c9225780
[   33.149360]  which belongs to the cache kmalloc-64 of size 64
[   33.149652] The buggy address is located 0 bytes to the right of
[   33.149652]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.150085] 
[   33.150186] The buggy address belongs to the physical page:
[   33.150285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.150434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.150503] page_type: f5(slab)
[   33.150545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.150647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.150690] page dumped because: kasan: bad access detected
[   33.150722] 
[   33.150748] Memory state around the buggy address:
[   33.150784]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.150839]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.150893] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.150939]                                      ^
[   33.150981]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.151035]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.151073] ==================================================================
[   33.071843] ==================================================================
[   33.071919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.071980] Read of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.072241] 
[   33.072311] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.072407] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.072803] Hardware name: linux,dummy-virt (DT)
[   33.072870] Call trace:
[   33.073075]  show_stack+0x20/0x38 (C)
[   33.073146]  dump_stack_lvl+0x8c/0xd0
[   33.073289]  print_report+0x118/0x5e8
[   33.073361]  kasan_report+0xdc/0x128
[   33.073776]  __asan_report_load4_noabort+0x20/0x30
[   33.073868]  kasan_atomics_helper+0x3dd8/0x4858
[   33.073924]  kasan_atomics+0x198/0x2e0
[   33.074242]  kunit_try_run_case+0x170/0x3f0
[   33.074511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.074786]  kthread+0x328/0x630
[   33.074977]  ret_from_fork+0x10/0x20
[   33.075039] 
[   33.075079] Allocated by task 296:
[   33.075112]  kasan_save_stack+0x3c/0x68
[   33.075166]  kasan_save_track+0x20/0x40
[   33.075211]  kasan_save_alloc_info+0x40/0x58
[   33.075253]  __kasan_kmalloc+0xd4/0xd8
[   33.075309]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.075364]  kasan_atomics+0xb8/0x2e0
[   33.075413]  kunit_try_run_case+0x170/0x3f0
[   33.075462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.075511]  kthread+0x328/0x630
[   33.075546]  ret_from_fork+0x10/0x20
[   33.075582] 
[   33.075603] The buggy address belongs to the object at fff00000c9225780
[   33.075603]  which belongs to the cache kmalloc-64 of size 64
[   33.075671] The buggy address is located 0 bytes to the right of
[   33.075671]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.075737] 
[   33.075763] The buggy address belongs to the physical page:
[   33.076016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.076498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.076562] page_type: f5(slab)
[   33.076966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.077343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.077511] page dumped because: kasan: bad access detected
[   33.077575] 
[   33.077622] Memory state around the buggy address:
[   33.077759]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.077851]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.077897] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.077935]                                      ^
[   33.078614]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.078732]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.078909] ==================================================================
[   33.217960] ==================================================================
[   33.218081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.218144] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.218202] 
[   33.218466] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.218966] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.219028] Hardware name: linux,dummy-virt (DT)
[   33.219113] Call trace:
[   33.219141]  show_stack+0x20/0x38 (C)
[   33.219382]  dump_stack_lvl+0x8c/0xd0
[   33.219453]  print_report+0x118/0x5e8
[   33.219807]  kasan_report+0xdc/0x128
[   33.219891]  kasan_check_range+0x100/0x1a8
[   33.219942]  __kasan_check_write+0x20/0x30
[   33.219991]  kasan_atomics_helper+0x11f8/0x4858
[   33.220043]  kasan_atomics+0x198/0x2e0
[   33.220090]  kunit_try_run_case+0x170/0x3f0
[   33.220163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.220219]  kthread+0x328/0x630
[   33.220271]  ret_from_fork+0x10/0x20
[   33.220322] 
[   33.220346] Allocated by task 296:
[   33.220387]  kasan_save_stack+0x3c/0x68
[   33.220432]  kasan_save_track+0x20/0x40
[   33.220471]  kasan_save_alloc_info+0x40/0x58
[   33.220512]  __kasan_kmalloc+0xd4/0xd8
[   33.220549]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.220602]  kasan_atomics+0xb8/0x2e0
[   33.220641]  kunit_try_run_case+0x170/0x3f0
[   33.220682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.220728]  kthread+0x328/0x630
[   33.220762]  ret_from_fork+0x10/0x20
[   33.220807] 
[   33.220844] The buggy address belongs to the object at fff00000c9225780
[   33.220844]  which belongs to the cache kmalloc-64 of size 64
[   33.221659] The buggy address is located 0 bytes to the right of
[   33.221659]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.221769] 
[   33.221821] The buggy address belongs to the physical page:
[   33.221889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.222059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.222177] page_type: f5(slab)
[   33.222402] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.222637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.222912] page dumped because: kasan: bad access detected
[   33.222990] 
[   33.223290] Memory state around the buggy address:
[   33.223371]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.223464]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.223739] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.224245]                                      ^
[   33.224410]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.224555]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.224641] ==================================================================
[   33.226076] ==================================================================
[   33.226175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.226263] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.226317] 
[   33.226347] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.227500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.227553] Hardware name: linux,dummy-virt (DT)
[   33.227588] Call trace:
[   33.227642]  show_stack+0x20/0x38 (C)
[   33.227705]  dump_stack_lvl+0x8c/0xd0
[   33.227763]  print_report+0x118/0x5e8
[   33.227884]  kasan_report+0xdc/0x128
[   33.227941]  kasan_check_range+0x100/0x1a8
[   33.227990]  __kasan_check_write+0x20/0x30
[   33.228382]  kasan_atomics_helper+0x126c/0x4858
[   33.228474]  kasan_atomics+0x198/0x2e0
[   33.228525]  kunit_try_run_case+0x170/0x3f0
[   33.228579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.228632]  kthread+0x328/0x630
[   33.229058]  ret_from_fork+0x10/0x20
[   33.229347] 
[   33.229581] Allocated by task 296:
[   33.229629]  kasan_save_stack+0x3c/0x68
[   33.229677]  kasan_save_track+0x20/0x40
[   33.229716]  kasan_save_alloc_info+0x40/0x58
[   33.229953]  __kasan_kmalloc+0xd4/0xd8
[   33.230100]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.230421]  kasan_atomics+0xb8/0x2e0
[   33.230559]  kunit_try_run_case+0x170/0x3f0
[   33.230605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.231028]  kthread+0x328/0x630
[   33.231240]  ret_from_fork+0x10/0x20
[   33.231440] 
[   33.231521] The buggy address belongs to the object at fff00000c9225780
[   33.231521]  which belongs to the cache kmalloc-64 of size 64
[   33.231642] The buggy address is located 0 bytes to the right of
[   33.231642]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.231880] 
[   33.232049] The buggy address belongs to the physical page:
[   33.232139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.232606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.232969] page_type: f5(slab)
[   33.233127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.233263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.233310] page dumped because: kasan: bad access detected
[   33.233343] 
[   33.233730] Memory state around the buggy address:
[   33.233827]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.234070]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.234121] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.234561]                                      ^
[   33.234761]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.235033]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.235113] ==================================================================
[   33.244863] ==================================================================
[   33.245005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.245345] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.245503] 
[   33.245595] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.246150] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.246228] Hardware name: linux,dummy-virt (DT)
[   33.246289] Call trace:
[   33.246333]  show_stack+0x20/0x38 (C)
[   33.246826]  dump_stack_lvl+0x8c/0xd0
[   33.246976]  print_report+0x118/0x5e8
[   33.247097]  kasan_report+0xdc/0x128
[   33.247150]  kasan_check_range+0x100/0x1a8
[   33.247402]  __kasan_check_write+0x20/0x30
[   33.247565]  kasan_atomics_helper+0x1384/0x4858
[   33.247625]  kasan_atomics+0x198/0x2e0
[   33.248074]  kunit_try_run_case+0x170/0x3f0
[   33.248347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.248612]  kthread+0x328/0x630
[   33.248705]  ret_from_fork+0x10/0x20
[   33.248974] 
[   33.249426] Allocated by task 296:
[   33.249546]  kasan_save_stack+0x3c/0x68
[   33.249599]  kasan_save_track+0x20/0x40
[   33.249639]  kasan_save_alloc_info+0x40/0x58
[   33.249679]  __kasan_kmalloc+0xd4/0xd8
[   33.250032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.250118]  kasan_atomics+0xb8/0x2e0
[   33.250540]  kunit_try_run_case+0x170/0x3f0
[   33.250589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.250904]  kthread+0x328/0x630
[   33.251285]  ret_from_fork+0x10/0x20
[   33.251379] 
[   33.251419] The buggy address belongs to the object at fff00000c9225780
[   33.251419]  which belongs to the cache kmalloc-64 of size 64
[   33.251478] The buggy address is located 0 bytes to the right of
[   33.251478]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.251543] 
[   33.251566] The buggy address belongs to the physical page:
[   33.251611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.251675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.251734] page_type: f5(slab)
[   33.251776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.251845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.251894] page dumped because: kasan: bad access detected
[   33.251938] 
[   33.251960] Memory state around the buggy address:
[   33.251994]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.252039]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.252092] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.252131]                                      ^
[   33.252174]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.252216]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.252261] ==================================================================
[   32.999928] ==================================================================
[   32.999984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.000040] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.000092] 
[   33.000123] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.000216] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.000247] Hardware name: linux,dummy-virt (DT)
[   33.000279] Call trace:
[   33.000302]  show_stack+0x20/0x38 (C)
[   33.000655]  dump_stack_lvl+0x8c/0xd0
[   33.000961]  print_report+0x118/0x5e8
[   33.001248]  kasan_report+0xdc/0x128
[   33.001441]  kasan_check_range+0x100/0x1a8
[   33.001678]  __kasan_check_write+0x20/0x30
[   33.001803]  kasan_atomics_helper+0xa6c/0x4858
[   33.001990]  kasan_atomics+0x198/0x2e0
[   33.002359]  kunit_try_run_case+0x170/0x3f0
[   33.002473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.002594]  kthread+0x328/0x630
[   33.002679]  ret_from_fork+0x10/0x20
[   33.002807] 
[   33.002840] Allocated by task 296:
[   33.003146]  kasan_save_stack+0x3c/0x68
[   33.003273]  kasan_save_track+0x20/0x40
[   33.003360]  kasan_save_alloc_info+0x40/0x58
[   33.003707]  __kasan_kmalloc+0xd4/0xd8
[   33.003757]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.003821]  kasan_atomics+0xb8/0x2e0
[   33.004319]  kunit_try_run_case+0x170/0x3f0
[   33.004414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.004507]  kthread+0x328/0x630
[   33.004637]  ret_from_fork+0x10/0x20
[   33.004780] 
[   33.004939] The buggy address belongs to the object at fff00000c9225780
[   33.004939]  which belongs to the cache kmalloc-64 of size 64
[   33.005327] The buggy address is located 0 bytes to the right of
[   33.005327]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.005469] 
[   33.005537] The buggy address belongs to the physical page:
[   33.005739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.005952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.006075] page_type: f5(slab)
[   33.006244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.006369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.006724] page dumped because: kasan: bad access detected
[   33.006785] 
[   33.006927] Memory state around the buggy address:
[   33.007016]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.007151]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.007226] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.007440]                                      ^
[   33.007569]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.007642]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.007700] ==================================================================
[   33.275269] ==================================================================
[   33.275353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.275414] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.275881] 
[   33.275931] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.276422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.276475] Hardware name: linux,dummy-virt (DT)
[   33.276510] Call trace:
[   33.276554]  show_stack+0x20/0x38 (C)
[   33.276746]  dump_stack_lvl+0x8c/0xd0
[   33.276826]  print_report+0x118/0x5e8
[   33.276874]  kasan_report+0xdc/0x128
[   33.276920]  kasan_check_range+0x100/0x1a8
[   33.276967]  __kasan_check_write+0x20/0x30
[   33.277014]  kasan_atomics_helper+0x147c/0x4858
[   33.277065]  kasan_atomics+0x198/0x2e0
[   33.277113]  kunit_try_run_case+0x170/0x3f0
[   33.277162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.277214]  kthread+0x328/0x630
[   33.277383]  ret_from_fork+0x10/0x20
[   33.277450] 
[   33.277474] Allocated by task 296:
[   33.277508]  kasan_save_stack+0x3c/0x68
[   33.277552]  kasan_save_track+0x20/0x40
[   33.277590]  kasan_save_alloc_info+0x40/0x58
[   33.277629]  __kasan_kmalloc+0xd4/0xd8
[   33.277666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.277710]  kasan_atomics+0xb8/0x2e0
[   33.277750]  kunit_try_run_case+0x170/0x3f0
[   33.277789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.277848]  kthread+0x328/0x630
[   33.277886]  ret_from_fork+0x10/0x20
[   33.277936] 
[   33.277959] The buggy address belongs to the object at fff00000c9225780
[   33.277959]  which belongs to the cache kmalloc-64 of size 64
[   33.278025] The buggy address is located 0 bytes to the right of
[   33.278025]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.278090] 
[   33.278112] The buggy address belongs to the physical page:
[   33.278147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.278208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.278257] page_type: f5(slab)
[   33.278297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.278349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.278396] page dumped because: kasan: bad access detected
[   33.278429] 
[   33.278450] Memory state around the buggy address:
[   33.278495]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.278539]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.278582] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.278621]                                      ^
[   33.278655]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.278698]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.278747] ==================================================================
[   32.831115] ==================================================================
[   32.831167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   32.832007] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.832230]  show_stack+0x20/0x38 (C)
[   32.833328]  kasan_atomics+0x198/0x2e0
[   32.834535]  kasan_save_track+0x20/0x40
[   32.836570] The buggy address is located 0 bytes to the right of
[   32.836570]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.837981] 
[   32.838639] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.840081] ==================================================================
[   33.097957] ==================================================================
[   33.098221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.098425] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.098492] 
[   33.098699] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.098804] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.099030] Hardware name: linux,dummy-virt (DT)
[   33.099080] Call trace:
[   33.099304]  show_stack+0x20/0x38 (C)
[   33.099617]  dump_stack_lvl+0x8c/0xd0
[   33.099784]  print_report+0x118/0x5e8
[   33.099874]  kasan_report+0xdc/0x128
[   33.100134]  kasan_check_range+0x100/0x1a8
[   33.100292]  __kasan_check_read+0x20/0x30
[   33.100601]  kasan_atomics_helper+0xdd4/0x4858
[   33.100680]  kasan_atomics+0x198/0x2e0
[   33.100869]  kunit_try_run_case+0x170/0x3f0
[   33.101086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.101526]  kthread+0x328/0x630
[   33.101611]  ret_from_fork+0x10/0x20
[   33.102030] 
[   33.102376] Allocated by task 296:
[   33.102488]  kasan_save_stack+0x3c/0x68
[   33.102772]  kasan_save_track+0x20/0x40
[   33.102963]  kasan_save_alloc_info+0x40/0x58
[   33.103034]  __kasan_kmalloc+0xd4/0xd8
[   33.103452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.103543]  kasan_atomics+0xb8/0x2e0
[   33.103705]  kunit_try_run_case+0x170/0x3f0
[   33.103846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.103918]  kthread+0x328/0x630
[   33.104297]  ret_from_fork+0x10/0x20
[   33.104379] 
[   33.104713] The buggy address belongs to the object at fff00000c9225780
[   33.104713]  which belongs to the cache kmalloc-64 of size 64
[   33.105213] The buggy address is located 0 bytes to the right of
[   33.105213]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.105610] 
[   33.105677] The buggy address belongs to the physical page:
[   33.105963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.106218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.106277] page_type: f5(slab)
[   33.106318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.106466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.106522] page dumped because: kasan: bad access detected
[   33.106555] 
[   33.106576] Memory state around the buggy address:
[   33.106609]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.106655]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.106699] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.106738]                                      ^
[   33.106774]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.106841]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.106893] ==================================================================
[   33.080393] ==================================================================
[   33.080669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.080882] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.081168] 
[   33.081399] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.081521] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.081875] Hardware name: linux,dummy-virt (DT)
[   33.081937] Call trace:
[   33.082052]  show_stack+0x20/0x38 (C)
[   33.082185]  dump_stack_lvl+0x8c/0xd0
[   33.082252]  print_report+0x118/0x5e8
[   33.082305]  kasan_report+0xdc/0x128
[   33.082691]  kasan_check_range+0x100/0x1a8
[   33.083217]  __kasan_check_write+0x20/0x30
[   33.083310]  kasan_atomics_helper+0xd3c/0x4858
[   33.083721]  kasan_atomics+0x198/0x2e0
[   33.083809]  kunit_try_run_case+0x170/0x3f0
[   33.084075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.084285]  kthread+0x328/0x630
[   33.084522]  ret_from_fork+0x10/0x20
[   33.084786] 
[   33.084851] Allocated by task 296:
[   33.084893]  kasan_save_stack+0x3c/0x68
[   33.085134]  kasan_save_track+0x20/0x40
[   33.085320]  kasan_save_alloc_info+0x40/0x58
[   33.085707]  __kasan_kmalloc+0xd4/0xd8
[   33.085872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.085960]  kasan_atomics+0xb8/0x2e0
[   33.086069]  kunit_try_run_case+0x170/0x3f0
[   33.086222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.086269]  kthread+0x328/0x630
[   33.086320]  ret_from_fork+0x10/0x20
[   33.086359] 
[   33.086536] The buggy address belongs to the object at fff00000c9225780
[   33.086536]  which belongs to the cache kmalloc-64 of size 64
[   33.086795] The buggy address is located 0 bytes to the right of
[   33.086795]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.087106] 
[   33.087212] The buggy address belongs to the physical page:
[   33.087270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.088020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.088200] page_type: f5(slab)
[   33.088275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.088367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.088514] page dumped because: kasan: bad access detected
[   33.088549] 
[   33.088569] Memory state around the buggy address:
[   33.088626]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.089252]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.089320] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.089363]                                      ^
[   33.089399]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.089445]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.089525] ==================================================================
[   33.122865] ==================================================================
[   33.122924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.122981] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.123246] 
[   33.123419] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.123722] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.123967] Hardware name: linux,dummy-virt (DT)
[   33.124056] Call trace:
[   33.124086]  show_stack+0x20/0x38 (C)
[   33.124234]  dump_stack_lvl+0x8c/0xd0
[   33.124293]  print_report+0x118/0x5e8
[   33.124341]  kasan_report+0xdc/0x128
[   33.124389]  kasan_check_range+0x100/0x1a8
[   33.124437]  __kasan_check_write+0x20/0x30
[   33.124597]  kasan_atomics_helper+0xe44/0x4858
[   33.124665]  kasan_atomics+0x198/0x2e0
[   33.124722]  kunit_try_run_case+0x170/0x3f0
[   33.124772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.124837]  kthread+0x328/0x630
[   33.125442]  ret_from_fork+0x10/0x20
[   33.126033] 
[   33.126140] Allocated by task 296:
[   33.126192]  kasan_save_stack+0x3c/0x68
[   33.126365]  kasan_save_track+0x20/0x40
[   33.126427]  kasan_save_alloc_info+0x40/0x58
[   33.126775]  __kasan_kmalloc+0xd4/0xd8
[   33.126855]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.127281]  kasan_atomics+0xb8/0x2e0
[   33.127352]  kunit_try_run_case+0x170/0x3f0
[   33.127438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.127682]  kthread+0x328/0x630
[   33.127886]  ret_from_fork+0x10/0x20
[   33.127970] 
[   33.128014] The buggy address belongs to the object at fff00000c9225780
[   33.128014]  which belongs to the cache kmalloc-64 of size 64
[   33.128318] The buggy address is located 0 bytes to the right of
[   33.128318]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.128499] 
[   33.128577] The buggy address belongs to the physical page:
[   33.128615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.129048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.129178] page_type: f5(slab)
[   33.129225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.129602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.130247] page dumped because: kasan: bad access detected
[   33.130310] 
[   33.130365] Memory state around the buggy address:
[   33.130442]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.130581]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.130929] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.131324]                                      ^
[   33.131496]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.131730]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.131849] ==================================================================
[   33.253746] ==================================================================
[   33.253800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.253872] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.253923] 
[   33.253956] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.254047] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.254350] Hardware name: linux,dummy-virt (DT)
[   33.254403] Call trace:
[   33.255291]  show_stack+0x20/0x38 (C)
[   33.255368]  dump_stack_lvl+0x8c/0xd0
[   33.255421]  print_report+0x118/0x5e8
[   33.255504]  kasan_report+0xdc/0x128
[   33.255562]  __asan_report_load8_noabort+0x20/0x30
[   33.255616]  kasan_atomics_helper+0x3f04/0x4858
[   33.255936]  kasan_atomics+0x198/0x2e0
[   33.256051]  kunit_try_run_case+0x170/0x3f0
[   33.256111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.256498]  kthread+0x328/0x630
[   33.256568]  ret_from_fork+0x10/0x20
[   33.256621] 
[   33.256643] Allocated by task 296:
[   33.257174]  kasan_save_stack+0x3c/0x68
[   33.257256]  kasan_save_track+0x20/0x40
[   33.257296]  kasan_save_alloc_info+0x40/0x58
[   33.257338]  __kasan_kmalloc+0xd4/0xd8
[   33.257373]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.257417]  kasan_atomics+0xb8/0x2e0
[   33.257456]  kunit_try_run_case+0x170/0x3f0
[   33.257877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.258210]  kthread+0x328/0x630
[   33.258304]  ret_from_fork+0x10/0x20
[   33.258346] 
[   33.258640] The buggy address belongs to the object at fff00000c9225780
[   33.258640]  which belongs to the cache kmalloc-64 of size 64
[   33.259083] The buggy address is located 0 bytes to the right of
[   33.259083]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.259451] 
[   33.259598] The buggy address belongs to the physical page:
[   33.259692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.260021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.260463] page_type: f5(slab)
[   33.260638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.260855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.260934] page dumped because: kasan: bad access detected
[   33.261021] 
[   33.261059] Memory state around the buggy address:
[   33.261095]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.261338]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.261403] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.261558]                                      ^
[   33.261886]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.261982]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.262134] ==================================================================
[   33.353653] ==================================================================
[   33.353722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.353777] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.353839] 
[   33.353872] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.354164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.354202] Hardware name: linux,dummy-virt (DT)
[   33.354368] Call trace:
[   33.354394]  show_stack+0x20/0x38 (C)
[   33.354448]  dump_stack_lvl+0x8c/0xd0
[   33.354507]  print_report+0x118/0x5e8
[   33.354727]  kasan_report+0xdc/0x128
[   33.354779]  kasan_check_range+0x100/0x1a8
[   33.354871]  __kasan_check_write+0x20/0x30
[   33.355164]  kasan_atomics_helper+0x17ec/0x4858
[   33.355322]  kasan_atomics+0x198/0x2e0
[   33.355374]  kunit_try_run_case+0x170/0x3f0
[   33.355440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.355666]  kthread+0x328/0x630
[   33.355726]  ret_from_fork+0x10/0x20
[   33.355858] 
[   33.355943] Allocated by task 296:
[   33.355977]  kasan_save_stack+0x3c/0x68
[   33.356021]  kasan_save_track+0x20/0x40
[   33.356059]  kasan_save_alloc_info+0x40/0x58
[   33.356129]  __kasan_kmalloc+0xd4/0xd8
[   33.356444]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.356554]  kasan_atomics+0xb8/0x2e0
[   33.356598]  kunit_try_run_case+0x170/0x3f0
[   33.356852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.356912]  kthread+0x328/0x630
[   33.356949]  ret_from_fork+0x10/0x20
[   33.357209] 
[   33.357278] The buggy address belongs to the object at fff00000c9225780
[   33.357278]  which belongs to the cache kmalloc-64 of size 64
[   33.357426] The buggy address is located 0 bytes to the right of
[   33.357426]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.357535] 
[   33.357604] The buggy address belongs to the physical page:
[   33.357700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.357990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.358128] page_type: f5(slab)
[   33.358177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.358563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.358731] page dumped because: kasan: bad access detected
[   33.358820] 
[   33.358888] Memory state around the buggy address:
[   33.359247]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.359357]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.359488] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.359527]                                      ^
[   33.359579]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.359945]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.360028] ==================================================================
[   33.207045] ==================================================================
[   33.207367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.207525] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.207610] 
[   33.207645] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.207774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.207805] Hardware name: linux,dummy-virt (DT)
[   33.207848] Call trace:
[   33.208357]  show_stack+0x20/0x38 (C)
[   33.208551]  dump_stack_lvl+0x8c/0xd0
[   33.208614]  print_report+0x118/0x5e8
[   33.208872]  kasan_report+0xdc/0x128
[   33.209066]  kasan_check_range+0x100/0x1a8
[   33.209480]  __kasan_check_write+0x20/0x30
[   33.209691]  kasan_atomics_helper+0x1190/0x4858
[   33.209907]  kasan_atomics+0x198/0x2e0
[   33.210078]  kunit_try_run_case+0x170/0x3f0
[   33.210177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.210544]  kthread+0x328/0x630
[   33.210648]  ret_from_fork+0x10/0x20
[   33.210702] 
[   33.210748] Allocated by task 296:
[   33.211098]  kasan_save_stack+0x3c/0x68
[   33.211163]  kasan_save_track+0x20/0x40
[   33.211220]  kasan_save_alloc_info+0x40/0x58
[   33.211392]  __kasan_kmalloc+0xd4/0xd8
[   33.211439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.211486]  kasan_atomics+0xb8/0x2e0
[   33.211525]  kunit_try_run_case+0x170/0x3f0
[   33.211923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.211994]  kthread+0x328/0x630
[   33.212360]  ret_from_fork+0x10/0x20
[   33.212567] 
[   33.212644] The buggy address belongs to the object at fff00000c9225780
[   33.212644]  which belongs to the cache kmalloc-64 of size 64
[   33.213145] The buggy address is located 0 bytes to the right of
[   33.213145]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.213373] 
[   33.213534] The buggy address belongs to the physical page:
[   33.213605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.213801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.213987] page_type: f5(slab)
[   33.214374] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.214501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.214558] page dumped because: kasan: bad access detected
[   33.214639] 
[   33.214719] Memory state around the buggy address:
[   33.214786]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.214844]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.215059] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.215268]                                      ^
[   33.215362]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.215837]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.215920] ==================================================================
[   33.311704] ==================================================================
[   33.311764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.311832] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.311900] 
[   33.311933] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.312235] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.312280] Hardware name: linux,dummy-virt (DT)
[   33.312350] Call trace:
[   33.312376]  show_stack+0x20/0x38 (C)
[   33.312431]  dump_stack_lvl+0x8c/0xd0
[   33.312481]  print_report+0x118/0x5e8
[   33.312556]  kasan_report+0xdc/0x128
[   33.312617]  __asan_report_load8_noabort+0x20/0x30
[   33.312669]  kasan_atomics_helper+0x3db0/0x4858
[   33.312721]  kasan_atomics+0x198/0x2e0
[   33.312788]  kunit_try_run_case+0x170/0x3f0
[   33.312880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.313019]  kthread+0x328/0x630
[   33.313082]  ret_from_fork+0x10/0x20
[   33.313133] 
[   33.313161] Allocated by task 296:
[   33.313192]  kasan_save_stack+0x3c/0x68
[   33.313234]  kasan_save_track+0x20/0x40
[   33.313272]  kasan_save_alloc_info+0x40/0x58
[   33.313313]  __kasan_kmalloc+0xd4/0xd8
[   33.313348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.313565]  kasan_atomics+0xb8/0x2e0
[   33.313635]  kunit_try_run_case+0x170/0x3f0
[   33.313709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.313805]  kthread+0x328/0x630
[   33.314167]  ret_from_fork+0x10/0x20
[   33.314256] 
[   33.314324] The buggy address belongs to the object at fff00000c9225780
[   33.314324]  which belongs to the cache kmalloc-64 of size 64
[   33.314431] The buggy address is located 0 bytes to the right of
[   33.314431]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.314515] 
[   33.314537] The buggy address belongs to the physical page:
[   33.314735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.314961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.315041] page_type: f5(slab)
[   33.315096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.315322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.315367] page dumped because: kasan: bad access detected
[   33.315533] 
[   33.315877] Memory state around the buggy address:
[   33.316157]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.316332]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.316450] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.316518]                                      ^
[   33.316606]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.316704]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.316745] ==================================================================
[   33.263635] ==================================================================
[   33.263838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.264046] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.264322] 
[   33.264403] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.264503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.264535] Hardware name: linux,dummy-virt (DT)
[   33.264951] Call trace:
[   33.265199]  show_stack+0x20/0x38 (C)
[   33.265281]  dump_stack_lvl+0x8c/0xd0
[   33.265350]  print_report+0x118/0x5e8
[   33.265793]  kasan_report+0xdc/0x128
[   33.266252]  kasan_check_range+0x100/0x1a8
[   33.266315]  __kasan_check_write+0x20/0x30
[   33.266363]  kasan_atomics_helper+0x1414/0x4858
[   33.266447]  kasan_atomics+0x198/0x2e0
[   33.266774]  kunit_try_run_case+0x170/0x3f0
[   33.266873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.267468]  kthread+0x328/0x630
[   33.267645]  ret_from_fork+0x10/0x20
[   33.268077] 
[   33.268135] Allocated by task 296:
[   33.268172]  kasan_save_stack+0x3c/0x68
[   33.268464]  kasan_save_track+0x20/0x40
[   33.268837]  kasan_save_alloc_info+0x40/0x58
[   33.269076]  __kasan_kmalloc+0xd4/0xd8
[   33.269187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.269375]  kasan_atomics+0xb8/0x2e0
[   33.269634]  kunit_try_run_case+0x170/0x3f0
[   33.269791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.269885]  kthread+0x328/0x630
[   33.270099]  ret_from_fork+0x10/0x20
[   33.270304] 
[   33.270479] The buggy address belongs to the object at fff00000c9225780
[   33.270479]  which belongs to the cache kmalloc-64 of size 64
[   33.270550] The buggy address is located 0 bytes to the right of
[   33.270550]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.270615] 
[   33.270909] The buggy address belongs to the physical page:
[   33.271310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.271409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.271517] page_type: f5(slab)
[   33.271850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.271937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.272044] page dumped because: kasan: bad access detected
[   33.272132] 
[   33.272249] Memory state around the buggy address:
[   33.272305]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.272369]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.272413] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.272772]                                      ^
[   33.272891]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.273087]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.273304] ==================================================================
[   33.196646] ==================================================================
[   33.197104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.197190] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.197243] 
[   33.197277] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.197610] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.198010] Hardware name: linux,dummy-virt (DT)
[   33.198090] Call trace:
[   33.198282]  show_stack+0x20/0x38 (C)
[   33.198380]  dump_stack_lvl+0x8c/0xd0
[   33.198555]  print_report+0x118/0x5e8
[   33.198612]  kasan_report+0xdc/0x128
[   33.198659]  kasan_check_range+0x100/0x1a8
[   33.198708]  __kasan_check_write+0x20/0x30
[   33.199119]  kasan_atomics_helper+0x1128/0x4858
[   33.199620]  kasan_atomics+0x198/0x2e0
[   33.199915]  kunit_try_run_case+0x170/0x3f0
[   33.200175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.200385]  kthread+0x328/0x630
[   33.200450]  ret_from_fork+0x10/0x20
[   33.200749] 
[   33.200840] Allocated by task 296:
[   33.201236]  kasan_save_stack+0x3c/0x68
[   33.201297]  kasan_save_track+0x20/0x40
[   33.201623]  kasan_save_alloc_info+0x40/0x58
[   33.201712]  __kasan_kmalloc+0xd4/0xd8
[   33.202071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.202191]  kasan_atomics+0xb8/0x2e0
[   33.202264]  kunit_try_run_case+0x170/0x3f0
[   33.202304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.202647]  kthread+0x328/0x630
[   33.202955]  ret_from_fork+0x10/0x20
[   33.203300] 
[   33.203355] The buggy address belongs to the object at fff00000c9225780
[   33.203355]  which belongs to the cache kmalloc-64 of size 64
[   33.203689] The buggy address is located 0 bytes to the right of
[   33.203689]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.203772] 
[   33.203984] The buggy address belongs to the physical page:
[   33.204042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.204239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.204565] page_type: f5(slab)
[   33.205145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.205230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.205303] page dumped because: kasan: bad access detected
[   33.205336] 
[   33.205393] Memory state around the buggy address:
[   33.205429]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.205477]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.205530] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.205580]                                      ^
[   33.205618]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.205671]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.205712] ==================================================================
[   33.110430] ==================================================================
[   33.110802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.110986] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.111048] 
[   33.111084] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.111580] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.111637] Hardware name: linux,dummy-virt (DT)
[   33.111673] Call trace:
[   33.111698]  show_stack+0x20/0x38 (C)
[   33.112060]  dump_stack_lvl+0x8c/0xd0
[   33.112138]  print_report+0x118/0x5e8
[   33.112527]  kasan_report+0xdc/0x128
[   33.112852]  __asan_report_load8_noabort+0x20/0x30
[   33.113085]  kasan_atomics_helper+0x3f58/0x4858
[   33.113908]  kasan_atomics+0x198/0x2e0
[   33.113990]  kunit_try_run_case+0x170/0x3f0
[   33.114305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.114443]  kthread+0x328/0x630
[   33.114524]  ret_from_fork+0x10/0x20
[   33.114900] 
[   33.115340] Allocated by task 296:
[   33.115384]  kasan_save_stack+0x3c/0x68
[   33.115624]  kasan_save_track+0x20/0x40
[   33.115856]  kasan_save_alloc_info+0x40/0x58
[   33.116289]  __kasan_kmalloc+0xd4/0xd8
[   33.116525]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.116640]  kasan_atomics+0xb8/0x2e0
[   33.116954]  kunit_try_run_case+0x170/0x3f0
[   33.117009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.117758]  kthread+0x328/0x630
[   33.117963]  ret_from_fork+0x10/0x20
[   33.118079] 
[   33.118221] The buggy address belongs to the object at fff00000c9225780
[   33.118221]  which belongs to the cache kmalloc-64 of size 64
[   33.118283] The buggy address is located 0 bytes to the right of
[   33.118283]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.118380] 
[   33.118427] The buggy address belongs to the physical page:
[   33.118684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.119328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.119562] page_type: f5(slab)
[   33.119607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.119659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.120254] page dumped because: kasan: bad access detected
[   33.120439] 
[   33.120490] Memory state around the buggy address:
[   33.120544]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.120651]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.120712] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.120751]                                      ^
[   33.121042]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.121261]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.121340] ==================================================================
[   33.162187] ==================================================================
[   33.162254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.162348] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.162432] 
[   33.162467] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.162634] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.162668] Hardware name: linux,dummy-virt (DT)
[   33.162719] Call trace:
[   33.162800]  show_stack+0x20/0x38 (C)
[   33.162884]  dump_stack_lvl+0x8c/0xd0
[   33.162994]  print_report+0x118/0x5e8
[   33.163041]  kasan_report+0xdc/0x128
[   33.163089]  kasan_check_range+0x100/0x1a8
[   33.163151]  __kasan_check_write+0x20/0x30
[   33.163348]  kasan_atomics_helper+0xf88/0x4858
[   33.163652]  kasan_atomics+0x198/0x2e0
[   33.163870]  kunit_try_run_case+0x170/0x3f0
[   33.163943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.163997]  kthread+0x328/0x630
[   33.164041]  ret_from_fork+0x10/0x20
[   33.164128] 
[   33.164166] Allocated by task 296:
[   33.164204]  kasan_save_stack+0x3c/0x68
[   33.164640]  kasan_save_track+0x20/0x40
[   33.164730]  kasan_save_alloc_info+0x40/0x58
[   33.164774]  __kasan_kmalloc+0xd4/0xd8
[   33.165370]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.165531]  kasan_atomics+0xb8/0x2e0
[   33.165603]  kunit_try_run_case+0x170/0x3f0
[   33.165701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.165788]  kthread+0x328/0x630
[   33.165853]  ret_from_fork+0x10/0x20
[   33.165893] 
[   33.166267] The buggy address belongs to the object at fff00000c9225780
[   33.166267]  which belongs to the cache kmalloc-64 of size 64
[   33.166374] The buggy address is located 0 bytes to the right of
[   33.166374]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.166920] 
[   33.166973] The buggy address belongs to the physical page:
[   33.167028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.167296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.167410] page_type: f5(slab)
[   33.167639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.168086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.168176] page dumped because: kasan: bad access detected
[   33.168406] 
[   33.168453] Memory state around the buggy address:
[   33.168599]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.168681]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.169054] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.169130]                                      ^
[   33.169410]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.169565]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.169729] ==================================================================
[   33.336690] ==================================================================
[   33.336849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.336915] Read of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.336990] 
[   33.337050] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.337142] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.337176] Hardware name: linux,dummy-virt (DT)
[   33.337209] Call trace:
[   33.337232]  show_stack+0x20/0x38 (C)
[   33.337283]  dump_stack_lvl+0x8c/0xd0
[   33.337332]  print_report+0x118/0x5e8
[   33.337546]  kasan_report+0xdc/0x128
[   33.337694]  __asan_report_load8_noabort+0x20/0x30
[   33.337790]  kasan_atomics_helper+0x3e10/0x4858
[   33.337883]  kasan_atomics+0x198/0x2e0
[   33.337995]  kunit_try_run_case+0x170/0x3f0
[   33.338047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.338100]  kthread+0x328/0x630
[   33.338384]  ret_from_fork+0x10/0x20
[   33.338499] 
[   33.338538] Allocated by task 296:
[   33.338570]  kasan_save_stack+0x3c/0x68
[   33.338980]  kasan_save_track+0x20/0x40
[   33.339106]  kasan_save_alloc_info+0x40/0x58
[   33.339371]  __kasan_kmalloc+0xd4/0xd8
[   33.339545]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.339722]  kasan_atomics+0xb8/0x2e0
[   33.339774]  kunit_try_run_case+0x170/0x3f0
[   33.339824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.340165]  kthread+0x328/0x630
[   33.340345]  ret_from_fork+0x10/0x20
[   33.340441] 
[   33.340519] The buggy address belongs to the object at fff00000c9225780
[   33.340519]  which belongs to the cache kmalloc-64 of size 64
[   33.340885] The buggy address is located 0 bytes to the right of
[   33.340885]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.340984] 
[   33.341006] The buggy address belongs to the physical page:
[   33.341038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.341226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.341276] page_type: f5(slab)
[   33.341550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.341683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.342016] page dumped because: kasan: bad access detected
[   33.342135] 
[   33.342253] Memory state around the buggy address:
[   33.342334]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.342382]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.342435] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.342484]                                      ^
[   33.342519]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.342563]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.342612] ==================================================================
[   32.885450] ==================================================================
[   32.885508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   32.885562] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   32.885614] 
[   32.885974] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.887319]  kasan_atomics_helper+0x414/0x4858
[   32.887798]  kunit_try_run_case+0x170/0x3f0
[   32.888132] 
[   32.888537]  kasan_save_track+0x20/0x40
[   32.888884]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.889097]  kunit_try_run_case+0x170/0x3f0
[   32.889183]  kthread+0x328/0x630
[   32.889702] The buggy address belongs to the object at fff00000c9225780
[   32.889702]  which belongs to the cache kmalloc-64 of size 64
[   32.891306] 
[   32.891363] Memory state around the buggy address:
[   32.891968]                                      ^
[   32.892189] ==================================================================
[   32.981678] ==================================================================
[   32.981731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   32.981787] Write of size 4 at addr fff00000c92257b0 by task kunit_try_catch/296
[   32.982109] 
[   32.982310] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   32.982470] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.982506] Hardware name: linux,dummy-virt (DT)
[   32.982539] Call trace:
[   32.982564]  show_stack+0x20/0x38 (C)
[   32.982823]  dump_stack_lvl+0x8c/0xd0
[   32.982884]  print_report+0x118/0x5e8
[   32.983019]  kasan_report+0xdc/0x128
[   32.983116]  kasan_check_range+0x100/0x1a8
[   32.983222]  __kasan_check_write+0x20/0x30
[   32.983288]  kasan_atomics_helper+0x99c/0x4858
[   32.983341]  kasan_atomics+0x198/0x2e0
[   32.983408]  kunit_try_run_case+0x170/0x3f0
[   32.983736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.983800]  kthread+0x328/0x630
[   32.983941]  ret_from_fork+0x10/0x20
[   32.983993] 
[   32.984063] Allocated by task 296:
[   32.984151]  kasan_save_stack+0x3c/0x68
[   32.984268]  kasan_save_track+0x20/0x40
[   32.984367]  kasan_save_alloc_info+0x40/0x58
[   32.984423]  __kasan_kmalloc+0xd4/0xd8
[   32.984463]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.984506]  kasan_atomics+0xb8/0x2e0
[   32.984845]  kunit_try_run_case+0x170/0x3f0
[   32.985376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.985738]  kthread+0x328/0x630
[   32.985879]  ret_from_fork+0x10/0x20
[   32.986006] 
[   32.986084] The buggy address belongs to the object at fff00000c9225780
[   32.986084]  which belongs to the cache kmalloc-64 of size 64
[   32.986180] The buggy address is located 0 bytes to the right of
[   32.986180]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   32.986269] 
[   32.986491] The buggy address belongs to the physical page:
[   32.986739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   32.986843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.987146] page_type: f5(slab)
[   32.987198] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.987544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.987664] page dumped because: kasan: bad access detected
[   32.987946] 
[   32.988006] Memory state around the buggy address:
[   32.988253]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.988585]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.988865] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.989121]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.990901] 
[   32.991146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   32.991214] Call trace:
[   32.991564]  kasan_report+0xdc/0x128
[   32.992866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.994057]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.995060]  ret_from_fork+0x10/0x20
[   32.995508] 
[   32.995744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   32.996268] page_type: f5(slab)
[   32.996349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.996703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.996845] page dumped because: kasan: bad access detected
[   32.996920] 
[   32.997087] Memory state around the buggy address:
[   32.997180]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.997354]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.997522] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.997586]                                      ^
[   32.997874]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.997933]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.998093] ==================================================================
[   33.296983] ==================================================================
[   33.297105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.297479] Write of size 8 at addr fff00000c92257b0 by task kunit_try_catch/296
[   33.297557] 
[   33.297601] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   33.298142] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   33.298573] Hardware name: linux,dummy-virt (DT)
[   33.298643] Call trace:
[   33.298688]  show_stack+0x20/0x38 (C)
[   33.298791]  dump_stack_lvl+0x8c/0xd0
[   33.298903]  print_report+0x118/0x5e8
[   33.299068]  kasan_report+0xdc/0x128
[   33.299175]  kasan_check_range+0x100/0x1a8
[   33.299325]  __kasan_check_write+0x20/0x30
[   33.299837]  kasan_atomics_helper+0x154c/0x4858
[   33.300100]  kasan_atomics+0x198/0x2e0
[   33.300374]  kunit_try_run_case+0x170/0x3f0
[   33.301022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.301396]  kthread+0x328/0x630
[   33.301525]  ret_from_fork+0x10/0x20
[   33.301669] 
[   33.301750] Allocated by task 296:
[   33.302167]  kasan_save_stack+0x3c/0x68
[   33.302248]  kasan_save_track+0x20/0x40
[   33.302521]  kasan_save_alloc_info+0x40/0x58
[   33.302604]  __kasan_kmalloc+0xd4/0xd8
[   33.302644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.302988]  kasan_atomics+0xb8/0x2e0
[   33.303312]  kunit_try_run_case+0x170/0x3f0
[   33.303580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.303940]  kthread+0x328/0x630
[   33.304677]  ret_from_fork+0x10/0x20
[   33.305400] 
[   33.305441] The buggy address belongs to the object at fff00000c9225780
[   33.305441]  which belongs to the cache kmalloc-64 of size 64
[   33.305503] The buggy address is located 0 bytes to the right of
[   33.305503]  allocated 48-byte region [fff00000c9225780, fff00000c92257b0)
[   33.305568] 
[   33.305592] The buggy address belongs to the physical page:
[   33.305628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109225
[   33.305686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.305736] page_type: f5(slab)
[   33.305777] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.305840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.305992] page dumped because: kasan: bad access detected
[   33.306100] 
[   33.306177] Memory state around the buggy address:
[   33.306310]  fff00000c9225680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.306427]  fff00000c9225700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   33.306537] >fff00000c9225780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.306627]                                      ^
[   33.306712]  fff00000c9225800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.306768]  fff00000c9225880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.306807] ==================================================================

[   28.243066] ==================================================================
[   28.243365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   28.244069] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.244416] 
[   28.244643] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.244698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.244713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.244736] Call Trace:
[   28.244753]  <TASK>
[   28.244768]  dump_stack_lvl+0x73/0xb0
[   28.244924]  print_report+0xd1/0x640
[   28.244951]  ? __virt_addr_valid+0x1db/0x2d0
[   28.244979]  ? kasan_atomics_helper+0x4a02/0x5450
[   28.245002]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.245030]  ? kasan_atomics_helper+0x4a02/0x5450
[   28.245054]  kasan_report+0x141/0x180
[   28.245078]  ? kasan_atomics_helper+0x4a02/0x5450
[   28.245107]  __asan_report_load4_noabort+0x18/0x20
[   28.245133]  kasan_atomics_helper+0x4a02/0x5450
[   28.245157]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.245181]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.245219]  ? kasan_atomics+0x152/0x310
[   28.245247]  kasan_atomics+0x1dc/0x310
[   28.245272]  ? __pfx_kasan_atomics+0x10/0x10
[   28.245299]  ? __pfx_read_tsc+0x10/0x10
[   28.245322]  ? ktime_get_ts64+0x86/0x230
[   28.245348]  kunit_try_run_case+0x1a5/0x480
[   28.245374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.245399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.245425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.245452]  ? __kthread_parkme+0x82/0x180
[   28.245495]  ? preempt_count_sub+0x50/0x80
[   28.245521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.245548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.245574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.245599]  kthread+0x337/0x6f0
[   28.245621]  ? trace_preempt_on+0x20/0xc0
[   28.245647]  ? __pfx_kthread+0x10/0x10
[   28.245669]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.245695]  ? calculate_sigpending+0x7b/0xa0
[   28.245720]  ? __pfx_kthread+0x10/0x10
[   28.245744]  ret_from_fork+0x116/0x1d0
[   28.245765]  ? __pfx_kthread+0x10/0x10
[   28.245788]  ret_from_fork_asm+0x1a/0x30
[   28.245821]  </TASK>
[   28.245845] 
[   28.256228] Allocated by task 313:
[   28.256732]  kasan_save_stack+0x45/0x70
[   28.256935]  kasan_save_track+0x18/0x40
[   28.257122]  kasan_save_alloc_info+0x3b/0x50
[   28.257722]  __kasan_kmalloc+0xb7/0xc0
[   28.257887]  __kmalloc_cache_noprof+0x189/0x420
[   28.258119]  kasan_atomics+0x95/0x310
[   28.258466]  kunit_try_run_case+0x1a5/0x480
[   28.258861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.259149]  kthread+0x337/0x6f0
[   28.259402]  ret_from_fork+0x116/0x1d0
[   28.259619]  ret_from_fork_asm+0x1a/0x30
[   28.259825] 
[   28.259994] The buggy address belongs to the object at ffff8881058a7e80
[   28.259994]  which belongs to the cache kmalloc-64 of size 64
[   28.260673] The buggy address is located 0 bytes to the right of
[   28.260673]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.261313] 
[   28.261613] The buggy address belongs to the physical page:
[   28.261930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.262415] flags: 0x200000000000000(node=0|zone=2)
[   28.262666] page_type: f5(slab)
[   28.262921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.263363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.263720] page dumped because: kasan: bad access detected
[   28.264169] 
[   28.264287] Memory state around the buggy address:
[   28.264503]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.265037]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.265338] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.265673]                                      ^
[   28.266122]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.266588]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.266854] ==================================================================
[   27.578145] ==================================================================
[   27.578553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   27.578854] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.579160] 
[   27.579325] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.579377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.579391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.579414] Call Trace:
[   27.579432]  <TASK>
[   27.579448]  dump_stack_lvl+0x73/0xb0
[   27.579477]  print_report+0xd1/0x640
[   27.579502]  ? __virt_addr_valid+0x1db/0x2d0
[   27.579528]  ? kasan_atomics_helper+0x3df/0x5450
[   27.579608]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.579640]  ? kasan_atomics_helper+0x3df/0x5450
[   27.579665]  kasan_report+0x141/0x180
[   27.579689]  ? kasan_atomics_helper+0x3df/0x5450
[   27.579717]  kasan_check_range+0x10c/0x1c0
[   27.579744]  __kasan_check_read+0x15/0x20
[   27.579770]  kasan_atomics_helper+0x3df/0x5450
[   27.579795]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.579819]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.579859]  ? kasan_atomics+0x152/0x310
[   27.579887]  kasan_atomics+0x1dc/0x310
[   27.579912]  ? __pfx_kasan_atomics+0x10/0x10
[   27.579938]  ? __pfx_read_tsc+0x10/0x10
[   27.579962]  ? ktime_get_ts64+0x86/0x230
[   27.579987]  kunit_try_run_case+0x1a5/0x480
[   27.580014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.580039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.580067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.580094]  ? __kthread_parkme+0x82/0x180
[   27.580117]  ? preempt_count_sub+0x50/0x80
[   27.580142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.580169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.580208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.580234]  kthread+0x337/0x6f0
[   27.580256]  ? trace_preempt_on+0x20/0xc0
[   27.580282]  ? __pfx_kthread+0x10/0x10
[   27.580305]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.580331]  ? calculate_sigpending+0x7b/0xa0
[   27.580357]  ? __pfx_kthread+0x10/0x10
[   27.580381]  ret_from_fork+0x116/0x1d0
[   27.580402]  ? __pfx_kthread+0x10/0x10
[   27.580425]  ret_from_fork_asm+0x1a/0x30
[   27.580457]  </TASK>
[   27.580481] 
[   27.588636] Allocated by task 313:
[   27.588789]  kasan_save_stack+0x45/0x70
[   27.589013]  kasan_save_track+0x18/0x40
[   27.589191]  kasan_save_alloc_info+0x3b/0x50
[   27.589371]  __kasan_kmalloc+0xb7/0xc0
[   27.589610]  __kmalloc_cache_noprof+0x189/0x420
[   27.589871]  kasan_atomics+0x95/0x310
[   27.590014]  kunit_try_run_case+0x1a5/0x480
[   27.590166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.590396]  kthread+0x337/0x6f0
[   27.590563]  ret_from_fork+0x116/0x1d0
[   27.590928]  ret_from_fork_asm+0x1a/0x30
[   27.591107] 
[   27.591213] The buggy address belongs to the object at ffff8881058a7e80
[   27.591213]  which belongs to the cache kmalloc-64 of size 64
[   27.591766] The buggy address is located 0 bytes to the right of
[   27.591766]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.592307] 
[   27.592403] The buggy address belongs to the physical page:
[   27.592709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.593072] flags: 0x200000000000000(node=0|zone=2)
[   27.593312] page_type: f5(slab)
[   27.593436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.593674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.593913] page dumped because: kasan: bad access detected
[   27.594088] 
[   27.594157] Memory state around the buggy address:
[   27.594382]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.594715]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.595041] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.595613]                                      ^
[   27.595775]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.596008]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.596223] ==================================================================
[   27.708271] ==================================================================
[   27.708799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   27.709119] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.709366] 
[   27.709573] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.709628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.709827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.709869] Call Trace:
[   27.709888]  <TASK>
[   27.709905]  dump_stack_lvl+0x73/0xb0
[   27.709937]  print_report+0xd1/0x640
[   27.709962]  ? __virt_addr_valid+0x1db/0x2d0
[   27.709987]  ? kasan_atomics_helper+0x697/0x5450
[   27.710010]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.710038]  ? kasan_atomics_helper+0x697/0x5450
[   27.710062]  kasan_report+0x141/0x180
[   27.710087]  ? kasan_atomics_helper+0x697/0x5450
[   27.710116]  kasan_check_range+0x10c/0x1c0
[   27.710142]  __kasan_check_write+0x18/0x20
[   27.710490]  kasan_atomics_helper+0x697/0x5450
[   27.710520]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.710558]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.710584]  ? kasan_atomics+0x152/0x310
[   27.710613]  kasan_atomics+0x1dc/0x310
[   27.710637]  ? __pfx_kasan_atomics+0x10/0x10
[   27.710663]  ? __pfx_read_tsc+0x10/0x10
[   27.710687]  ? ktime_get_ts64+0x86/0x230
[   27.710714]  kunit_try_run_case+0x1a5/0x480
[   27.710741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.710766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.710793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.710820]  ? __kthread_parkme+0x82/0x180
[   27.710854]  ? preempt_count_sub+0x50/0x80
[   27.710880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.710907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.710933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.710959]  kthread+0x337/0x6f0
[   27.710980]  ? trace_preempt_on+0x20/0xc0
[   27.711005]  ? __pfx_kthread+0x10/0x10
[   27.711028]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.711053]  ? calculate_sigpending+0x7b/0xa0
[   27.711078]  ? __pfx_kthread+0x10/0x10
[   27.711101]  ret_from_fork+0x116/0x1d0
[   27.711123]  ? __pfx_kthread+0x10/0x10
[   27.711145]  ret_from_fork_asm+0x1a/0x30
[   27.711178]  </TASK>
[   27.711191] 
[   27.723380] Allocated by task 313:
[   27.723934]  kasan_save_stack+0x45/0x70
[   27.724133]  kasan_save_track+0x18/0x40
[   27.724541]  kasan_save_alloc_info+0x3b/0x50
[   27.724907]  __kasan_kmalloc+0xb7/0xc0
[   27.725108]  __kmalloc_cache_noprof+0x189/0x420
[   27.725535]  kasan_atomics+0x95/0x310
[   27.725846]  kunit_try_run_case+0x1a5/0x480
[   27.726069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.726451]  kthread+0x337/0x6f0
[   27.726754]  ret_from_fork+0x116/0x1d0
[   27.726925]  ret_from_fork_asm+0x1a/0x30
[   27.727129] 
[   27.727407] The buggy address belongs to the object at ffff8881058a7e80
[   27.727407]  which belongs to the cache kmalloc-64 of size 64
[   27.728121] The buggy address is located 0 bytes to the right of
[   27.728121]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.729027] 
[   27.729351] The buggy address belongs to the physical page:
[   27.729804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.730242] flags: 0x200000000000000(node=0|zone=2)
[   27.730437] page_type: f5(slab)
[   27.730799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.731243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.731718] page dumped because: kasan: bad access detected
[   27.731972] 
[   27.732072] Memory state around the buggy address:
[   27.732263]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.732893]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.733311] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.733958]                                      ^
[   27.734151]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.734743]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.735158] ==================================================================
[   27.889338] ==================================================================
[   27.889759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   27.890080] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.890426] 
[   27.890608] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.890659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.890674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.890706] Call Trace:
[   27.890722]  <TASK>
[   27.890737]  dump_stack_lvl+0x73/0xb0
[   27.890776]  print_report+0xd1/0x640
[   27.890801]  ? __virt_addr_valid+0x1db/0x2d0
[   27.890826]  ? kasan_atomics_helper+0xac7/0x5450
[   27.890858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.890886]  ? kasan_atomics_helper+0xac7/0x5450
[   27.890909]  kasan_report+0x141/0x180
[   27.890933]  ? kasan_atomics_helper+0xac7/0x5450
[   27.890960]  kasan_check_range+0x10c/0x1c0
[   27.890985]  __kasan_check_write+0x18/0x20
[   27.891010]  kasan_atomics_helper+0xac7/0x5450
[   27.891034]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.891058]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.891083]  ? kasan_atomics+0x152/0x310
[   27.891111]  kasan_atomics+0x1dc/0x310
[   27.891142]  ? __pfx_kasan_atomics+0x10/0x10
[   27.891168]  ? __pfx_read_tsc+0x10/0x10
[   27.891215]  ? ktime_get_ts64+0x86/0x230
[   27.891240]  kunit_try_run_case+0x1a5/0x480
[   27.891267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.891292]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.891318]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.891345]  ? __kthread_parkme+0x82/0x180
[   27.891367]  ? preempt_count_sub+0x50/0x80
[   27.891392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.891418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.891492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.891522]  kthread+0x337/0x6f0
[   27.891545]  ? trace_preempt_on+0x20/0xc0
[   27.891572]  ? __pfx_kthread+0x10/0x10
[   27.891598]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.891624]  ? calculate_sigpending+0x7b/0xa0
[   27.891660]  ? __pfx_kthread+0x10/0x10
[   27.891684]  ret_from_fork+0x116/0x1d0
[   27.891717]  ? __pfx_kthread+0x10/0x10
[   27.891739]  ret_from_fork_asm+0x1a/0x30
[   27.891772]  </TASK>
[   27.891784] 
[   27.900351] Allocated by task 313:
[   27.900612]  kasan_save_stack+0x45/0x70
[   27.900769]  kasan_save_track+0x18/0x40
[   27.900927]  kasan_save_alloc_info+0x3b/0x50
[   27.901187]  __kasan_kmalloc+0xb7/0xc0
[   27.901375]  __kmalloc_cache_noprof+0x189/0x420
[   27.901604]  kasan_atomics+0x95/0x310
[   27.901789]  kunit_try_run_case+0x1a5/0x480
[   27.902005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.902625]  kthread+0x337/0x6f0
[   27.902802]  ret_from_fork+0x116/0x1d0
[   27.902978]  ret_from_fork_asm+0x1a/0x30
[   27.903148] 
[   27.903238] The buggy address belongs to the object at ffff8881058a7e80
[   27.903238]  which belongs to the cache kmalloc-64 of size 64
[   27.904565] The buggy address is located 0 bytes to the right of
[   27.904565]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.905860] 
[   27.905972] The buggy address belongs to the physical page:
[   27.906447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.906844] flags: 0x200000000000000(node=0|zone=2)
[   27.907061] page_type: f5(slab)
[   27.907442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.907999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.908735] page dumped because: kasan: bad access detected
[   27.909191] 
[   27.909449] Memory state around the buggy address:
[   27.909923]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.910508]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.911015] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.911726]                                      ^
[   27.911974]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.912431]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.913061] ==================================================================
[   27.869624] ==================================================================
[   27.869980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   27.870289] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.870827] 
[   27.870943] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.871008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.871023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.871046] Call Trace:
[   27.871063]  <TASK>
[   27.871090]  dump_stack_lvl+0x73/0xb0
[   27.871122]  print_report+0xd1/0x640
[   27.871166]  ? __virt_addr_valid+0x1db/0x2d0
[   27.871192]  ? kasan_atomics_helper+0xa2b/0x5450
[   27.871214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.871244]  ? kasan_atomics_helper+0xa2b/0x5450
[   27.871267]  kasan_report+0x141/0x180
[   27.871291]  ? kasan_atomics_helper+0xa2b/0x5450
[   27.871319]  kasan_check_range+0x10c/0x1c0
[   27.871345]  __kasan_check_write+0x18/0x20
[   27.871370]  kasan_atomics_helper+0xa2b/0x5450
[   27.871401]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.871426]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.871523]  ? kasan_atomics+0x152/0x310
[   27.871553]  kasan_atomics+0x1dc/0x310
[   27.871579]  ? __pfx_kasan_atomics+0x10/0x10
[   27.871605]  ? __pfx_read_tsc+0x10/0x10
[   27.871628]  ? ktime_get_ts64+0x86/0x230
[   27.871655]  kunit_try_run_case+0x1a5/0x480
[   27.871683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.871707]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.871735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.871763]  ? __kthread_parkme+0x82/0x180
[   27.871785]  ? preempt_count_sub+0x50/0x80
[   27.871811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.871848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.871883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.871908]  kthread+0x337/0x6f0
[   27.871930]  ? trace_preempt_on+0x20/0xc0
[   27.871967]  ? __pfx_kthread+0x10/0x10
[   27.871989]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.872015]  ? calculate_sigpending+0x7b/0xa0
[   27.872040]  ? __pfx_kthread+0x10/0x10
[   27.872064]  ret_from_fork+0x116/0x1d0
[   27.872086]  ? __pfx_kthread+0x10/0x10
[   27.872108]  ret_from_fork_asm+0x1a/0x30
[   27.872140]  </TASK>
[   27.872172] 
[   27.880385] Allocated by task 313:
[   27.880591]  kasan_save_stack+0x45/0x70
[   27.880794]  kasan_save_track+0x18/0x40
[   27.881004]  kasan_save_alloc_info+0x3b/0x50
[   27.881211]  __kasan_kmalloc+0xb7/0xc0
[   27.881346]  __kmalloc_cache_noprof+0x189/0x420
[   27.881578]  kasan_atomics+0x95/0x310
[   27.881764]  kunit_try_run_case+0x1a5/0x480
[   27.882205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.882407]  kthread+0x337/0x6f0
[   27.882661]  ret_from_fork+0x116/0x1d0
[   27.882867]  ret_from_fork_asm+0x1a/0x30
[   27.883093] 
[   27.883214] The buggy address belongs to the object at ffff8881058a7e80
[   27.883214]  which belongs to the cache kmalloc-64 of size 64
[   27.883737] The buggy address is located 0 bytes to the right of
[   27.883737]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.884134] 
[   27.884262] The buggy address belongs to the physical page:
[   27.884588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.884971] flags: 0x200000000000000(node=0|zone=2)
[   27.885230] page_type: f5(slab)
[   27.885399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.885798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.886045] page dumped because: kasan: bad access detected
[   27.886312] 
[   27.886429] Memory state around the buggy address:
[   27.886866]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.887238]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.887627] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.887931]                                      ^
[   27.888160]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.888569]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.888891] ==================================================================
[   28.885688] ==================================================================
[   28.885992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   28.886536] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.886877] 
[   28.886978] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.887064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.887080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.887115] Call Trace:
[   28.887133]  <TASK>
[   28.887148]  dump_stack_lvl+0x73/0xb0
[   28.887177]  print_report+0xd1/0x640
[   28.887244]  ? __virt_addr_valid+0x1db/0x2d0
[   28.887281]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.887305]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.887333]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.887357]  kasan_report+0x141/0x180
[   28.887381]  ? kasan_atomics_helper+0x1eaa/0x5450
[   28.887409]  kasan_check_range+0x10c/0x1c0
[   28.887434]  __kasan_check_write+0x18/0x20
[   28.887477]  kasan_atomics_helper+0x1eaa/0x5450
[   28.887504]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.887529]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.887558]  ? kasan_atomics+0x152/0x310
[   28.887617]  kasan_atomics+0x1dc/0x310
[   28.887642]  ? __pfx_kasan_atomics+0x10/0x10
[   28.887680]  ? __pfx_read_tsc+0x10/0x10
[   28.887703]  ? ktime_get_ts64+0x86/0x230
[   28.887728]  kunit_try_run_case+0x1a5/0x480
[   28.887755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.887781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.887811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.887847]  ? __kthread_parkme+0x82/0x180
[   28.887870]  ? preempt_count_sub+0x50/0x80
[   28.887895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.887921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.887968]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.887993]  kthread+0x337/0x6f0
[   28.888038]  ? trace_preempt_on+0x20/0xc0
[   28.888063]  ? __pfx_kthread+0x10/0x10
[   28.888085]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.888121]  ? calculate_sigpending+0x7b/0xa0
[   28.888146]  ? __pfx_kthread+0x10/0x10
[   28.888169]  ret_from_fork+0x116/0x1d0
[   28.888190]  ? __pfx_kthread+0x10/0x10
[   28.888213]  ret_from_fork_asm+0x1a/0x30
[   28.888245]  </TASK>
[   28.888257] 
[   28.897312] Allocated by task 313:
[   28.897540]  kasan_save_stack+0x45/0x70
[   28.897738]  kasan_save_track+0x18/0x40
[   28.898074]  kasan_save_alloc_info+0x3b/0x50
[   28.898336]  __kasan_kmalloc+0xb7/0xc0
[   28.899275]  __kmalloc_cache_noprof+0x189/0x420
[   28.899477]  kasan_atomics+0x95/0x310
[   28.899618]  kunit_try_run_case+0x1a5/0x480
[   28.899769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.900021]  kthread+0x337/0x6f0
[   28.900193]  ret_from_fork+0x116/0x1d0
[   28.900382]  ret_from_fork_asm+0x1a/0x30
[   28.900579] 
[   28.900675] The buggy address belongs to the object at ffff8881058a7e80
[   28.900675]  which belongs to the cache kmalloc-64 of size 64
[   28.901850] The buggy address is located 0 bytes to the right of
[   28.901850]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.903142] 
[   28.903228] The buggy address belongs to the physical page:
[   28.903415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.903658] flags: 0x200000000000000(node=0|zone=2)
[   28.903818] page_type: f5(slab)
[   28.903949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.904192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.904525] page dumped because: kasan: bad access detected
[   28.904775] 
[   28.904965] Memory state around the buggy address:
[   28.905186]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.905518]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.905853] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.906103]                                      ^
[   28.906363]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.906730]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.907101] ==================================================================
[   28.964084] ==================================================================
[   28.964378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   28.964807] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.965900] 
[   28.966013] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.966066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.966251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.966277] Call Trace:
[   28.966297]  <TASK>
[   28.966313]  dump_stack_lvl+0x73/0xb0
[   28.966347]  print_report+0xd1/0x640
[   28.966372]  ? __virt_addr_valid+0x1db/0x2d0
[   28.966398]  ? kasan_atomics_helper+0x2006/0x5450
[   28.966422]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.966450]  ? kasan_atomics_helper+0x2006/0x5450
[   28.966531]  kasan_report+0x141/0x180
[   28.966556]  ? kasan_atomics_helper+0x2006/0x5450
[   28.966585]  kasan_check_range+0x10c/0x1c0
[   28.966611]  __kasan_check_write+0x18/0x20
[   28.966636]  kasan_atomics_helper+0x2006/0x5450
[   28.966663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.966688]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.966714]  ? kasan_atomics+0x152/0x310
[   28.966742]  kasan_atomics+0x1dc/0x310
[   28.966767]  ? __pfx_kasan_atomics+0x10/0x10
[   28.966793]  ? __pfx_read_tsc+0x10/0x10
[   28.966817]  ? ktime_get_ts64+0x86/0x230
[   28.966855]  kunit_try_run_case+0x1a5/0x480
[   28.966883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.966908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.966936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.966964]  ? __kthread_parkme+0x82/0x180
[   28.966986]  ? preempt_count_sub+0x50/0x80
[   28.967011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.967037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.967061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.967088]  kthread+0x337/0x6f0
[   28.967110]  ? trace_preempt_on+0x20/0xc0
[   28.967135]  ? __pfx_kthread+0x10/0x10
[   28.967157]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.967184]  ? calculate_sigpending+0x7b/0xa0
[   28.967209]  ? __pfx_kthread+0x10/0x10
[   28.967232]  ret_from_fork+0x116/0x1d0
[   28.967254]  ? __pfx_kthread+0x10/0x10
[   28.967276]  ret_from_fork_asm+0x1a/0x30
[   28.967308]  </TASK>
[   28.967321] 
[   28.979150] Allocated by task 313:
[   28.979513]  kasan_save_stack+0x45/0x70
[   28.979759]  kasan_save_track+0x18/0x40
[   28.979961]  kasan_save_alloc_info+0x3b/0x50
[   28.980292]  __kasan_kmalloc+0xb7/0xc0
[   28.980550]  __kmalloc_cache_noprof+0x189/0x420
[   28.980969]  kasan_atomics+0x95/0x310
[   28.981272]  kunit_try_run_case+0x1a5/0x480
[   28.981435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.981949]  kthread+0x337/0x6f0
[   28.982125]  ret_from_fork+0x116/0x1d0
[   28.982446]  ret_from_fork_asm+0x1a/0x30
[   28.982859] 
[   28.982955] The buggy address belongs to the object at ffff8881058a7e80
[   28.982955]  which belongs to the cache kmalloc-64 of size 64
[   28.983905] The buggy address is located 0 bytes to the right of
[   28.983905]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.984710] 
[   28.984847] The buggy address belongs to the physical page:
[   28.985397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.985784] flags: 0x200000000000000(node=0|zone=2)
[   28.986185] page_type: f5(slab)
[   28.986316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.986997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.987368] page dumped because: kasan: bad access detected
[   28.987788] 
[   28.987903] Memory state around the buggy address:
[   28.988311]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.988858]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.989287] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.989823]                                      ^
[   28.990081]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.990383]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.991093] ==================================================================
[   29.119781] ==================================================================
[   29.120314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   29.121012] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   29.121548] 
[   29.121752] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.121805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.121820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.121854] Call Trace:
[   29.121873]  <TASK>
[   29.121899]  dump_stack_lvl+0x73/0xb0
[   29.121931]  print_report+0xd1/0x640
[   29.121956]  ? __virt_addr_valid+0x1db/0x2d0
[   29.121993]  ? kasan_atomics_helper+0x224c/0x5450
[   29.122017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.122045]  ? kasan_atomics_helper+0x224c/0x5450
[   29.122070]  kasan_report+0x141/0x180
[   29.122095]  ? kasan_atomics_helper+0x224c/0x5450
[   29.122123]  kasan_check_range+0x10c/0x1c0
[   29.122169]  __kasan_check_write+0x18/0x20
[   29.122195]  kasan_atomics_helper+0x224c/0x5450
[   29.122219]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.122243]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.122270]  ? kasan_atomics+0x152/0x310
[   29.122298]  kasan_atomics+0x1dc/0x310
[   29.122322]  ? __pfx_kasan_atomics+0x10/0x10
[   29.122349]  ? __pfx_read_tsc+0x10/0x10
[   29.122372]  ? ktime_get_ts64+0x86/0x230
[   29.122399]  kunit_try_run_case+0x1a5/0x480
[   29.122425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.122503]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.122535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.122563]  ? __kthread_parkme+0x82/0x180
[   29.122586]  ? preempt_count_sub+0x50/0x80
[   29.122612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.122641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.122669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.122696]  kthread+0x337/0x6f0
[   29.122718]  ? trace_preempt_on+0x20/0xc0
[   29.122744]  ? __pfx_kthread+0x10/0x10
[   29.122767]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.122792]  ? calculate_sigpending+0x7b/0xa0
[   29.122819]  ? __pfx_kthread+0x10/0x10
[   29.122854]  ret_from_fork+0x116/0x1d0
[   29.122876]  ? __pfx_kthread+0x10/0x10
[   29.122900]  ret_from_fork_asm+0x1a/0x30
[   29.122933]  </TASK>
[   29.122947] 
[   29.136481] Allocated by task 313:
[   29.136847]  kasan_save_stack+0x45/0x70
[   29.137353]  kasan_save_track+0x18/0x40
[   29.137828]  kasan_save_alloc_info+0x3b/0x50
[   29.138276]  __kasan_kmalloc+0xb7/0xc0
[   29.138849]  __kmalloc_cache_noprof+0x189/0x420
[   29.139303]  kasan_atomics+0x95/0x310
[   29.139699]  kunit_try_run_case+0x1a5/0x480
[   29.139989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.140173]  kthread+0x337/0x6f0
[   29.140486]  ret_from_fork+0x116/0x1d0
[   29.140884]  ret_from_fork_asm+0x1a/0x30
[   29.141257] 
[   29.141412] The buggy address belongs to the object at ffff8881058a7e80
[   29.141412]  which belongs to the cache kmalloc-64 of size 64
[   29.142227] The buggy address is located 0 bytes to the right of
[   29.142227]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   29.142771] 
[   29.142867] The buggy address belongs to the physical page:
[   29.143358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   29.144069] flags: 0x200000000000000(node=0|zone=2)
[   29.144407] page_type: f5(slab)
[   29.144543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.144789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.145035] page dumped because: kasan: bad access detected
[   29.145223] 
[   29.145294] Memory state around the buggy address:
[   29.145452]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.146188]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.146891] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.147625]                                      ^
[   29.147965]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.148204]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.149012] ==================================================================
[   28.054315] ==================================================================
[   28.054546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   28.054816] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.055437] 
[   28.055601] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.055655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.055670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.055693] Call Trace:
[   28.055709]  <TASK>
[   28.055724]  dump_stack_lvl+0x73/0xb0
[   28.055753]  print_report+0xd1/0x640
[   28.055777]  ? __virt_addr_valid+0x1db/0x2d0
[   28.055802]  ? kasan_atomics_helper+0xe78/0x5450
[   28.055825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.055869]  ? kasan_atomics_helper+0xe78/0x5450
[   28.055892]  kasan_report+0x141/0x180
[   28.055916]  ? kasan_atomics_helper+0xe78/0x5450
[   28.055944]  kasan_check_range+0x10c/0x1c0
[   28.055969]  __kasan_check_write+0x18/0x20
[   28.055995]  kasan_atomics_helper+0xe78/0x5450
[   28.056019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.056043]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.056070]  ? kasan_atomics+0x152/0x310
[   28.056097]  kasan_atomics+0x1dc/0x310
[   28.056122]  ? __pfx_kasan_atomics+0x10/0x10
[   28.056148]  ? __pfx_read_tsc+0x10/0x10
[   28.056172]  ? ktime_get_ts64+0x86/0x230
[   28.056197]  kunit_try_run_case+0x1a5/0x480
[   28.056225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.056249]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.056276]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.056303]  ? __kthread_parkme+0x82/0x180
[   28.056325]  ? preempt_count_sub+0x50/0x80
[   28.056350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.056376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.056402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.056428]  kthread+0x337/0x6f0
[   28.056449]  ? trace_preempt_on+0x20/0xc0
[   28.056473]  ? __pfx_kthread+0x10/0x10
[   28.056496]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.056522]  ? calculate_sigpending+0x7b/0xa0
[   28.056546]  ? __pfx_kthread+0x10/0x10
[   28.056571]  ret_from_fork+0x116/0x1d0
[   28.056593]  ? __pfx_kthread+0x10/0x10
[   28.056615]  ret_from_fork_asm+0x1a/0x30
[   28.056648]  </TASK>
[   28.056660] 
[   28.064784] Allocated by task 313:
[   28.064987]  kasan_save_stack+0x45/0x70
[   28.065206]  kasan_save_track+0x18/0x40
[   28.065356]  kasan_save_alloc_info+0x3b/0x50
[   28.065654]  __kasan_kmalloc+0xb7/0xc0
[   28.065824]  __kmalloc_cache_noprof+0x189/0x420
[   28.066040]  kasan_atomics+0x95/0x310
[   28.066268]  kunit_try_run_case+0x1a5/0x480
[   28.066454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.066880]  kthread+0x337/0x6f0
[   28.067040]  ret_from_fork+0x116/0x1d0
[   28.067236]  ret_from_fork_asm+0x1a/0x30
[   28.067430] 
[   28.067571] The buggy address belongs to the object at ffff8881058a7e80
[   28.067571]  which belongs to the cache kmalloc-64 of size 64
[   28.068065] The buggy address is located 0 bytes to the right of
[   28.068065]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.068666] 
[   28.068767] The buggy address belongs to the physical page:
[   28.068997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.069293] flags: 0x200000000000000(node=0|zone=2)
[   28.069569] page_type: f5(slab)
[   28.069777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.070102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.070400] page dumped because: kasan: bad access detected
[   28.070729] 
[   28.070827] Memory state around the buggy address:
[   28.071066]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.071403]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.071632] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.071871]                                      ^
[   28.072093]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.072631]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.072880] ==================================================================
[   29.046935] ==================================================================
[   29.047663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   29.048109] Read of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   29.048529] 
[   29.048807] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.049088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.049106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.049130] Call Trace:
[   29.049149]  <TASK>
[   29.049175]  dump_stack_lvl+0x73/0xb0
[   29.049208]  print_report+0xd1/0x640
[   29.049233]  ? __virt_addr_valid+0x1db/0x2d0
[   29.049259]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.049282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.049310]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.049333]  kasan_report+0x141/0x180
[   29.049358]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.049386]  __asan_report_load8_noabort+0x18/0x20
[   29.049413]  kasan_atomics_helper+0x4fb2/0x5450
[   29.049437]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.049472]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.049498]  ? kasan_atomics+0x152/0x310
[   29.049527]  kasan_atomics+0x1dc/0x310
[   29.049551]  ? __pfx_kasan_atomics+0x10/0x10
[   29.049578]  ? __pfx_read_tsc+0x10/0x10
[   29.049601]  ? ktime_get_ts64+0x86/0x230
[   29.049627]  kunit_try_run_case+0x1a5/0x480
[   29.049654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.049679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.049706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.049735]  ? __kthread_parkme+0x82/0x180
[   29.049757]  ? preempt_count_sub+0x50/0x80
[   29.049783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.049809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.049849]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.049875]  kthread+0x337/0x6f0
[   29.049897]  ? trace_preempt_on+0x20/0xc0
[   29.049922]  ? __pfx_kthread+0x10/0x10
[   29.049945]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.049970]  ? calculate_sigpending+0x7b/0xa0
[   29.049995]  ? __pfx_kthread+0x10/0x10
[   29.050020]  ret_from_fork+0x116/0x1d0
[   29.050041]  ? __pfx_kthread+0x10/0x10
[   29.050063]  ret_from_fork_asm+0x1a/0x30
[   29.050096]  </TASK>
[   29.050108] 
[   29.059320] Allocated by task 313:
[   29.059522]  kasan_save_stack+0x45/0x70
[   29.059729]  kasan_save_track+0x18/0x40
[   29.059931]  kasan_save_alloc_info+0x3b/0x50
[   29.060312]  __kasan_kmalloc+0xb7/0xc0
[   29.060448]  __kmalloc_cache_noprof+0x189/0x420
[   29.060607]  kasan_atomics+0x95/0x310
[   29.060761]  kunit_try_run_case+0x1a5/0x480
[   29.060986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.061299]  kthread+0x337/0x6f0
[   29.061560]  ret_from_fork+0x116/0x1d0
[   29.061747]  ret_from_fork_asm+0x1a/0x30
[   29.061953] 
[   29.062049] The buggy address belongs to the object at ffff8881058a7e80
[   29.062049]  which belongs to the cache kmalloc-64 of size 64
[   29.062753] The buggy address is located 0 bytes to the right of
[   29.062753]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   29.063137] 
[   29.063296] The buggy address belongs to the physical page:
[   29.063570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   29.063924] flags: 0x200000000000000(node=0|zone=2)
[   29.064168] page_type: f5(slab)
[   29.064290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.064858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.065207] page dumped because: kasan: bad access detected
[   29.065375] 
[   29.065499] Memory state around the buggy address:
[   29.065720]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.066048]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.066295] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.066505]                                      ^
[   29.066656]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.066982]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.067321] ==================================================================
[   27.767741] ==================================================================
[   27.768417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   27.768695] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.769230] 
[   27.769418] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.769483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.769499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.769523] Call Trace:
[   27.769543]  <TASK>
[   27.769560]  dump_stack_lvl+0x73/0xb0
[   27.769590]  print_report+0xd1/0x640
[   27.769614]  ? __virt_addr_valid+0x1db/0x2d0
[   27.769710]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.769734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.769762]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.769786]  kasan_report+0x141/0x180
[   27.769811]  ? kasan_atomics_helper+0x7c7/0x5450
[   27.769849]  kasan_check_range+0x10c/0x1c0
[   27.769875]  __kasan_check_write+0x18/0x20
[   27.769900]  kasan_atomics_helper+0x7c7/0x5450
[   27.769925]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.769949]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.769976]  ? kasan_atomics+0x152/0x310
[   27.770004]  kasan_atomics+0x1dc/0x310
[   27.770029]  ? __pfx_kasan_atomics+0x10/0x10
[   27.770056]  ? __pfx_read_tsc+0x10/0x10
[   27.770080]  ? ktime_get_ts64+0x86/0x230
[   27.770106]  kunit_try_run_case+0x1a5/0x480
[   27.770132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.770158]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.770185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.770213]  ? __kthread_parkme+0x82/0x180
[   27.770235]  ? preempt_count_sub+0x50/0x80
[   27.770260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.770286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.770312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.770338]  kthread+0x337/0x6f0
[   27.770359]  ? trace_preempt_on+0x20/0xc0
[   27.770384]  ? __pfx_kthread+0x10/0x10
[   27.770406]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.770431]  ? calculate_sigpending+0x7b/0xa0
[   27.770457]  ? __pfx_kthread+0x10/0x10
[   27.770481]  ret_from_fork+0x116/0x1d0
[   27.770502]  ? __pfx_kthread+0x10/0x10
[   27.770524]  ret_from_fork_asm+0x1a/0x30
[   27.770557]  </TASK>
[   27.770569] 
[   27.784818] Allocated by task 313:
[   27.785199]  kasan_save_stack+0x45/0x70
[   27.785640]  kasan_save_track+0x18/0x40
[   27.785881]  kasan_save_alloc_info+0x3b/0x50
[   27.786037]  __kasan_kmalloc+0xb7/0xc0
[   27.786184]  __kmalloc_cache_noprof+0x189/0x420
[   27.786650]  kasan_atomics+0x95/0x310
[   27.787033]  kunit_try_run_case+0x1a5/0x480
[   27.787449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.788122]  kthread+0x337/0x6f0
[   27.788541]  ret_from_fork+0x116/0x1d0
[   27.788821]  ret_from_fork_asm+0x1a/0x30
[   27.789132] 
[   27.789216] The buggy address belongs to the object at ffff8881058a7e80
[   27.789216]  which belongs to the cache kmalloc-64 of size 64
[   27.790181] The buggy address is located 0 bytes to the right of
[   27.790181]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.791048] 
[   27.791127] The buggy address belongs to the physical page:
[   27.791568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.792345] flags: 0x200000000000000(node=0|zone=2)
[   27.793009] page_type: f5(slab)
[   27.793400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.793876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.794114] page dumped because: kasan: bad access detected
[   27.794602] 
[   27.794797] Memory state around the buggy address:
[   27.795288]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.796024]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.796749] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.797145]                                      ^
[   27.797749]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.798251]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.798541] ==================================================================
[   28.591977] ==================================================================
[   28.592318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   28.592633] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.592934] 
[   28.593044] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.593095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.593111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.593134] Call Trace:
[   28.593152]  <TASK>
[   28.593170]  dump_stack_lvl+0x73/0xb0
[   28.593197]  print_report+0xd1/0x640
[   28.593223]  ? __virt_addr_valid+0x1db/0x2d0
[   28.593249]  ? kasan_atomics_helper+0x1818/0x5450
[   28.593271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.593298]  ? kasan_atomics_helper+0x1818/0x5450
[   28.593321]  kasan_report+0x141/0x180
[   28.593344]  ? kasan_atomics_helper+0x1818/0x5450
[   28.593371]  kasan_check_range+0x10c/0x1c0
[   28.593396]  __kasan_check_write+0x18/0x20
[   28.593421]  kasan_atomics_helper+0x1818/0x5450
[   28.593444]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.593467]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.593492]  ? kasan_atomics+0x152/0x310
[   28.593520]  kasan_atomics+0x1dc/0x310
[   28.593543]  ? __pfx_kasan_atomics+0x10/0x10
[   28.593568]  ? __pfx_read_tsc+0x10/0x10
[   28.593591]  ? ktime_get_ts64+0x86/0x230
[   28.593617]  kunit_try_run_case+0x1a5/0x480
[   28.593642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.593667]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.593694]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.593721]  ? __kthread_parkme+0x82/0x180
[   28.593742]  ? preempt_count_sub+0x50/0x80
[   28.593766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.593791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.593816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.593875]  kthread+0x337/0x6f0
[   28.593898]  ? trace_preempt_on+0x20/0xc0
[   28.593923]  ? __pfx_kthread+0x10/0x10
[   28.593945]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.593971]  ? calculate_sigpending+0x7b/0xa0
[   28.593997]  ? __pfx_kthread+0x10/0x10
[   28.594020]  ret_from_fork+0x116/0x1d0
[   28.594042]  ? __pfx_kthread+0x10/0x10
[   28.594077]  ret_from_fork_asm+0x1a/0x30
[   28.594110]  </TASK>
[   28.594123] 
[   28.605300] Allocated by task 313:
[   28.605788]  kasan_save_stack+0x45/0x70
[   28.606163]  kasan_save_track+0x18/0x40
[   28.606546]  kasan_save_alloc_info+0x3b/0x50
[   28.606889]  __kasan_kmalloc+0xb7/0xc0
[   28.607082]  __kmalloc_cache_noprof+0x189/0x420
[   28.607459]  kasan_atomics+0x95/0x310
[   28.607806]  kunit_try_run_case+0x1a5/0x480
[   28.608018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.608493]  kthread+0x337/0x6f0
[   28.608923]  ret_from_fork+0x116/0x1d0
[   28.609267]  ret_from_fork_asm+0x1a/0x30
[   28.609618] 
[   28.609725] The buggy address belongs to the object at ffff8881058a7e80
[   28.609725]  which belongs to the cache kmalloc-64 of size 64
[   28.610423] The buggy address is located 0 bytes to the right of
[   28.610423]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.611546] 
[   28.611654] The buggy address belongs to the physical page:
[   28.611889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.612521] flags: 0x200000000000000(node=0|zone=2)
[   28.612960] page_type: f5(slab)
[   28.613138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.613513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.613813] page dumped because: kasan: bad access detected
[   28.614050] 
[   28.614133] Memory state around the buggy address:
[   28.614843]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.615581]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.615899] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.616165]                                      ^
[   28.616358]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.616622]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.616900] ==================================================================
[   27.657645] ==================================================================
[   27.657991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   27.658351] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.658852] 
[   27.658996] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.659047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.659063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.659085] Call Trace:
[   27.659101]  <TASK>
[   27.659117]  dump_stack_lvl+0x73/0xb0
[   27.659147]  print_report+0xd1/0x640
[   27.659172]  ? __virt_addr_valid+0x1db/0x2d0
[   27.659197]  ? kasan_atomics_helper+0x565/0x5450
[   27.659231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.659259]  ? kasan_atomics_helper+0x565/0x5450
[   27.659311]  kasan_report+0x141/0x180
[   27.659336]  ? kasan_atomics_helper+0x565/0x5450
[   27.659364]  kasan_check_range+0x10c/0x1c0
[   27.659397]  __kasan_check_write+0x18/0x20
[   27.659421]  kasan_atomics_helper+0x565/0x5450
[   27.659467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.659491]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.659517]  ? kasan_atomics+0x152/0x310
[   27.659546]  kasan_atomics+0x1dc/0x310
[   27.659571]  ? __pfx_kasan_atomics+0x10/0x10
[   27.659597]  ? __pfx_read_tsc+0x10/0x10
[   27.659620]  ? ktime_get_ts64+0x86/0x230
[   27.659645]  kunit_try_run_case+0x1a5/0x480
[   27.659672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.659696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.659777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.659804]  ? __kthread_parkme+0x82/0x180
[   27.659842]  ? preempt_count_sub+0x50/0x80
[   27.659868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.659894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.659919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.659944]  kthread+0x337/0x6f0
[   27.659966]  ? trace_preempt_on+0x20/0xc0
[   27.659990]  ? __pfx_kthread+0x10/0x10
[   27.660013]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.660038]  ? calculate_sigpending+0x7b/0xa0
[   27.660062]  ? __pfx_kthread+0x10/0x10
[   27.660085]  ret_from_fork+0x116/0x1d0
[   27.660106]  ? __pfx_kthread+0x10/0x10
[   27.660128]  ret_from_fork_asm+0x1a/0x30
[   27.660177]  </TASK>
[   27.660191] 
[   27.668786] Allocated by task 313:
[   27.668992]  kasan_save_stack+0x45/0x70
[   27.669209]  kasan_save_track+0x18/0x40
[   27.669432]  kasan_save_alloc_info+0x3b/0x50
[   27.669637]  __kasan_kmalloc+0xb7/0xc0
[   27.669775]  __kmalloc_cache_noprof+0x189/0x420
[   27.669965]  kasan_atomics+0x95/0x310
[   27.670162]  kunit_try_run_case+0x1a5/0x480
[   27.670373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.670591]  kthread+0x337/0x6f0
[   27.670712]  ret_from_fork+0x116/0x1d0
[   27.670994]  ret_from_fork_asm+0x1a/0x30
[   27.671248] 
[   27.671343] The buggy address belongs to the object at ffff8881058a7e80
[   27.671343]  which belongs to the cache kmalloc-64 of size 64
[   27.671920] The buggy address is located 0 bytes to the right of
[   27.671920]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.672524] 
[   27.672624] The buggy address belongs to the physical page:
[   27.672894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.673272] flags: 0x200000000000000(node=0|zone=2)
[   27.673575] page_type: f5(slab)
[   27.673751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.674108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.674394] page dumped because: kasan: bad access detected
[   27.674731] 
[   27.674811] Memory state around the buggy address:
[   27.675085]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.675438]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.675838] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.676180]                                      ^
[   27.676426]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.676835]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.677067] ==================================================================
[   28.860785] ==================================================================
[   28.861108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   28.861988] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.862722] 
[   28.862859] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.862915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.862932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.862955] Call Trace:
[   28.862974]  <TASK>
[   28.862991]  dump_stack_lvl+0x73/0xb0
[   28.863021]  print_report+0xd1/0x640
[   28.863046]  ? __virt_addr_valid+0x1db/0x2d0
[   28.863072]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.863095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.863123]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.863148]  kasan_report+0x141/0x180
[   28.863175]  ? kasan_atomics_helper+0x1e12/0x5450
[   28.863203]  kasan_check_range+0x10c/0x1c0
[   28.863228]  __kasan_check_write+0x18/0x20
[   28.863254]  kasan_atomics_helper+0x1e12/0x5450
[   28.863279]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.863304]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.863330]  ? kasan_atomics+0x152/0x310
[   28.863358]  kasan_atomics+0x1dc/0x310
[   28.863382]  ? __pfx_kasan_atomics+0x10/0x10
[   28.863408]  ? __pfx_read_tsc+0x10/0x10
[   28.863432]  ? ktime_get_ts64+0x86/0x230
[   28.863460]  kunit_try_run_case+0x1a5/0x480
[   28.863487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.863511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.863537]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.863565]  ? __kthread_parkme+0x82/0x180
[   28.863589]  ? preempt_count_sub+0x50/0x80
[   28.863614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.863651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.863677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.863703]  kthread+0x337/0x6f0
[   28.863735]  ? trace_preempt_on+0x20/0xc0
[   28.863761]  ? __pfx_kthread+0x10/0x10
[   28.863783]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.863809]  ? calculate_sigpending+0x7b/0xa0
[   28.863841]  ? __pfx_kthread+0x10/0x10
[   28.863865]  ret_from_fork+0x116/0x1d0
[   28.863886]  ? __pfx_kthread+0x10/0x10
[   28.863909]  ret_from_fork_asm+0x1a/0x30
[   28.863941]  </TASK>
[   28.863953] 
[   28.872507] Allocated by task 313:
[   28.872644]  kasan_save_stack+0x45/0x70
[   28.872789]  kasan_save_track+0x18/0x40
[   28.873091]  kasan_save_alloc_info+0x3b/0x50
[   28.873324]  __kasan_kmalloc+0xb7/0xc0
[   28.873642]  __kmalloc_cache_noprof+0x189/0x420
[   28.874553]  kasan_atomics+0x95/0x310
[   28.874819]  kunit_try_run_case+0x1a5/0x480
[   28.875727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.876231]  kthread+0x337/0x6f0
[   28.876400]  ret_from_fork+0x116/0x1d0
[   28.876761]  ret_from_fork_asm+0x1a/0x30
[   28.877256] 
[   28.877378] The buggy address belongs to the object at ffff8881058a7e80
[   28.877378]  which belongs to the cache kmalloc-64 of size 64
[   28.878194] The buggy address is located 0 bytes to the right of
[   28.878194]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.879114] 
[   28.879277] The buggy address belongs to the physical page:
[   28.879795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.880279] flags: 0x200000000000000(node=0|zone=2)
[   28.880709] page_type: f5(slab)
[   28.880965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.881660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.882317] page dumped because: kasan: bad access detected
[   28.882509] 
[   28.882633] Memory state around the buggy address:
[   28.882909]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.883188]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.883705] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.884032]                                      ^
[   28.884335]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.884630]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.885115] ==================================================================
[   27.849734] ==================================================================
[   27.850086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   27.850433] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.850898] 
[   27.851012] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.851063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.851110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.851134] Call Trace:
[   27.851152]  <TASK>
[   27.851180]  dump_stack_lvl+0x73/0xb0
[   27.851229]  print_report+0xd1/0x640
[   27.851253]  ? __virt_addr_valid+0x1db/0x2d0
[   27.851277]  ? kasan_atomics_helper+0x992/0x5450
[   27.851331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.851371]  ? kasan_atomics_helper+0x992/0x5450
[   27.851406]  kasan_report+0x141/0x180
[   27.851431]  ? kasan_atomics_helper+0x992/0x5450
[   27.851521]  kasan_check_range+0x10c/0x1c0
[   27.851548]  __kasan_check_write+0x18/0x20
[   27.851574]  kasan_atomics_helper+0x992/0x5450
[   27.851598]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.851622]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.851664]  ? kasan_atomics+0x152/0x310
[   27.851691]  kasan_atomics+0x1dc/0x310
[   27.851716]  ? __pfx_kasan_atomics+0x10/0x10
[   27.851741]  ? __pfx_read_tsc+0x10/0x10
[   27.851764]  ? ktime_get_ts64+0x86/0x230
[   27.851791]  kunit_try_run_case+0x1a5/0x480
[   27.851818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.851853]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.851880]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.851907]  ? __kthread_parkme+0x82/0x180
[   27.851929]  ? preempt_count_sub+0x50/0x80
[   27.851954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.851980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.852006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.852032]  kthread+0x337/0x6f0
[   27.852053]  ? trace_preempt_on+0x20/0xc0
[   27.852078]  ? __pfx_kthread+0x10/0x10
[   27.852100]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.852125]  ? calculate_sigpending+0x7b/0xa0
[   27.852150]  ? __pfx_kthread+0x10/0x10
[   27.852174]  ret_from_fork+0x116/0x1d0
[   27.852202]  ? __pfx_kthread+0x10/0x10
[   27.852224]  ret_from_fork_asm+0x1a/0x30
[   27.852257]  </TASK>
[   27.852269] 
[   27.860804] Allocated by task 313:
[   27.860976]  kasan_save_stack+0x45/0x70
[   27.861130]  kasan_save_track+0x18/0x40
[   27.861366]  kasan_save_alloc_info+0x3b/0x50
[   27.861607]  __kasan_kmalloc+0xb7/0xc0
[   27.861795]  __kmalloc_cache_noprof+0x189/0x420
[   27.862012]  kasan_atomics+0x95/0x310
[   27.862208]  kunit_try_run_case+0x1a5/0x480
[   27.862366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.862620]  kthread+0x337/0x6f0
[   27.862823]  ret_from_fork+0x116/0x1d0
[   27.863021]  ret_from_fork_asm+0x1a/0x30
[   27.863246] 
[   27.863339] The buggy address belongs to the object at ffff8881058a7e80
[   27.863339]  which belongs to the cache kmalloc-64 of size 64
[   27.863956] The buggy address is located 0 bytes to the right of
[   27.863956]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.864365] 
[   27.864536] The buggy address belongs to the physical page:
[   27.864843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.865226] flags: 0x200000000000000(node=0|zone=2)
[   27.865662] page_type: f5(slab)
[   27.865868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.866242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.866669] page dumped because: kasan: bad access detected
[   27.866925] 
[   27.867029] Memory state around the buggy address:
[   27.867270]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.867620]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.867978] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.868314]                                      ^
[   27.868599]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.868854]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.869075] ==================================================================
[   28.375109] ==================================================================
[   28.375465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   28.375725] Read of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.376097] 
[   28.376266] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.376316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.376331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.376355] Call Trace:
[   28.376374]  <TASK>
[   28.376391]  dump_stack_lvl+0x73/0xb0
[   28.376421]  print_report+0xd1/0x640
[   28.376448]  ? __virt_addr_valid+0x1db/0x2d0
[   28.376474]  ? kasan_atomics_helper+0x13b5/0x5450
[   28.376497]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.376525]  ? kasan_atomics_helper+0x13b5/0x5450
[   28.376550]  kasan_report+0x141/0x180
[   28.376574]  ? kasan_atomics_helper+0x13b5/0x5450
[   28.376601]  kasan_check_range+0x10c/0x1c0
[   28.376627]  __kasan_check_read+0x15/0x20
[   28.376652]  kasan_atomics_helper+0x13b5/0x5450
[   28.376677]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.376704]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.376730]  ? kasan_atomics+0x152/0x310
[   28.376758]  kasan_atomics+0x1dc/0x310
[   28.376783]  ? __pfx_kasan_atomics+0x10/0x10
[   28.376810]  ? __pfx_read_tsc+0x10/0x10
[   28.376845]  ? ktime_get_ts64+0x86/0x230
[   28.376876]  kunit_try_run_case+0x1a5/0x480
[   28.376904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.376927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.376955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.376982]  ? __kthread_parkme+0x82/0x180
[   28.377004]  ? preempt_count_sub+0x50/0x80
[   28.377030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.377055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.377080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.377106]  kthread+0x337/0x6f0
[   28.377128]  ? trace_preempt_on+0x20/0xc0
[   28.377152]  ? __pfx_kthread+0x10/0x10
[   28.377187]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.377212]  ? calculate_sigpending+0x7b/0xa0
[   28.377238]  ? __pfx_kthread+0x10/0x10
[   28.377261]  ret_from_fork+0x116/0x1d0
[   28.377283]  ? __pfx_kthread+0x10/0x10
[   28.377305]  ret_from_fork_asm+0x1a/0x30
[   28.377338]  </TASK>
[   28.377350] 
[   28.385427] Allocated by task 313:
[   28.385636]  kasan_save_stack+0x45/0x70
[   28.385847]  kasan_save_track+0x18/0x40
[   28.386120]  kasan_save_alloc_info+0x3b/0x50
[   28.386553]  __kasan_kmalloc+0xb7/0xc0
[   28.386705]  __kmalloc_cache_noprof+0x189/0x420
[   28.386956]  kasan_atomics+0x95/0x310
[   28.387096]  kunit_try_run_case+0x1a5/0x480
[   28.387245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.387423]  kthread+0x337/0x6f0
[   28.387616]  ret_from_fork+0x116/0x1d0
[   28.387996]  ret_from_fork_asm+0x1a/0x30
[   28.388232] 
[   28.388326] The buggy address belongs to the object at ffff8881058a7e80
[   28.388326]  which belongs to the cache kmalloc-64 of size 64
[   28.389102] The buggy address is located 0 bytes to the right of
[   28.389102]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.389809] 
[   28.389980] The buggy address belongs to the physical page:
[   28.390185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.390636] flags: 0x200000000000000(node=0|zone=2)
[   28.390827] page_type: f5(slab)
[   28.390958] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.391440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.391794] page dumped because: kasan: bad access detected
[   28.392040] 
[   28.392121] Memory state around the buggy address:
[   28.392342]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.392744]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.393091] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.393391]                                      ^
[   28.393585]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.393863]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.394240] ==================================================================
[   28.991851] ==================================================================
[   28.992091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   28.992564] Read of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.993568] 
[   28.993813] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.993995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.994011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.994034] Call Trace:
[   28.994052]  <TASK>
[   28.994069]  dump_stack_lvl+0x73/0xb0
[   28.994101]  print_report+0xd1/0x640
[   28.994125]  ? __virt_addr_valid+0x1db/0x2d0
[   28.994152]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.994185]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.994214]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.994239]  kasan_report+0x141/0x180
[   28.994263]  ? kasan_atomics_helper+0x4f98/0x5450
[   28.994292]  __asan_report_load8_noabort+0x18/0x20
[   28.994319]  kasan_atomics_helper+0x4f98/0x5450
[   28.994346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.994370]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.994397]  ? kasan_atomics+0x152/0x310
[   28.994424]  kasan_atomics+0x1dc/0x310
[   28.994450]  ? __pfx_kasan_atomics+0x10/0x10
[   28.994478]  ? __pfx_read_tsc+0x10/0x10
[   28.994504]  ? ktime_get_ts64+0x86/0x230
[   28.994529]  kunit_try_run_case+0x1a5/0x480
[   28.994556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.994580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.994608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.994635]  ? __kthread_parkme+0x82/0x180
[   28.994656]  ? preempt_count_sub+0x50/0x80
[   28.994681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.994707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.994733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.994758]  kthread+0x337/0x6f0
[   28.994780]  ? trace_preempt_on+0x20/0xc0
[   28.994804]  ? __pfx_kthread+0x10/0x10
[   28.994826]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.994866]  ? calculate_sigpending+0x7b/0xa0
[   28.994890]  ? __pfx_kthread+0x10/0x10
[   28.994914]  ret_from_fork+0x116/0x1d0
[   28.994935]  ? __pfx_kthread+0x10/0x10
[   28.994957]  ret_from_fork_asm+0x1a/0x30
[   28.994990]  </TASK>
[   28.995002] 
[   29.006858] Allocated by task 313:
[   29.007310]  kasan_save_stack+0x45/0x70
[   29.007608]  kasan_save_track+0x18/0x40
[   29.007779]  kasan_save_alloc_info+0x3b/0x50
[   29.008012]  __kasan_kmalloc+0xb7/0xc0
[   29.008433]  __kmalloc_cache_noprof+0x189/0x420
[   29.008634]  kasan_atomics+0x95/0x310
[   29.008827]  kunit_try_run_case+0x1a5/0x480
[   29.009098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.009840]  kthread+0x337/0x6f0
[   29.010100]  ret_from_fork+0x116/0x1d0
[   29.010410]  ret_from_fork_asm+0x1a/0x30
[   29.010733] 
[   29.010946] The buggy address belongs to the object at ffff8881058a7e80
[   29.010946]  which belongs to the cache kmalloc-64 of size 64
[   29.011612] The buggy address is located 0 bytes to the right of
[   29.011612]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   29.012467] 
[   29.012553] The buggy address belongs to the physical page:
[   29.013136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   29.013492] flags: 0x200000000000000(node=0|zone=2)
[   29.013934] page_type: f5(slab)
[   29.014196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.014639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.015026] page dumped because: kasan: bad access detected
[   29.015361] 
[   29.015563] Memory state around the buggy address:
[   29.016040]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.016617]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.017032] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.017475]                                      ^
[   29.017937]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.018353]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.018917] ==================================================================
[   29.090154] ==================================================================
[   29.090395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   29.090636] Read of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   29.090874] 
[   29.090961] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.091014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.091028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.091051] Call Trace:
[   29.091069]  <TASK>
[   29.091086]  dump_stack_lvl+0x73/0xb0
[   29.091113]  print_report+0xd1/0x640
[   29.091138]  ? __virt_addr_valid+0x1db/0x2d0
[   29.091162]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.091186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.091215]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.091239]  kasan_report+0x141/0x180
[   29.091263]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.091291]  __asan_report_load8_noabort+0x18/0x20
[   29.091317]  kasan_atomics_helper+0x4fa5/0x5450
[   29.091341]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.091365]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.091391]  ? kasan_atomics+0x152/0x310
[   29.091418]  kasan_atomics+0x1dc/0x310
[   29.091443]  ? __pfx_kasan_atomics+0x10/0x10
[   29.091470]  ? __pfx_read_tsc+0x10/0x10
[   29.091493]  ? ktime_get_ts64+0x86/0x230
[   29.091520]  kunit_try_run_case+0x1a5/0x480
[   29.091546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.091570]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.091597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.091624]  ? __kthread_parkme+0x82/0x180
[   29.091645]  ? preempt_count_sub+0x50/0x80
[   29.091670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.091696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.091721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.091747]  kthread+0x337/0x6f0
[   29.091767]  ? trace_preempt_on+0x20/0xc0
[   29.091792]  ? __pfx_kthread+0x10/0x10
[   29.091815]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.091923]  ? calculate_sigpending+0x7b/0xa0
[   29.091951]  ? __pfx_kthread+0x10/0x10
[   29.091976]  ret_from_fork+0x116/0x1d0
[   29.091998]  ? __pfx_kthread+0x10/0x10
[   29.092021]  ret_from_fork_asm+0x1a/0x30
[   29.092053]  </TASK>
[   29.092066] 
[   29.105262] Allocated by task 313:
[   29.105670]  kasan_save_stack+0x45/0x70
[   29.106040]  kasan_save_track+0x18/0x40
[   29.106425]  kasan_save_alloc_info+0x3b/0x50
[   29.107033]  __kasan_kmalloc+0xb7/0xc0
[   29.107431]  __kmalloc_cache_noprof+0x189/0x420
[   29.107929]  kasan_atomics+0x95/0x310
[   29.108263]  kunit_try_run_case+0x1a5/0x480
[   29.108435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.109007]  kthread+0x337/0x6f0
[   29.109300]  ret_from_fork+0x116/0x1d0
[   29.109437]  ret_from_fork_asm+0x1a/0x30
[   29.109586] 
[   29.109657] The buggy address belongs to the object at ffff8881058a7e80
[   29.109657]  which belongs to the cache kmalloc-64 of size 64
[   29.110536] The buggy address is located 0 bytes to the right of
[   29.110536]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   29.111798] 
[   29.111995] The buggy address belongs to the physical page:
[   29.112583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   29.113057] flags: 0x200000000000000(node=0|zone=2)
[   29.113340] page_type: f5(slab)
[   29.113735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.114433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.114860] page dumped because: kasan: bad access detected
[   29.115038] 
[   29.115107] Memory state around the buggy address:
[   29.115519]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.116156]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.117015] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.117707]                                      ^
[   29.118023]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.118249]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.118900] ==================================================================
[   28.476298] ==================================================================
[   28.476539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   28.477051] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.477385] 
[   28.477805] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.477876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.477892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.477915] Call Trace:
[   28.477939]  <TASK>
[   28.477955]  dump_stack_lvl+0x73/0xb0
[   28.477986]  print_report+0xd1/0x640
[   28.478010]  ? __virt_addr_valid+0x1db/0x2d0
[   28.478035]  ? kasan_atomics_helper+0x151d/0x5450
[   28.478058]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.478086]  ? kasan_atomics_helper+0x151d/0x5450
[   28.478110]  kasan_report+0x141/0x180
[   28.478135]  ? kasan_atomics_helper+0x151d/0x5450
[   28.478162]  kasan_check_range+0x10c/0x1c0
[   28.478188]  __kasan_check_write+0x18/0x20
[   28.478213]  kasan_atomics_helper+0x151d/0x5450
[   28.478238]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.478263]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.478289]  ? kasan_atomics+0x152/0x310
[   28.478316]  kasan_atomics+0x1dc/0x310
[   28.478341]  ? __pfx_kasan_atomics+0x10/0x10
[   28.478367]  ? __pfx_read_tsc+0x10/0x10
[   28.478391]  ? ktime_get_ts64+0x86/0x230
[   28.478416]  kunit_try_run_case+0x1a5/0x480
[   28.478443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.478469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.478497]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.478524]  ? __kthread_parkme+0x82/0x180
[   28.478547]  ? preempt_count_sub+0x50/0x80
[   28.478571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.478596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.478622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.478646]  kthread+0x337/0x6f0
[   28.478668]  ? trace_preempt_on+0x20/0xc0
[   28.478693]  ? __pfx_kthread+0x10/0x10
[   28.478715]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.478740]  ? calculate_sigpending+0x7b/0xa0
[   28.478768]  ? __pfx_kthread+0x10/0x10
[   28.478793]  ret_from_fork+0x116/0x1d0
[   28.478814]  ? __pfx_kthread+0x10/0x10
[   28.478845]  ret_from_fork_asm+0x1a/0x30
[   28.478878]  </TASK>
[   28.478890] 
[   28.487074] Allocated by task 313:
[   28.487437]  kasan_save_stack+0x45/0x70
[   28.487667]  kasan_save_track+0x18/0x40
[   28.487804]  kasan_save_alloc_info+0x3b/0x50
[   28.487963]  __kasan_kmalloc+0xb7/0xc0
[   28.488092]  __kmalloc_cache_noprof+0x189/0x420
[   28.488598]  kasan_atomics+0x95/0x310
[   28.488796]  kunit_try_run_case+0x1a5/0x480
[   28.488998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.489353]  kthread+0x337/0x6f0
[   28.490260]  ret_from_fork+0x116/0x1d0
[   28.490482]  ret_from_fork_asm+0x1a/0x30
[   28.490640] 
[   28.490732] The buggy address belongs to the object at ffff8881058a7e80
[   28.490732]  which belongs to the cache kmalloc-64 of size 64
[   28.491742] The buggy address is located 0 bytes to the right of
[   28.491742]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.492748] 
[   28.492870] The buggy address belongs to the physical page:
[   28.493116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.493372] flags: 0x200000000000000(node=0|zone=2)
[   28.493673] page_type: f5(slab)
[   28.493858] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.494178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.494622] page dumped because: kasan: bad access detected
[   28.494885] 
[   28.494960] Memory state around the buggy address:
[   28.495150]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.495537]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.495819] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.496158]                                      ^
[   28.496397]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.496722]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.497036] ==================================================================
[   28.313733] ==================================================================
[   28.314310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   28.314605] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.315084] 
[   28.315172] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.315245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.315260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.315283] Call Trace:
[   28.315325]  <TASK>
[   28.315341]  dump_stack_lvl+0x73/0xb0
[   28.315385]  print_report+0xd1/0x640
[   28.315409]  ? __virt_addr_valid+0x1db/0x2d0
[   28.315435]  ? kasan_atomics_helper+0x12e6/0x5450
[   28.315458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.315487]  ? kasan_atomics_helper+0x12e6/0x5450
[   28.315511]  kasan_report+0x141/0x180
[   28.315535]  ? kasan_atomics_helper+0x12e6/0x5450
[   28.315562]  kasan_check_range+0x10c/0x1c0
[   28.315588]  __kasan_check_write+0x18/0x20
[   28.315613]  kasan_atomics_helper+0x12e6/0x5450
[   28.315637]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.315661]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.315686]  ? kasan_atomics+0x152/0x310
[   28.315714]  kasan_atomics+0x1dc/0x310
[   28.315738]  ? __pfx_kasan_atomics+0x10/0x10
[   28.315765]  ? __pfx_read_tsc+0x10/0x10
[   28.315787]  ? ktime_get_ts64+0x86/0x230
[   28.315812]  kunit_try_run_case+0x1a5/0x480
[   28.315850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.315875]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.315913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.315940]  ? __kthread_parkme+0x82/0x180
[   28.315962]  ? preempt_count_sub+0x50/0x80
[   28.315986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.316014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.316042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.316096]  kthread+0x337/0x6f0
[   28.316118]  ? trace_preempt_on+0x20/0xc0
[   28.316143]  ? __pfx_kthread+0x10/0x10
[   28.316166]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.316190]  ? calculate_sigpending+0x7b/0xa0
[   28.316216]  ? __pfx_kthread+0x10/0x10
[   28.316241]  ret_from_fork+0x116/0x1d0
[   28.316263]  ? __pfx_kthread+0x10/0x10
[   28.316286]  ret_from_fork_asm+0x1a/0x30
[   28.316318]  </TASK>
[   28.316332] 
[   28.324912] Allocated by task 313:
[   28.325090]  kasan_save_stack+0x45/0x70
[   28.325494]  kasan_save_track+0x18/0x40
[   28.325679]  kasan_save_alloc_info+0x3b/0x50
[   28.325890]  __kasan_kmalloc+0xb7/0xc0
[   28.326103]  __kmalloc_cache_noprof+0x189/0x420
[   28.326296]  kasan_atomics+0x95/0x310
[   28.326480]  kunit_try_run_case+0x1a5/0x480
[   28.326801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.327100]  kthread+0x337/0x6f0
[   28.327264]  ret_from_fork+0x116/0x1d0
[   28.327419]  ret_from_fork_asm+0x1a/0x30
[   28.327627] 
[   28.327699] The buggy address belongs to the object at ffff8881058a7e80
[   28.327699]  which belongs to the cache kmalloc-64 of size 64
[   28.328077] The buggy address is located 0 bytes to the right of
[   28.328077]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.328462] 
[   28.328535] The buggy address belongs to the physical page:
[   28.328711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.329292] flags: 0x200000000000000(node=0|zone=2)
[   28.330530] page_type: f5(slab)
[   28.331197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.331943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.332757] page dumped because: kasan: bad access detected
[   28.332978] 
[   28.333057] Memory state around the buggy address:
[   28.333225]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.333449]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.333673] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.334518]                                      ^
[   28.335364]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.336407]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.337431] ==================================================================
[   28.805065] ==================================================================
[   28.805599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   28.806272] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.806896] 
[   28.807168] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.807240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.807256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.807280] Call Trace:
[   28.807305]  <TASK>
[   28.807323]  dump_stack_lvl+0x73/0xb0
[   28.807353]  print_report+0xd1/0x640
[   28.807377]  ? __virt_addr_valid+0x1db/0x2d0
[   28.807402]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.807425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.807452]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.807506]  kasan_report+0x141/0x180
[   28.807531]  ? kasan_atomics_helper+0x1ce1/0x5450
[   28.807558]  kasan_check_range+0x10c/0x1c0
[   28.807583]  __kasan_check_write+0x18/0x20
[   28.807609]  kasan_atomics_helper+0x1ce1/0x5450
[   28.807634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.807658]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.807684]  ? kasan_atomics+0x152/0x310
[   28.807712]  kasan_atomics+0x1dc/0x310
[   28.807736]  ? __pfx_kasan_atomics+0x10/0x10
[   28.807763]  ? __pfx_read_tsc+0x10/0x10
[   28.807786]  ? ktime_get_ts64+0x86/0x230
[   28.807811]  kunit_try_run_case+0x1a5/0x480
[   28.807849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.807873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.807901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.807928]  ? __kthread_parkme+0x82/0x180
[   28.807950]  ? preempt_count_sub+0x50/0x80
[   28.807974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.808000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.808025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.808051]  kthread+0x337/0x6f0
[   28.808072]  ? trace_preempt_on+0x20/0xc0
[   28.808097]  ? __pfx_kthread+0x10/0x10
[   28.808119]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.808144]  ? calculate_sigpending+0x7b/0xa0
[   28.808179]  ? __pfx_kthread+0x10/0x10
[   28.808202]  ret_from_fork+0x116/0x1d0
[   28.808224]  ? __pfx_kthread+0x10/0x10
[   28.808246]  ret_from_fork_asm+0x1a/0x30
[   28.808278]  </TASK>
[   28.808291] 
[   28.821777] Allocated by task 313:
[   28.822088]  kasan_save_stack+0x45/0x70
[   28.822444]  kasan_save_track+0x18/0x40
[   28.822819]  kasan_save_alloc_info+0x3b/0x50
[   28.823043]  __kasan_kmalloc+0xb7/0xc0
[   28.823472]  __kmalloc_cache_noprof+0x189/0x420
[   28.823759]  kasan_atomics+0x95/0x310
[   28.824070]  kunit_try_run_case+0x1a5/0x480
[   28.824425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.824949]  kthread+0x337/0x6f0
[   28.825269]  ret_from_fork+0x116/0x1d0
[   28.825472]  ret_from_fork_asm+0x1a/0x30
[   28.825974] 
[   28.826085] The buggy address belongs to the object at ffff8881058a7e80
[   28.826085]  which belongs to the cache kmalloc-64 of size 64
[   28.827014] The buggy address is located 0 bytes to the right of
[   28.827014]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.827955] 
[   28.828213] The buggy address belongs to the physical page:
[   28.828715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.829074] flags: 0x200000000000000(node=0|zone=2)
[   28.829532] page_type: f5(slab)
[   28.829977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.830596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.830931] page dumped because: kasan: bad access detected
[   28.831152] 
[   28.831436] Memory state around the buggy address:
[   28.831941]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.832536]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.832778] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.833268]                                      ^
[   28.833453]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.833785]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.834110] ==================================================================
[   27.679321] ==================================================================
[   27.680255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   27.680608] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.680950] 
[   27.681043] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.681094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.681109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.681133] Call Trace:
[   27.681150]  <TASK>
[   27.681167]  dump_stack_lvl+0x73/0xb0
[   27.681194]  print_report+0xd1/0x640
[   27.681218]  ? __virt_addr_valid+0x1db/0x2d0
[   27.681242]  ? kasan_atomics_helper+0x5fe/0x5450
[   27.681265]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.681293]  ? kasan_atomics_helper+0x5fe/0x5450
[   27.681316]  kasan_report+0x141/0x180
[   27.681340]  ? kasan_atomics_helper+0x5fe/0x5450
[   27.681367]  kasan_check_range+0x10c/0x1c0
[   27.681393]  __kasan_check_write+0x18/0x20
[   27.681417]  kasan_atomics_helper+0x5fe/0x5450
[   27.681440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.681463]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.681488]  ? kasan_atomics+0x152/0x310
[   27.681517]  kasan_atomics+0x1dc/0x310
[   27.681540]  ? __pfx_kasan_atomics+0x10/0x10
[   27.681566]  ? __pfx_read_tsc+0x10/0x10
[   27.681588]  ? ktime_get_ts64+0x86/0x230
[   27.681861]  kunit_try_run_case+0x1a5/0x480
[   27.681890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.681915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.681942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.681982]  ? __kthread_parkme+0x82/0x180
[   27.682005]  ? preempt_count_sub+0x50/0x80
[   27.682041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.682068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.682094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.682120]  kthread+0x337/0x6f0
[   27.682141]  ? trace_preempt_on+0x20/0xc0
[   27.682174]  ? __pfx_kthread+0x10/0x10
[   27.682196]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.682221]  ? calculate_sigpending+0x7b/0xa0
[   27.682247]  ? __pfx_kthread+0x10/0x10
[   27.682270]  ret_from_fork+0x116/0x1d0
[   27.682291]  ? __pfx_kthread+0x10/0x10
[   27.682313]  ret_from_fork_asm+0x1a/0x30
[   27.682346]  </TASK>
[   27.682358] 
[   27.695569] Allocated by task 313:
[   27.695976]  kasan_save_stack+0x45/0x70
[   27.696393]  kasan_save_track+0x18/0x40
[   27.696770]  kasan_save_alloc_info+0x3b/0x50
[   27.697202]  __kasan_kmalloc+0xb7/0xc0
[   27.697550]  __kmalloc_cache_noprof+0x189/0x420
[   27.697774]  kasan_atomics+0x95/0x310
[   27.697950]  kunit_try_run_case+0x1a5/0x480
[   27.698138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.698370]  kthread+0x337/0x6f0
[   27.698927]  ret_from_fork+0x116/0x1d0
[   27.699324]  ret_from_fork_asm+0x1a/0x30
[   27.699671] 
[   27.699912] The buggy address belongs to the object at ffff8881058a7e80
[   27.699912]  which belongs to the cache kmalloc-64 of size 64
[   27.700920] The buggy address is located 0 bytes to the right of
[   27.700920]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.702056] 
[   27.702271] The buggy address belongs to the physical page:
[   27.702782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.703461] flags: 0x200000000000000(node=0|zone=2)
[   27.703682] page_type: f5(slab)
[   27.703849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.704219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.704665] page dumped because: kasan: bad access detected
[   27.704949] 
[   27.705046] Memory state around the buggy address:
[   27.705237]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.705745]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.706153] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.706578]                                      ^
[   27.706809]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.707094]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.707395] ==================================================================
[   27.799366] ==================================================================
[   27.800073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   27.800757] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.801125] 
[   27.801319] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.801380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.801405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.801430] Call Trace:
[   27.801455]  <TASK>
[   27.801471]  dump_stack_lvl+0x73/0xb0
[   27.801501]  print_report+0xd1/0x640
[   27.801526]  ? __virt_addr_valid+0x1db/0x2d0
[   27.801551]  ? kasan_atomics_helper+0x860/0x5450
[   27.801574]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.801603]  ? kasan_atomics_helper+0x860/0x5450
[   27.801667]  kasan_report+0x141/0x180
[   27.801694]  ? kasan_atomics_helper+0x860/0x5450
[   27.801722]  kasan_check_range+0x10c/0x1c0
[   27.801747]  __kasan_check_write+0x18/0x20
[   27.801773]  kasan_atomics_helper+0x860/0x5450
[   27.801798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.801822]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.801861]  ? kasan_atomics+0x152/0x310
[   27.801890]  kasan_atomics+0x1dc/0x310
[   27.801914]  ? __pfx_kasan_atomics+0x10/0x10
[   27.801941]  ? __pfx_read_tsc+0x10/0x10
[   27.801964]  ? ktime_get_ts64+0x86/0x230
[   27.801990]  kunit_try_run_case+0x1a5/0x480
[   27.802016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.802041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.802069]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.802095]  ? __kthread_parkme+0x82/0x180
[   27.802117]  ? preempt_count_sub+0x50/0x80
[   27.802141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.802166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.802192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.802218]  kthread+0x337/0x6f0
[   27.802239]  ? trace_preempt_on+0x20/0xc0
[   27.802265]  ? __pfx_kthread+0x10/0x10
[   27.802287]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.802313]  ? calculate_sigpending+0x7b/0xa0
[   27.802337]  ? __pfx_kthread+0x10/0x10
[   27.802361]  ret_from_fork+0x116/0x1d0
[   27.802383]  ? __pfx_kthread+0x10/0x10
[   27.802405]  ret_from_fork_asm+0x1a/0x30
[   27.802437]  </TASK>
[   27.802451] 
[   27.815852] Allocated by task 313:
[   27.816199]  kasan_save_stack+0x45/0x70
[   27.816662]  kasan_save_track+0x18/0x40
[   27.817122]  kasan_save_alloc_info+0x3b/0x50
[   27.817283]  __kasan_kmalloc+0xb7/0xc0
[   27.817416]  __kmalloc_cache_noprof+0x189/0x420
[   27.817893]  kasan_atomics+0x95/0x310
[   27.818274]  kunit_try_run_case+0x1a5/0x480
[   27.818786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.819305]  kthread+0x337/0x6f0
[   27.819825]  ret_from_fork+0x116/0x1d0
[   27.820040]  ret_from_fork_asm+0x1a/0x30
[   27.820215] 
[   27.820373] The buggy address belongs to the object at ffff8881058a7e80
[   27.820373]  which belongs to the cache kmalloc-64 of size 64
[   27.821559] The buggy address is located 0 bytes to the right of
[   27.821559]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.821955] 
[   27.822029] The buggy address belongs to the physical page:
[   27.822234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.822636] flags: 0x200000000000000(node=0|zone=2)
[   27.822872] page_type: f5(slab)
[   27.823016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.823364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.823709] page dumped because: kasan: bad access detected
[   27.823947] 
[   27.824018] Memory state around the buggy address:
[   27.824176]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.824498]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.824988] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.825335]                                      ^
[   27.825574]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.826058]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.826418] ==================================================================
[   27.974798] ==================================================================
[   27.975454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   27.976272] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.976989] 
[   27.977169] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.977220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.977236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.977260] Call Trace:
[   27.977277]  <TASK>
[   27.977294]  dump_stack_lvl+0x73/0xb0
[   27.977323]  print_report+0xd1/0x640
[   27.977349]  ? __virt_addr_valid+0x1db/0x2d0
[   27.977373]  ? kasan_atomics_helper+0x4a84/0x5450
[   27.977397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.977424]  ? kasan_atomics_helper+0x4a84/0x5450
[   27.977448]  kasan_report+0x141/0x180
[   27.977521]  ? kasan_atomics_helper+0x4a84/0x5450
[   27.977549]  __asan_report_load4_noabort+0x18/0x20
[   27.977576]  kasan_atomics_helper+0x4a84/0x5450
[   27.977601]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.977624]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.977650]  ? kasan_atomics+0x152/0x310
[   27.977679]  kasan_atomics+0x1dc/0x310
[   27.977704]  ? __pfx_kasan_atomics+0x10/0x10
[   27.977729]  ? __pfx_read_tsc+0x10/0x10
[   27.977753]  ? ktime_get_ts64+0x86/0x230
[   27.977778]  kunit_try_run_case+0x1a5/0x480
[   27.977804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.977850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.977878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.977905]  ? __kthread_parkme+0x82/0x180
[   27.977927]  ? preempt_count_sub+0x50/0x80
[   27.977952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.977979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.978005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.978031]  kthread+0x337/0x6f0
[   27.978053]  ? trace_preempt_on+0x20/0xc0
[   27.978078]  ? __pfx_kthread+0x10/0x10
[   27.978100]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.978125]  ? calculate_sigpending+0x7b/0xa0
[   27.978150]  ? __pfx_kthread+0x10/0x10
[   27.978173]  ret_from_fork+0x116/0x1d0
[   27.978194]  ? __pfx_kthread+0x10/0x10
[   27.978217]  ret_from_fork_asm+0x1a/0x30
[   27.978249]  </TASK>
[   27.978262] 
[   27.992026] Allocated by task 313:
[   27.992372]  kasan_save_stack+0x45/0x70
[   27.992772]  kasan_save_track+0x18/0x40
[   27.993334]  kasan_save_alloc_info+0x3b/0x50
[   27.993784]  __kasan_kmalloc+0xb7/0xc0
[   27.994133]  __kmalloc_cache_noprof+0x189/0x420
[   27.994631]  kasan_atomics+0x95/0x310
[   27.994958]  kunit_try_run_case+0x1a5/0x480
[   27.995109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.995565]  kthread+0x337/0x6f0
[   27.995928]  ret_from_fork+0x116/0x1d0
[   27.996306]  ret_from_fork_asm+0x1a/0x30
[   27.996730] 
[   27.996815] The buggy address belongs to the object at ffff8881058a7e80
[   27.996815]  which belongs to the cache kmalloc-64 of size 64
[   27.997221] The buggy address is located 0 bytes to the right of
[   27.997221]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.998657] 
[   27.998849] The buggy address belongs to the physical page:
[   27.999494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.000244] flags: 0x200000000000000(node=0|zone=2)
[   28.000504] page_type: f5(slab)
[   28.000872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.001401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.001983] page dumped because: kasan: bad access detected
[   28.002660] 
[   28.002826] Memory state around the buggy address:
[   28.003027]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.003278]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.003614] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.004224]                                      ^
[   28.004749]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.005232]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.005454] ==================================================================
[   28.267596] ==================================================================
[   28.268182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   28.268671] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.269105] 
[   28.269222] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.269274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.269289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.269311] Call Trace:
[   28.269330]  <TASK>
[   28.269348]  dump_stack_lvl+0x73/0xb0
[   28.269614]  print_report+0xd1/0x640
[   28.269642]  ? __virt_addr_valid+0x1db/0x2d0
[   28.269668]  ? kasan_atomics_helper+0x1217/0x5450
[   28.269691]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.269719]  ? kasan_atomics_helper+0x1217/0x5450
[   28.269743]  kasan_report+0x141/0x180
[   28.269767]  ? kasan_atomics_helper+0x1217/0x5450
[   28.269794]  kasan_check_range+0x10c/0x1c0
[   28.269820]  __kasan_check_write+0x18/0x20
[   28.269859]  kasan_atomics_helper+0x1217/0x5450
[   28.269884]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.269909]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.269935]  ? kasan_atomics+0x152/0x310
[   28.269962]  kasan_atomics+0x1dc/0x310
[   28.269988]  ? __pfx_kasan_atomics+0x10/0x10
[   28.270015]  ? __pfx_read_tsc+0x10/0x10
[   28.270038]  ? ktime_get_ts64+0x86/0x230
[   28.270065]  kunit_try_run_case+0x1a5/0x480
[   28.270091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.270116]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.270145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.270173]  ? __kthread_parkme+0x82/0x180
[   28.270195]  ? preempt_count_sub+0x50/0x80
[   28.270219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.270245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.270271]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.270297]  kthread+0x337/0x6f0
[   28.270320]  ? trace_preempt_on+0x20/0xc0
[   28.270345]  ? __pfx_kthread+0x10/0x10
[   28.270367]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.270392]  ? calculate_sigpending+0x7b/0xa0
[   28.270418]  ? __pfx_kthread+0x10/0x10
[   28.270441]  ret_from_fork+0x116/0x1d0
[   28.270463]  ? __pfx_kthread+0x10/0x10
[   28.270487]  ret_from_fork_asm+0x1a/0x30
[   28.270520]  </TASK>
[   28.270533] 
[   28.281880] Allocated by task 313:
[   28.282169]  kasan_save_stack+0x45/0x70
[   28.282540]  kasan_save_track+0x18/0x40
[   28.282727]  kasan_save_alloc_info+0x3b/0x50
[   28.282937]  __kasan_kmalloc+0xb7/0xc0
[   28.283117]  __kmalloc_cache_noprof+0x189/0x420
[   28.283495]  kasan_atomics+0x95/0x310
[   28.283937]  kunit_try_run_case+0x1a5/0x480
[   28.284228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.284580]  kthread+0x337/0x6f0
[   28.284730]  ret_from_fork+0x116/0x1d0
[   28.285095]  ret_from_fork_asm+0x1a/0x30
[   28.285392] 
[   28.285569] The buggy address belongs to the object at ffff8881058a7e80
[   28.285569]  which belongs to the cache kmalloc-64 of size 64
[   28.286234] The buggy address is located 0 bytes to the right of
[   28.286234]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.287015] 
[   28.287167] The buggy address belongs to the physical page:
[   28.287484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.287914] flags: 0x200000000000000(node=0|zone=2)
[   28.288114] page_type: f5(slab)
[   28.288376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.288920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.289352] page dumped because: kasan: bad access detected
[   28.289649] 
[   28.289811] Memory state around the buggy address:
[   28.290327]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.290770]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.291156] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.291449]                                      ^
[   28.291871]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.292321]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.292784] ==================================================================
[   28.555956] ==================================================================
[   28.556430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   28.557005] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.557341] 
[   28.557465] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.557516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.557530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.557553] Call Trace:
[   28.557570]  <TASK>
[   28.557645]  dump_stack_lvl+0x73/0xb0
[   28.557676]  print_report+0xd1/0x640
[   28.557701]  ? __virt_addr_valid+0x1db/0x2d0
[   28.557726]  ? kasan_atomics_helper+0x177f/0x5450
[   28.557749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.557778]  ? kasan_atomics_helper+0x177f/0x5450
[   28.557801]  kasan_report+0x141/0x180
[   28.557825]  ? kasan_atomics_helper+0x177f/0x5450
[   28.557868]  kasan_check_range+0x10c/0x1c0
[   28.557893]  __kasan_check_write+0x18/0x20
[   28.557953]  kasan_atomics_helper+0x177f/0x5450
[   28.557979]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.558004]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.558030]  ? kasan_atomics+0x152/0x310
[   28.558058]  kasan_atomics+0x1dc/0x310
[   28.558083]  ? __pfx_kasan_atomics+0x10/0x10
[   28.558110]  ? __pfx_read_tsc+0x10/0x10
[   28.558133]  ? ktime_get_ts64+0x86/0x230
[   28.558159]  kunit_try_run_case+0x1a5/0x480
[   28.558188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.558214]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.558241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.558269]  ? __kthread_parkme+0x82/0x180
[   28.558291]  ? preempt_count_sub+0x50/0x80
[   28.558316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.558342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.558368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.558394]  kthread+0x337/0x6f0
[   28.558416]  ? trace_preempt_on+0x20/0xc0
[   28.558441]  ? __pfx_kthread+0x10/0x10
[   28.558463]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.558489]  ? calculate_sigpending+0x7b/0xa0
[   28.558514]  ? __pfx_kthread+0x10/0x10
[   28.558585]  ret_from_fork+0x116/0x1d0
[   28.558609]  ? __pfx_kthread+0x10/0x10
[   28.558632]  ret_from_fork_asm+0x1a/0x30
[   28.558665]  </TASK>
[   28.558678] 
[   28.576882] Allocated by task 313:
[   28.577551]  kasan_save_stack+0x45/0x70
[   28.578151]  kasan_save_track+0x18/0x40
[   28.578717]  kasan_save_alloc_info+0x3b/0x50
[   28.579343]  __kasan_kmalloc+0xb7/0xc0
[   28.579916]  __kmalloc_cache_noprof+0x189/0x420
[   28.580441]  kasan_atomics+0x95/0x310
[   28.580671]  kunit_try_run_case+0x1a5/0x480
[   28.580826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.581026]  kthread+0x337/0x6f0
[   28.581152]  ret_from_fork+0x116/0x1d0
[   28.581985]  ret_from_fork_asm+0x1a/0x30
[   28.583918] 
[   28.584006] The buggy address belongs to the object at ffff8881058a7e80
[   28.584006]  which belongs to the cache kmalloc-64 of size 64
[   28.585058] The buggy address is located 0 bytes to the right of
[   28.585058]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.585876] 
[   28.585963] The buggy address belongs to the physical page:
[   28.586171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.586930] flags: 0x200000000000000(node=0|zone=2)
[   28.587403] page_type: f5(slab)
[   28.587964] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.588693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.589337] page dumped because: kasan: bad access detected
[   28.589519] 
[   28.589589] Memory state around the buggy address:
[   28.589756]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.589993]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.590288] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.590579]                                      ^
[   28.590786]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.591118]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.591469] ==================================================================
[   28.779717] ==================================================================
[   28.780046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   28.780561] Read of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.780797] 
[   28.780981] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.781061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.781077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.781099] Call Trace:
[   28.781117]  <TASK>
[   28.781134]  dump_stack_lvl+0x73/0xb0
[   28.781164]  print_report+0xd1/0x640
[   28.781189]  ? __virt_addr_valid+0x1db/0x2d0
[   28.781216]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.781240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.781267]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.781290]  kasan_report+0x141/0x180
[   28.781335]  ? kasan_atomics_helper+0x4f30/0x5450
[   28.781365]  __asan_report_load8_noabort+0x18/0x20
[   28.781392]  kasan_atomics_helper+0x4f30/0x5450
[   28.781416]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.781440]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.781512]  ? kasan_atomics+0x152/0x310
[   28.781541]  kasan_atomics+0x1dc/0x310
[   28.781567]  ? __pfx_kasan_atomics+0x10/0x10
[   28.781592]  ? __pfx_read_tsc+0x10/0x10
[   28.781616]  ? ktime_get_ts64+0x86/0x230
[   28.781642]  kunit_try_run_case+0x1a5/0x480
[   28.781669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.781693]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.781720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.781747]  ? __kthread_parkme+0x82/0x180
[   28.781768]  ? preempt_count_sub+0x50/0x80
[   28.781794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.781819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.781855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.781881]  kthread+0x337/0x6f0
[   28.781902]  ? trace_preempt_on+0x20/0xc0
[   28.781927]  ? __pfx_kthread+0x10/0x10
[   28.781949]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.781975]  ? calculate_sigpending+0x7b/0xa0
[   28.782000]  ? __pfx_kthread+0x10/0x10
[   28.782024]  ret_from_fork+0x116/0x1d0
[   28.782045]  ? __pfx_kthread+0x10/0x10
[   28.782068]  ret_from_fork_asm+0x1a/0x30
[   28.782100]  </TASK>
[   28.782112] 
[   28.791574] Allocated by task 313:
[   28.791930]  kasan_save_stack+0x45/0x70
[   28.792090]  kasan_save_track+0x18/0x40
[   28.792590]  kasan_save_alloc_info+0x3b/0x50
[   28.793026]  __kasan_kmalloc+0xb7/0xc0
[   28.793392]  __kmalloc_cache_noprof+0x189/0x420
[   28.793843]  kasan_atomics+0x95/0x310
[   28.794026]  kunit_try_run_case+0x1a5/0x480
[   28.794218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.794694]  kthread+0x337/0x6f0
[   28.795006]  ret_from_fork+0x116/0x1d0
[   28.795487]  ret_from_fork_asm+0x1a/0x30
[   28.795819] 
[   28.795920] The buggy address belongs to the object at ffff8881058a7e80
[   28.795920]  which belongs to the cache kmalloc-64 of size 64
[   28.796774] The buggy address is located 0 bytes to the right of
[   28.796774]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.797827] 
[   28.797942] The buggy address belongs to the physical page:
[   28.798180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.798848] flags: 0x200000000000000(node=0|zone=2)
[   28.799317] page_type: f5(slab)
[   28.799704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.800019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.800628] page dumped because: kasan: bad access detected
[   28.800969] 
[   28.801196] Memory state around the buggy address:
[   28.801421]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.801897]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.802439] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.802947]                                      ^
[   28.803161]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.803460]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.803741] ==================================================================
[   28.219183] ==================================================================
[   28.219604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   28.219890] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.220403] 
[   28.220589] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.220643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.220659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.220683] Call Trace:
[   28.220701]  <TASK>
[   28.220717]  dump_stack_lvl+0x73/0xb0
[   28.220747]  print_report+0xd1/0x640
[   28.220772]  ? __virt_addr_valid+0x1db/0x2d0
[   28.220796]  ? kasan_atomics_helper+0x1148/0x5450
[   28.220819]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.220862]  ? kasan_atomics_helper+0x1148/0x5450
[   28.220892]  kasan_report+0x141/0x180
[   28.220918]  ? kasan_atomics_helper+0x1148/0x5450
[   28.220947]  kasan_check_range+0x10c/0x1c0
[   28.220973]  __kasan_check_write+0x18/0x20
[   28.221001]  kasan_atomics_helper+0x1148/0x5450
[   28.221026]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.221049]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.221076]  ? kasan_atomics+0x152/0x310
[   28.221104]  kasan_atomics+0x1dc/0x310
[   28.221129]  ? __pfx_kasan_atomics+0x10/0x10
[   28.221156]  ? __pfx_read_tsc+0x10/0x10
[   28.221501]  ? ktime_get_ts64+0x86/0x230
[   28.221528]  kunit_try_run_case+0x1a5/0x480
[   28.221556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.221581]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.221608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.221636]  ? __kthread_parkme+0x82/0x180
[   28.221658]  ? preempt_count_sub+0x50/0x80
[   28.221682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.221708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.221734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.221759]  kthread+0x337/0x6f0
[   28.221781]  ? trace_preempt_on+0x20/0xc0
[   28.221806]  ? __pfx_kthread+0x10/0x10
[   28.221840]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.221868]  ? calculate_sigpending+0x7b/0xa0
[   28.221893]  ? __pfx_kthread+0x10/0x10
[   28.221918]  ret_from_fork+0x116/0x1d0
[   28.221938]  ? __pfx_kthread+0x10/0x10
[   28.221961]  ret_from_fork_asm+0x1a/0x30
[   28.221994]  </TASK>
[   28.222007] 
[   28.232422] Allocated by task 313:
[   28.232643]  kasan_save_stack+0x45/0x70
[   28.232850]  kasan_save_track+0x18/0x40
[   28.232993]  kasan_save_alloc_info+0x3b/0x50
[   28.233243]  __kasan_kmalloc+0xb7/0xc0
[   28.233878]  __kmalloc_cache_noprof+0x189/0x420
[   28.234122]  kasan_atomics+0x95/0x310
[   28.234327]  kunit_try_run_case+0x1a5/0x480
[   28.234611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.235034]  kthread+0x337/0x6f0
[   28.235354]  ret_from_fork+0x116/0x1d0
[   28.235544]  ret_from_fork_asm+0x1a/0x30
[   28.235735] 
[   28.235869] The buggy address belongs to the object at ffff8881058a7e80
[   28.235869]  which belongs to the cache kmalloc-64 of size 64
[   28.236325] The buggy address is located 0 bytes to the right of
[   28.236325]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.237295] 
[   28.237397] The buggy address belongs to the physical page:
[   28.237597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.238125] flags: 0x200000000000000(node=0|zone=2)
[   28.238358] page_type: f5(slab)
[   28.238681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.239144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.239426] page dumped because: kasan: bad access detected
[   28.239877] 
[   28.239975] Memory state around the buggy address:
[   28.240161]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.240692]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.241006] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.241401]                                      ^
[   28.241776]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.242040]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.242499] ==================================================================
[   27.473954] ==================================================================
[   27.475688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   27.476847] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.477249] 
[   27.477386] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.477439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.477452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.477526] Call Trace:
[   27.477579]  <TASK>
[   27.477597]  dump_stack_lvl+0x73/0xb0
[   27.477632]  print_report+0xd1/0x640
[   27.477655]  ? __virt_addr_valid+0x1db/0x2d0
[   27.477681]  ? kasan_atomics_helper+0x4bbc/0x5450
[   27.477703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.477760]  ? kasan_atomics_helper+0x4bbc/0x5450
[   27.477784]  kasan_report+0x141/0x180
[   27.477807]  ? kasan_atomics_helper+0x4bbc/0x5450
[   27.477845]  __asan_report_load4_noabort+0x18/0x20
[   27.477870]  kasan_atomics_helper+0x4bbc/0x5450
[   27.477894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.477918]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.477976]  ? kasan_atomics+0x152/0x310
[   27.478004]  kasan_atomics+0x1dc/0x310
[   27.478027]  ? __pfx_kasan_atomics+0x10/0x10
[   27.478052]  ? __pfx_read_tsc+0x10/0x10
[   27.478075]  ? ktime_get_ts64+0x86/0x230
[   27.478129]  kunit_try_run_case+0x1a5/0x480
[   27.478180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.478227]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.478265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.478291]  ? __kthread_parkme+0x82/0x180
[   27.478312]  ? preempt_count_sub+0x50/0x80
[   27.478336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.478360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.478385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.478409]  kthread+0x337/0x6f0
[   27.478430]  ? trace_preempt_on+0x20/0xc0
[   27.478453]  ? __pfx_kthread+0x10/0x10
[   27.478492]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.478516]  ? calculate_sigpending+0x7b/0xa0
[   27.478541]  ? __pfx_kthread+0x10/0x10
[   27.478563]  ret_from_fork+0x116/0x1d0
[   27.478583]  ? __pfx_kthread+0x10/0x10
[   27.478604]  ret_from_fork_asm+0x1a/0x30
[   27.478635]  </TASK>
[   27.478647] 
[   27.489311] Allocated by task 313:
[   27.489517]  kasan_save_stack+0x45/0x70
[   27.489824]  kasan_save_track+0x18/0x40
[   27.489977]  kasan_save_alloc_info+0x3b/0x50
[   27.490123]  __kasan_kmalloc+0xb7/0xc0
[   27.490402]  __kmalloc_cache_noprof+0x189/0x420
[   27.491005]  kasan_atomics+0x95/0x310
[   27.491219]  kunit_try_run_case+0x1a5/0x480
[   27.491552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.491862]  kthread+0x337/0x6f0
[   27.492048]  ret_from_fork+0x116/0x1d0
[   27.492241]  ret_from_fork_asm+0x1a/0x30
[   27.492525] 
[   27.492636] The buggy address belongs to the object at ffff8881058a7e80
[   27.492636]  which belongs to the cache kmalloc-64 of size 64
[   27.493336] The buggy address is located 0 bytes to the right of
[   27.493336]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.494046] 
[   27.494154] The buggy address belongs to the physical page:
[   27.494455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.495042] flags: 0x200000000000000(node=0|zone=2)
[   27.495383] page_type: f5(slab)
[   27.495512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.496091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.496529] page dumped because: kasan: bad access detected
[   27.496732] 
[   27.496886] Memory state around the buggy address:
[   27.497111]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.497439]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.497846] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.498200]                                      ^
[   27.498429]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.498893]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.499280] ==================================================================
[   29.149998] ==================================================================
[   29.150502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   29.151073] Read of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   29.151583] 
[   29.151791] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.151851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.151867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.151891] Call Trace:
[   29.151908]  <TASK>
[   29.151925]  dump_stack_lvl+0x73/0xb0
[   29.151954]  print_report+0xd1/0x640
[   29.151979]  ? __virt_addr_valid+0x1db/0x2d0
[   29.152004]  ? kasan_atomics_helper+0x5115/0x5450
[   29.152027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.152055]  ? kasan_atomics_helper+0x5115/0x5450
[   29.152103]  kasan_report+0x141/0x180
[   29.152127]  ? kasan_atomics_helper+0x5115/0x5450
[   29.152156]  __asan_report_load8_noabort+0x18/0x20
[   29.152194]  kasan_atomics_helper+0x5115/0x5450
[   29.152218]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.152242]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.152269]  ? kasan_atomics+0x152/0x310
[   29.152298]  kasan_atomics+0x1dc/0x310
[   29.152323]  ? __pfx_kasan_atomics+0x10/0x10
[   29.152350]  ? __pfx_read_tsc+0x10/0x10
[   29.152375]  ? ktime_get_ts64+0x86/0x230
[   29.152401]  kunit_try_run_case+0x1a5/0x480
[   29.152429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.152454]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.152496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.152525]  ? __kthread_parkme+0x82/0x180
[   29.152547]  ? preempt_count_sub+0x50/0x80
[   29.152572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.152599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.152625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.152651]  kthread+0x337/0x6f0
[   29.152672]  ? trace_preempt_on+0x20/0xc0
[   29.152697]  ? __pfx_kthread+0x10/0x10
[   29.152720]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.152746]  ? calculate_sigpending+0x7b/0xa0
[   29.152772]  ? __pfx_kthread+0x10/0x10
[   29.152796]  ret_from_fork+0x116/0x1d0
[   29.152817]  ? __pfx_kthread+0x10/0x10
[   29.152850]  ret_from_fork_asm+0x1a/0x30
[   29.152888]  </TASK>
[   29.152900] 
[   29.164759] Allocated by task 313:
[   29.164922]  kasan_save_stack+0x45/0x70
[   29.165067]  kasan_save_track+0x18/0x40
[   29.165298]  kasan_save_alloc_info+0x3b/0x50
[   29.165671]  __kasan_kmalloc+0xb7/0xc0
[   29.166084]  __kmalloc_cache_noprof+0x189/0x420
[   29.166590]  kasan_atomics+0x95/0x310
[   29.166990]  kunit_try_run_case+0x1a5/0x480
[   29.167448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.167965]  kthread+0x337/0x6f0
[   29.168284]  ret_from_fork+0x116/0x1d0
[   29.168667]  ret_from_fork_asm+0x1a/0x30
[   29.169083] 
[   29.169241] The buggy address belongs to the object at ffff8881058a7e80
[   29.169241]  which belongs to the cache kmalloc-64 of size 64
[   29.170008] The buggy address is located 0 bytes to the right of
[   29.170008]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   29.170411] 
[   29.170483] The buggy address belongs to the physical page:
[   29.170686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   29.171358] flags: 0x200000000000000(node=0|zone=2)
[   29.171781] page_type: f5(slab)
[   29.172298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.172708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.173438] page dumped because: kasan: bad access detected
[   29.173999] 
[   29.174076] Memory state around the buggy address:
[   29.174353]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.175036]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.175535] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.176151]                                      ^
[   29.176385]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.176900]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.177688] ==================================================================
[   28.694579] ==================================================================
[   28.694874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   28.695402] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.696036] 
[   28.696141] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.696192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.696208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.696230] Call Trace:
[   28.696247]  <TASK>
[   28.696265]  dump_stack_lvl+0x73/0xb0
[   28.696295]  print_report+0xd1/0x640
[   28.696319]  ? __virt_addr_valid+0x1db/0x2d0
[   28.696346]  ? kasan_atomics_helper+0x1a7f/0x5450
[   28.696368]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.696397]  ? kasan_atomics_helper+0x1a7f/0x5450
[   28.696422]  kasan_report+0x141/0x180
[   28.696446]  ? kasan_atomics_helper+0x1a7f/0x5450
[   28.696487]  kasan_check_range+0x10c/0x1c0
[   28.696513]  __kasan_check_write+0x18/0x20
[   28.696539]  kasan_atomics_helper+0x1a7f/0x5450
[   28.696564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.696588]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.696616]  ? kasan_atomics+0x152/0x310
[   28.696645]  kasan_atomics+0x1dc/0x310
[   28.696670]  ? __pfx_kasan_atomics+0x10/0x10
[   28.696696]  ? __pfx_read_tsc+0x10/0x10
[   28.696719]  ? ktime_get_ts64+0x86/0x230
[   28.696745]  kunit_try_run_case+0x1a5/0x480
[   28.696771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.696796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.696823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.696862]  ? __kthread_parkme+0x82/0x180
[   28.696890]  ? preempt_count_sub+0x50/0x80
[   28.696915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.696941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.696967]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.696996]  kthread+0x337/0x6f0
[   28.697018]  ? trace_preempt_on+0x20/0xc0
[   28.697045]  ? __pfx_kthread+0x10/0x10
[   28.697067]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.697093]  ? calculate_sigpending+0x7b/0xa0
[   28.697118]  ? __pfx_kthread+0x10/0x10
[   28.697142]  ret_from_fork+0x116/0x1d0
[   28.697385]  ? __pfx_kthread+0x10/0x10
[   28.697417]  ret_from_fork_asm+0x1a/0x30
[   28.697452]  </TASK>
[   28.697464] 
[   28.713903] Allocated by task 313:
[   28.714044]  kasan_save_stack+0x45/0x70
[   28.714213]  kasan_save_track+0x18/0x40
[   28.714618]  kasan_save_alloc_info+0x3b/0x50
[   28.715067]  __kasan_kmalloc+0xb7/0xc0
[   28.715494]  __kmalloc_cache_noprof+0x189/0x420
[   28.715948]  kasan_atomics+0x95/0x310
[   28.716342]  kunit_try_run_case+0x1a5/0x480
[   28.716739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.717020]  kthread+0x337/0x6f0
[   28.717348]  ret_from_fork+0x116/0x1d0
[   28.717742]  ret_from_fork_asm+0x1a/0x30
[   28.718173] 
[   28.718283] The buggy address belongs to the object at ffff8881058a7e80
[   28.718283]  which belongs to the cache kmalloc-64 of size 64
[   28.719234] The buggy address is located 0 bytes to the right of
[   28.719234]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.720401] 
[   28.720654] The buggy address belongs to the physical page:
[   28.720842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.721129] flags: 0x200000000000000(node=0|zone=2)
[   28.721614] page_type: f5(slab)
[   28.722014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.722843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.723615] page dumped because: kasan: bad access detected
[   28.724198] 
[   28.724352] Memory state around the buggy address:
[   28.724855]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.725411]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.725712] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.725939]                                      ^
[   28.726091]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.726355]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.726631] ==================================================================
[   27.638233] ==================================================================
[   27.638610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   27.638963] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.639294] 
[   27.639380] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.639439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.639519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.639542] Call Trace:
[   27.639558]  <TASK>
[   27.639584]  dump_stack_lvl+0x73/0xb0
[   27.639613]  print_report+0xd1/0x640
[   27.639637]  ? __virt_addr_valid+0x1db/0x2d0
[   27.639674]  ? kasan_atomics_helper+0x4b3a/0x5450
[   27.639697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.639724]  ? kasan_atomics_helper+0x4b3a/0x5450
[   27.639748]  kasan_report+0x141/0x180
[   27.639772]  ? kasan_atomics_helper+0x4b3a/0x5450
[   27.639800]  __asan_report_store4_noabort+0x1b/0x30
[   27.639827]  kasan_atomics_helper+0x4b3a/0x5450
[   27.639863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.639888]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.639917]  ? kasan_atomics+0x152/0x310
[   27.639946]  kasan_atomics+0x1dc/0x310
[   27.639971]  ? __pfx_kasan_atomics+0x10/0x10
[   27.639996]  ? __pfx_read_tsc+0x10/0x10
[   27.640020]  ? ktime_get_ts64+0x86/0x230
[   27.640053]  kunit_try_run_case+0x1a5/0x480
[   27.640080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.640104]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.640142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.640170]  ? __kthread_parkme+0x82/0x180
[   27.640211]  ? preempt_count_sub+0x50/0x80
[   27.640235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.640261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.640287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.640313]  kthread+0x337/0x6f0
[   27.640334]  ? trace_preempt_on+0x20/0xc0
[   27.640359]  ? __pfx_kthread+0x10/0x10
[   27.640381]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.640407]  ? calculate_sigpending+0x7b/0xa0
[   27.640431]  ? __pfx_kthread+0x10/0x10
[   27.640510]  ret_from_fork+0x116/0x1d0
[   27.640533]  ? __pfx_kthread+0x10/0x10
[   27.640555]  ret_from_fork_asm+0x1a/0x30
[   27.640598]  </TASK>
[   27.640611] 
[   27.648884] Allocated by task 313:
[   27.649040]  kasan_save_stack+0x45/0x70
[   27.649283]  kasan_save_track+0x18/0x40
[   27.649548]  kasan_save_alloc_info+0x3b/0x50
[   27.649785]  __kasan_kmalloc+0xb7/0xc0
[   27.649972]  __kmalloc_cache_noprof+0x189/0x420
[   27.650189]  kasan_atomics+0x95/0x310
[   27.650394]  kunit_try_run_case+0x1a5/0x480
[   27.650620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.650896]  kthread+0x337/0x6f0
[   27.651067]  ret_from_fork+0x116/0x1d0
[   27.651256]  ret_from_fork_asm+0x1a/0x30
[   27.651500] 
[   27.651628] The buggy address belongs to the object at ffff8881058a7e80
[   27.651628]  which belongs to the cache kmalloc-64 of size 64
[   27.652060] The buggy address is located 0 bytes to the right of
[   27.652060]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.652450] 
[   27.652519] The buggy address belongs to the physical page:
[   27.652856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.653247] flags: 0x200000000000000(node=0|zone=2)
[   27.653635] page_type: f5(slab)
[   27.653814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.654137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.654546] page dumped because: kasan: bad access detected
[   27.654774] 
[   27.654880] Memory state around the buggy address:
[   27.655111]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.655357]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.655771] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.656102]                                      ^
[   27.656359]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.656741]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.657069] ==================================================================
[   27.553308] ==================================================================
[   27.553789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   27.554126] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.554559] 
[   27.554674] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.554725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.554740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.554828] Call Trace:
[   27.554857]  <TASK>
[   27.554874]  dump_stack_lvl+0x73/0xb0
[   27.554904]  print_report+0xd1/0x640
[   27.554929]  ? __virt_addr_valid+0x1db/0x2d0
[   27.554954]  ? kasan_atomics_helper+0x4b6e/0x5450
[   27.554978]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.555007]  ? kasan_atomics_helper+0x4b6e/0x5450
[   27.555031]  kasan_report+0x141/0x180
[   27.555055]  ? kasan_atomics_helper+0x4b6e/0x5450
[   27.555082]  __asan_report_store4_noabort+0x1b/0x30
[   27.555110]  kasan_atomics_helper+0x4b6e/0x5450
[   27.555135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.555160]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.555223]  ? kasan_atomics+0x152/0x310
[   27.555253]  kasan_atomics+0x1dc/0x310
[   27.555278]  ? __pfx_kasan_atomics+0x10/0x10
[   27.555304]  ? __pfx_read_tsc+0x10/0x10
[   27.555328]  ? ktime_get_ts64+0x86/0x230
[   27.555354]  kunit_try_run_case+0x1a5/0x480
[   27.555381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.555422]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.555449]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.555477]  ? __kthread_parkme+0x82/0x180
[   27.555499]  ? preempt_count_sub+0x50/0x80
[   27.555567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.555594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.555620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.555645]  kthread+0x337/0x6f0
[   27.555667]  ? trace_preempt_on+0x20/0xc0
[   27.555692]  ? __pfx_kthread+0x10/0x10
[   27.555715]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.555740]  ? calculate_sigpending+0x7b/0xa0
[   27.555765]  ? __pfx_kthread+0x10/0x10
[   27.555789]  ret_from_fork+0x116/0x1d0
[   27.555810]  ? __pfx_kthread+0x10/0x10
[   27.555846]  ret_from_fork_asm+0x1a/0x30
[   27.555879]  </TASK>
[   27.555893] 
[   27.564078] Allocated by task 313:
[   27.564214]  kasan_save_stack+0x45/0x70
[   27.564586]  kasan_save_track+0x18/0x40
[   27.564807]  kasan_save_alloc_info+0x3b/0x50
[   27.565040]  __kasan_kmalloc+0xb7/0xc0
[   27.565282]  __kmalloc_cache_noprof+0x189/0x420
[   27.565446]  kasan_atomics+0x95/0x310
[   27.565583]  kunit_try_run_case+0x1a5/0x480
[   27.565730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.565956]  kthread+0x337/0x6f0
[   27.566124]  ret_from_fork+0x116/0x1d0
[   27.566384]  ret_from_fork_asm+0x1a/0x30
[   27.566582] 
[   27.566675] The buggy address belongs to the object at ffff8881058a7e80
[   27.566675]  which belongs to the cache kmalloc-64 of size 64
[   27.567958] The buggy address is located 0 bytes to the right of
[   27.567958]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.569285] 
[   27.569378] The buggy address belongs to the physical page:
[   27.570087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.570768] flags: 0x200000000000000(node=0|zone=2)
[   27.571242] page_type: f5(slab)
[   27.571410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.572061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.572877] page dumped because: kasan: bad access detected
[   27.573282] 
[   27.573498] Memory state around the buggy address:
[   27.573724]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.574022]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.574696] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.575399]                                      ^
[   27.575933]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.576392]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.576888] ==================================================================
[   27.826975] ==================================================================
[   27.827284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   27.827732] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.828064] 
[   27.828177] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.828229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.828244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.828267] Call Trace:
[   27.828284]  <TASK>
[   27.828300]  dump_stack_lvl+0x73/0xb0
[   27.828331]  print_report+0xd1/0x640
[   27.828356]  ? __virt_addr_valid+0x1db/0x2d0
[   27.828381]  ? kasan_atomics_helper+0x8f9/0x5450
[   27.828405]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.828434]  ? kasan_atomics_helper+0x8f9/0x5450
[   27.828512]  kasan_report+0x141/0x180
[   27.828540]  ? kasan_atomics_helper+0x8f9/0x5450
[   27.828568]  kasan_check_range+0x10c/0x1c0
[   27.828595]  __kasan_check_write+0x18/0x20
[   27.828620]  kasan_atomics_helper+0x8f9/0x5450
[   27.828645]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.828669]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.828696]  ? kasan_atomics+0x152/0x310
[   27.828725]  kasan_atomics+0x1dc/0x310
[   27.828750]  ? __pfx_kasan_atomics+0x10/0x10
[   27.828776]  ? __pfx_read_tsc+0x10/0x10
[   27.828800]  ? ktime_get_ts64+0x86/0x230
[   27.828826]  kunit_try_run_case+0x1a5/0x480
[   27.828873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.828898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.828926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.828952]  ? __kthread_parkme+0x82/0x180
[   27.828974]  ? preempt_count_sub+0x50/0x80
[   27.828999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.829025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.829050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.829076]  kthread+0x337/0x6f0
[   27.829097]  ? trace_preempt_on+0x20/0xc0
[   27.829121]  ? __pfx_kthread+0x10/0x10
[   27.829144]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.829182]  ? calculate_sigpending+0x7b/0xa0
[   27.829209]  ? __pfx_kthread+0x10/0x10
[   27.829235]  ret_from_fork+0x116/0x1d0
[   27.829259]  ? __pfx_kthread+0x10/0x10
[   27.829282]  ret_from_fork_asm+0x1a/0x30
[   27.829315]  </TASK>
[   27.829328] 
[   27.839277] Allocated by task 313:
[   27.839899]  kasan_save_stack+0x45/0x70
[   27.840140]  kasan_save_track+0x18/0x40
[   27.840343]  kasan_save_alloc_info+0x3b/0x50
[   27.840558]  __kasan_kmalloc+0xb7/0xc0
[   27.840751]  __kmalloc_cache_noprof+0x189/0x420
[   27.840996]  kasan_atomics+0x95/0x310
[   27.841175]  kunit_try_run_case+0x1a5/0x480
[   27.841375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.841633]  kthread+0x337/0x6f0
[   27.841792]  ret_from_fork+0x116/0x1d0
[   27.842228]  ret_from_fork_asm+0x1a/0x30
[   27.842400] 
[   27.842566] The buggy address belongs to the object at ffff8881058a7e80
[   27.842566]  which belongs to the cache kmalloc-64 of size 64
[   27.843269] The buggy address is located 0 bytes to the right of
[   27.843269]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.843909] 
[   27.844043] The buggy address belongs to the physical page:
[   27.844358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.844849] flags: 0x200000000000000(node=0|zone=2)
[   27.845096] page_type: f5(slab)
[   27.845291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.845730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.846119] page dumped because: kasan: bad access detected
[   27.846664] 
[   27.846795] Memory state around the buggy address:
[   27.847031]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.847423]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.847807] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.848161]                                      ^
[   27.848354]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.848807]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.849147] ==================================================================
[   28.907726] ==================================================================
[   28.908066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   28.908429] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.908775] 
[   28.908893] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.908943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.908959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.908982] Call Trace:
[   28.908999]  <TASK>
[   28.909015]  dump_stack_lvl+0x73/0xb0
[   28.909044]  print_report+0xd1/0x640
[   28.909069]  ? __virt_addr_valid+0x1db/0x2d0
[   28.909095]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.909118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.909186]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.909226]  kasan_report+0x141/0x180
[   28.909264]  ? kasan_atomics_helper+0x1f43/0x5450
[   28.909293]  kasan_check_range+0x10c/0x1c0
[   28.909319]  __kasan_check_write+0x18/0x20
[   28.909344]  kasan_atomics_helper+0x1f43/0x5450
[   28.909368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.909393]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.909419]  ? kasan_atomics+0x152/0x310
[   28.909465]  kasan_atomics+0x1dc/0x310
[   28.909491]  ? __pfx_kasan_atomics+0x10/0x10
[   28.909517]  ? __pfx_read_tsc+0x10/0x10
[   28.909541]  ? ktime_get_ts64+0x86/0x230
[   28.909566]  kunit_try_run_case+0x1a5/0x480
[   28.909592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.909617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.909644]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.909670]  ? __kthread_parkme+0x82/0x180
[   28.909692]  ? preempt_count_sub+0x50/0x80
[   28.909717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.909742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.909768]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.909794]  kthread+0x337/0x6f0
[   28.909815]  ? trace_preempt_on+0x20/0xc0
[   28.909850]  ? __pfx_kthread+0x10/0x10
[   28.909873]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.909899]  ? calculate_sigpending+0x7b/0xa0
[   28.909924]  ? __pfx_kthread+0x10/0x10
[   28.909947]  ret_from_fork+0x116/0x1d0
[   28.909987]  ? __pfx_kthread+0x10/0x10
[   28.910010]  ret_from_fork_asm+0x1a/0x30
[   28.910042]  </TASK>
[   28.910054] 
[   28.918272] Allocated by task 313:
[   28.918398]  kasan_save_stack+0x45/0x70
[   28.918792]  kasan_save_track+0x18/0x40
[   28.919204]  kasan_save_alloc_info+0x3b/0x50
[   28.919435]  __kasan_kmalloc+0xb7/0xc0
[   28.919670]  __kmalloc_cache_noprof+0x189/0x420
[   28.919952]  kasan_atomics+0x95/0x310
[   28.920177]  kunit_try_run_case+0x1a5/0x480
[   28.920411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.921027]  kthread+0x337/0x6f0
[   28.921710]  ret_from_fork+0x116/0x1d0
[   28.921920]  ret_from_fork_asm+0x1a/0x30
[   28.922182] 
[   28.922302] The buggy address belongs to the object at ffff8881058a7e80
[   28.922302]  which belongs to the cache kmalloc-64 of size 64
[   28.924243] The buggy address is located 0 bytes to the right of
[   28.924243]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.925773] 
[   28.925875] The buggy address belongs to the physical page:
[   28.926061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.926328] flags: 0x200000000000000(node=0|zone=2)
[   28.926843] page_type: f5(slab)
[   28.927243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.928127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.928931] page dumped because: kasan: bad access detected
[   28.929327] 
[   28.929399] Memory state around the buggy address:
[   28.929843]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.930487]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.930954] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.931202]                                      ^
[   28.931692]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.932430]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.933108] ==================================================================
[   28.338566] ==================================================================
[   28.339959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   28.341204] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.341452] 
[   28.341897] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.341953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.341967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.342126] Call Trace:
[   28.342145]  <TASK>
[   28.342187]  dump_stack_lvl+0x73/0xb0
[   28.342220]  print_report+0xd1/0x640
[   28.342247]  ? __virt_addr_valid+0x1db/0x2d0
[   28.342272]  ? kasan_atomics_helper+0x49ce/0x5450
[   28.342296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.342323]  ? kasan_atomics_helper+0x49ce/0x5450
[   28.342353]  kasan_report+0x141/0x180
[   28.342377]  ? kasan_atomics_helper+0x49ce/0x5450
[   28.342406]  __asan_report_load4_noabort+0x18/0x20
[   28.342432]  kasan_atomics_helper+0x49ce/0x5450
[   28.342483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.342508]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.342535]  ? kasan_atomics+0x152/0x310
[   28.342562]  kasan_atomics+0x1dc/0x310
[   28.342587]  ? __pfx_kasan_atomics+0x10/0x10
[   28.342613]  ? __pfx_read_tsc+0x10/0x10
[   28.342636]  ? ktime_get_ts64+0x86/0x230
[   28.342662]  kunit_try_run_case+0x1a5/0x480
[   28.342689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.342714]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.342741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.342767]  ? __kthread_parkme+0x82/0x180
[   28.342788]  ? preempt_count_sub+0x50/0x80
[   28.342813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.342849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.342874]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.342900]  kthread+0x337/0x6f0
[   28.342921]  ? trace_preempt_on+0x20/0xc0
[   28.342945]  ? __pfx_kthread+0x10/0x10
[   28.342968]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.342993]  ? calculate_sigpending+0x7b/0xa0
[   28.343018]  ? __pfx_kthread+0x10/0x10
[   28.343041]  ret_from_fork+0x116/0x1d0
[   28.343064]  ? __pfx_kthread+0x10/0x10
[   28.343086]  ret_from_fork_asm+0x1a/0x30
[   28.343119]  </TASK>
[   28.343132] 
[   28.360456] Allocated by task 313:
[   28.361081]  kasan_save_stack+0x45/0x70
[   28.361308]  kasan_save_track+0x18/0x40
[   28.361452]  kasan_save_alloc_info+0x3b/0x50
[   28.361612]  __kasan_kmalloc+0xb7/0xc0
[   28.362313]  __kmalloc_cache_noprof+0x189/0x420
[   28.362916]  kasan_atomics+0x95/0x310
[   28.363418]  kunit_try_run_case+0x1a5/0x480
[   28.364062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.364512]  kthread+0x337/0x6f0
[   28.364649]  ret_from_fork+0x116/0x1d0
[   28.364788]  ret_from_fork_asm+0x1a/0x30
[   28.364946] 
[   28.365020] The buggy address belongs to the object at ffff8881058a7e80
[   28.365020]  which belongs to the cache kmalloc-64 of size 64
[   28.365933] The buggy address is located 0 bytes to the right of
[   28.365933]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.366855] 
[   28.366966] The buggy address belongs to the physical page:
[   28.367432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.367923] flags: 0x200000000000000(node=0|zone=2)
[   28.368325] page_type: f5(slab)
[   28.368648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.369001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.369748] page dumped because: kasan: bad access detected
[   28.370055] 
[   28.370301] Memory state around the buggy address:
[   28.370780]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.371283]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.371927] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.372394]                                      ^
[   28.373040]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.373756]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.374351] ==================================================================
[   28.751258] ==================================================================
[   28.751673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   28.752290] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.752823] 
[   28.753001] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.753091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.753106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.753129] Call Trace:
[   28.753148]  <TASK>
[   28.753165]  dump_stack_lvl+0x73/0xb0
[   28.753195]  print_report+0xd1/0x640
[   28.753220]  ? __virt_addr_valid+0x1db/0x2d0
[   28.753281]  ? kasan_atomics_helper+0x1c18/0x5450
[   28.753307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.753337]  ? kasan_atomics_helper+0x1c18/0x5450
[   28.753361]  kasan_report+0x141/0x180
[   28.753387]  ? kasan_atomics_helper+0x1c18/0x5450
[   28.753444]  kasan_check_range+0x10c/0x1c0
[   28.753471]  __kasan_check_write+0x18/0x20
[   28.753496]  kasan_atomics_helper+0x1c18/0x5450
[   28.753590]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.753615]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.753681]  ? kasan_atomics+0x152/0x310
[   28.753710]  kasan_atomics+0x1dc/0x310
[   28.753736]  ? __pfx_kasan_atomics+0x10/0x10
[   28.753763]  ? __pfx_read_tsc+0x10/0x10
[   28.753788]  ? ktime_get_ts64+0x86/0x230
[   28.753814]  kunit_try_run_case+0x1a5/0x480
[   28.753886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.753911]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.753939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.753965]  ? __kthread_parkme+0x82/0x180
[   28.753987]  ? preempt_count_sub+0x50/0x80
[   28.754043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.754068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.754094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.754120]  kthread+0x337/0x6f0
[   28.754141]  ? trace_preempt_on+0x20/0xc0
[   28.754178]  ? __pfx_kthread+0x10/0x10
[   28.754228]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.754256]  ? calculate_sigpending+0x7b/0xa0
[   28.754281]  ? __pfx_kthread+0x10/0x10
[   28.754304]  ret_from_fork+0x116/0x1d0
[   28.754326]  ? __pfx_kthread+0x10/0x10
[   28.754349]  ret_from_fork_asm+0x1a/0x30
[   28.754383]  </TASK>
[   28.754396] 
[   28.766733] Allocated by task 313:
[   28.767091]  kasan_save_stack+0x45/0x70
[   28.767395]  kasan_save_track+0x18/0x40
[   28.767747]  kasan_save_alloc_info+0x3b/0x50
[   28.768145]  __kasan_kmalloc+0xb7/0xc0
[   28.768354]  __kmalloc_cache_noprof+0x189/0x420
[   28.768534]  kasan_atomics+0x95/0x310
[   28.768728]  kunit_try_run_case+0x1a5/0x480
[   28.768960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.769762]  kthread+0x337/0x6f0
[   28.769965]  ret_from_fork+0x116/0x1d0
[   28.770116]  ret_from_fork_asm+0x1a/0x30
[   28.770534] 
[   28.770962] The buggy address belongs to the object at ffff8881058a7e80
[   28.770962]  which belongs to the cache kmalloc-64 of size 64
[   28.771677] The buggy address is located 0 bytes to the right of
[   28.771677]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.772403] 
[   28.772851] The buggy address belongs to the physical page:
[   28.773114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.773664] flags: 0x200000000000000(node=0|zone=2)
[   28.774020] page_type: f5(slab)
[   28.774347] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.775007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.775473] page dumped because: kasan: bad access detected
[   28.775819] 
[   28.775909] Memory state around the buggy address:
[   28.776460]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.776961]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.777484] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.777802]                                      ^
[   28.778021]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.778584]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.778982] ==================================================================
[   28.834632] ==================================================================
[   28.834965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   28.835283] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.835573] 
[   28.835681] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.835732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.835747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.835771] Call Trace:
[   28.835799]  <TASK>
[   28.835815]  dump_stack_lvl+0x73/0xb0
[   28.835858]  print_report+0xd1/0x640
[   28.835886]  ? __virt_addr_valid+0x1db/0x2d0
[   28.835913]  ? kasan_atomics_helper+0x1d7a/0x5450
[   28.835936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.835963]  ? kasan_atomics_helper+0x1d7a/0x5450
[   28.835988]  kasan_report+0x141/0x180
[   28.836013]  ? kasan_atomics_helper+0x1d7a/0x5450
[   28.836043]  kasan_check_range+0x10c/0x1c0
[   28.836071]  __kasan_check_write+0x18/0x20
[   28.836103]  kasan_atomics_helper+0x1d7a/0x5450
[   28.836137]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.836171]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.836197]  ? kasan_atomics+0x152/0x310
[   28.836225]  kasan_atomics+0x1dc/0x310
[   28.836251]  ? __pfx_kasan_atomics+0x10/0x10
[   28.836277]  ? __pfx_read_tsc+0x10/0x10
[   28.836300]  ? ktime_get_ts64+0x86/0x230
[   28.836326]  kunit_try_run_case+0x1a5/0x480
[   28.836353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.836380]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.836408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.836435]  ? __kthread_parkme+0x82/0x180
[   28.836456]  ? preempt_count_sub+0x50/0x80
[   28.836487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.836512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.836540]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.836565]  kthread+0x337/0x6f0
[   28.836587]  ? trace_preempt_on+0x20/0xc0
[   28.836612]  ? __pfx_kthread+0x10/0x10
[   28.836634]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.836659]  ? calculate_sigpending+0x7b/0xa0
[   28.836683]  ? __pfx_kthread+0x10/0x10
[   28.836706]  ret_from_fork+0x116/0x1d0
[   28.836727]  ? __pfx_kthread+0x10/0x10
[   28.836749]  ret_from_fork_asm+0x1a/0x30
[   28.836781]  </TASK>
[   28.836793] 
[   28.847426] Allocated by task 313:
[   28.847745]  kasan_save_stack+0x45/0x70
[   28.848138]  kasan_save_track+0x18/0x40
[   28.848655]  kasan_save_alloc_info+0x3b/0x50
[   28.848913]  __kasan_kmalloc+0xb7/0xc0
[   28.849093]  __kmalloc_cache_noprof+0x189/0x420
[   28.849553]  kasan_atomics+0x95/0x310
[   28.849917]  kunit_try_run_case+0x1a5/0x480
[   28.850129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.850354]  kthread+0x337/0x6f0
[   28.850749]  ret_from_fork+0x116/0x1d0
[   28.851102]  ret_from_fork_asm+0x1a/0x30
[   28.851448] 
[   28.851608] The buggy address belongs to the object at ffff8881058a7e80
[   28.851608]  which belongs to the cache kmalloc-64 of size 64
[   28.852070] The buggy address is located 0 bytes to the right of
[   28.852070]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.853133] 
[   28.853481] The buggy address belongs to the physical page:
[   28.853891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.854369] flags: 0x200000000000000(node=0|zone=2)
[   28.854819] page_type: f5(slab)
[   28.855232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.855916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.856395] page dumped because: kasan: bad access detected
[   28.856851] 
[   28.857112] Memory state around the buggy address:
[   28.857344]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.857867]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.858157] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.858431]                                      ^
[   28.858940]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.859425]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.859883] ==================================================================
[   27.596748] ==================================================================
[   27.597107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   27.597666] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.598030] 
[   27.598142] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.598192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.598206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.598230] Call Trace:
[   27.598248]  <TASK>
[   27.598263]  dump_stack_lvl+0x73/0xb0
[   27.598291]  print_report+0xd1/0x640
[   27.598316]  ? __virt_addr_valid+0x1db/0x2d0
[   27.598341]  ? kasan_atomics_helper+0x4b54/0x5450
[   27.598363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.598391]  ? kasan_atomics_helper+0x4b54/0x5450
[   27.598414]  kasan_report+0x141/0x180
[   27.598438]  ? kasan_atomics_helper+0x4b54/0x5450
[   27.598466]  __asan_report_load4_noabort+0x18/0x20
[   27.598491]  kasan_atomics_helper+0x4b54/0x5450
[   27.598517]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.598540]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.598565]  ? kasan_atomics+0x152/0x310
[   27.598593]  kasan_atomics+0x1dc/0x310
[   27.598618]  ? __pfx_kasan_atomics+0x10/0x10
[   27.598643]  ? __pfx_read_tsc+0x10/0x10
[   27.598667]  ? ktime_get_ts64+0x86/0x230
[   27.598693]  kunit_try_run_case+0x1a5/0x480
[   27.598720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.598744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.598771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.598798]  ? __kthread_parkme+0x82/0x180
[   27.598820]  ? preempt_count_sub+0x50/0x80
[   27.598856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.598883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.598909]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.598935]  kthread+0x337/0x6f0
[   27.598956]  ? trace_preempt_on+0x20/0xc0
[   27.598982]  ? __pfx_kthread+0x10/0x10
[   27.599004]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.599030]  ? calculate_sigpending+0x7b/0xa0
[   27.599056]  ? __pfx_kthread+0x10/0x10
[   27.599079]  ret_from_fork+0x116/0x1d0
[   27.599100]  ? __pfx_kthread+0x10/0x10
[   27.599123]  ret_from_fork_asm+0x1a/0x30
[   27.599156]  </TASK>
[   27.599168] 
[   27.609195] Allocated by task 313:
[   27.609531]  kasan_save_stack+0x45/0x70
[   27.609762]  kasan_save_track+0x18/0x40
[   27.609997]  kasan_save_alloc_info+0x3b/0x50
[   27.610213]  __kasan_kmalloc+0xb7/0xc0
[   27.610507]  __kmalloc_cache_noprof+0x189/0x420
[   27.610769]  kasan_atomics+0x95/0x310
[   27.610985]  kunit_try_run_case+0x1a5/0x480
[   27.611244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.611549]  kthread+0x337/0x6f0
[   27.611816]  ret_from_fork+0x116/0x1d0
[   27.612014]  ret_from_fork_asm+0x1a/0x30
[   27.612164] 
[   27.612237] The buggy address belongs to the object at ffff8881058a7e80
[   27.612237]  which belongs to the cache kmalloc-64 of size 64
[   27.612820] The buggy address is located 0 bytes to the right of
[   27.612820]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.613294] 
[   27.613394] The buggy address belongs to the physical page:
[   27.613861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.614292] flags: 0x200000000000000(node=0|zone=2)
[   27.614547] page_type: f5(slab)
[   27.614750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.615079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.615374] page dumped because: kasan: bad access detected
[   27.615713] 
[   27.615810] Memory state around the buggy address:
[   27.616010]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.616302]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.616698] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.617003]                                      ^
[   27.617251]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.617637]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.617966] ==================================================================
[   28.446550] ==================================================================
[   28.447251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   28.447909] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.448770] 
[   28.448995] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.449048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.449073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.449097] Call Trace:
[   28.449114]  <TASK>
[   28.449152]  dump_stack_lvl+0x73/0xb0
[   28.449184]  print_report+0xd1/0x640
[   28.449210]  ? __virt_addr_valid+0x1db/0x2d0
[   28.449238]  ? kasan_atomics_helper+0x50d4/0x5450
[   28.449263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.449291]  ? kasan_atomics_helper+0x50d4/0x5450
[   28.449314]  kasan_report+0x141/0x180
[   28.449339]  ? kasan_atomics_helper+0x50d4/0x5450
[   28.449367]  __asan_report_store8_noabort+0x1b/0x30
[   28.449395]  kasan_atomics_helper+0x50d4/0x5450
[   28.449429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.449453]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.449479]  ? kasan_atomics+0x152/0x310
[   28.449518]  kasan_atomics+0x1dc/0x310
[   28.449542]  ? __pfx_kasan_atomics+0x10/0x10
[   28.449583]  ? __pfx_read_tsc+0x10/0x10
[   28.449606]  ? ktime_get_ts64+0x86/0x230
[   28.449633]  kunit_try_run_case+0x1a5/0x480
[   28.449659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.449685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.449712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.449740]  ? __kthread_parkme+0x82/0x180
[   28.449762]  ? preempt_count_sub+0x50/0x80
[   28.449788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.449814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.449850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.449876]  kthread+0x337/0x6f0
[   28.449898]  ? trace_preempt_on+0x20/0xc0
[   28.449924]  ? __pfx_kthread+0x10/0x10
[   28.449946]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.449971]  ? calculate_sigpending+0x7b/0xa0
[   28.449997]  ? __pfx_kthread+0x10/0x10
[   28.450020]  ret_from_fork+0x116/0x1d0
[   28.450041]  ? __pfx_kthread+0x10/0x10
[   28.450063]  ret_from_fork_asm+0x1a/0x30
[   28.450096]  </TASK>
[   28.450108] 
[   28.464501] Allocated by task 313:
[   28.464749]  kasan_save_stack+0x45/0x70
[   28.465045]  kasan_save_track+0x18/0x40
[   28.465477]  kasan_save_alloc_info+0x3b/0x50
[   28.465959]  __kasan_kmalloc+0xb7/0xc0
[   28.466342]  __kmalloc_cache_noprof+0x189/0x420
[   28.466775]  kasan_atomics+0x95/0x310
[   28.467112]  kunit_try_run_case+0x1a5/0x480
[   28.467418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.467764]  kthread+0x337/0x6f0
[   28.468183]  ret_from_fork+0x116/0x1d0
[   28.468408]  ret_from_fork_asm+0x1a/0x30
[   28.468552] 
[   28.468622] The buggy address belongs to the object at ffff8881058a7e80
[   28.468622]  which belongs to the cache kmalloc-64 of size 64
[   28.469055] The buggy address is located 0 bytes to the right of
[   28.469055]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.469730] 
[   28.469802] The buggy address belongs to the physical page:
[   28.470067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.470385] flags: 0x200000000000000(node=0|zone=2)
[   28.470718] page_type: f5(slab)
[   28.470905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.471196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.471899] page dumped because: kasan: bad access detected
[   28.472074] 
[   28.472141] Memory state around the buggy address:
[   28.472345]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.473317]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.474050] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.474557]                                      ^
[   28.475046]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.475558]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.475862] ==================================================================
[   28.293211] ==================================================================
[   28.293848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   28.294518] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.294823] 
[   28.294948] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.294999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.295014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.295037] Call Trace:
[   28.295053]  <TASK>
[   28.295070]  dump_stack_lvl+0x73/0xb0
[   28.295100]  print_report+0xd1/0x640
[   28.295124]  ? __virt_addr_valid+0x1db/0x2d0
[   28.295150]  ? kasan_atomics_helper+0x49e8/0x5450
[   28.295173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.295200]  ? kasan_atomics_helper+0x49e8/0x5450
[   28.295225]  kasan_report+0x141/0x180
[   28.295250]  ? kasan_atomics_helper+0x49e8/0x5450
[   28.295278]  __asan_report_load4_noabort+0x18/0x20
[   28.295337]  kasan_atomics_helper+0x49e8/0x5450
[   28.295361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.295385]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.295411]  ? kasan_atomics+0x152/0x310
[   28.295439]  kasan_atomics+0x1dc/0x310
[   28.295463]  ? __pfx_kasan_atomics+0x10/0x10
[   28.295489]  ? __pfx_read_tsc+0x10/0x10
[   28.295512]  ? ktime_get_ts64+0x86/0x230
[   28.295552]  kunit_try_run_case+0x1a5/0x480
[   28.295581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.295605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.295632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.295660]  ? __kthread_parkme+0x82/0x180
[   28.295682]  ? preempt_count_sub+0x50/0x80
[   28.295706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.295733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.295759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.295785]  kthread+0x337/0x6f0
[   28.295807]  ? trace_preempt_on+0x20/0xc0
[   28.295845]  ? __pfx_kthread+0x10/0x10
[   28.295869]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.295896]  ? calculate_sigpending+0x7b/0xa0
[   28.295922]  ? __pfx_kthread+0x10/0x10
[   28.295946]  ret_from_fork+0x116/0x1d0
[   28.295969]  ? __pfx_kthread+0x10/0x10
[   28.295993]  ret_from_fork_asm+0x1a/0x30
[   28.296027]  </TASK>
[   28.296040] 
[   28.304712] Allocated by task 313:
[   28.304854]  kasan_save_stack+0x45/0x70
[   28.305002]  kasan_save_track+0x18/0x40
[   28.305302]  kasan_save_alloc_info+0x3b/0x50
[   28.305524]  __kasan_kmalloc+0xb7/0xc0
[   28.305710]  __kmalloc_cache_noprof+0x189/0x420
[   28.306042]  kasan_atomics+0x95/0x310
[   28.306226]  kunit_try_run_case+0x1a5/0x480
[   28.306430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.306654]  kthread+0x337/0x6f0
[   28.306775]  ret_from_fork+0x116/0x1d0
[   28.306916]  ret_from_fork_asm+0x1a/0x30
[   28.307053] 
[   28.307124] The buggy address belongs to the object at ffff8881058a7e80
[   28.307124]  which belongs to the cache kmalloc-64 of size 64
[   28.307634] The buggy address is located 0 bytes to the right of
[   28.307634]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.308240] 
[   28.308334] The buggy address belongs to the physical page:
[   28.308701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.308960] flags: 0x200000000000000(node=0|zone=2)
[   28.309121] page_type: f5(slab)
[   28.309237] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.309602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.310328] page dumped because: kasan: bad access detected
[   28.310649] 
[   28.310722] Memory state around the buggy address:
[   28.310956]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.311179]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.311397] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.311660]                                      ^
[   28.312112]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.312786]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.313115] ==================================================================
[   27.500197] ==================================================================
[   27.500779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   27.501095] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.501375] 
[   27.501482] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.501600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.501700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.501722] Call Trace:
[   27.501735]  <TASK>
[   27.501749]  dump_stack_lvl+0x73/0xb0
[   27.501778]  print_report+0xd1/0x640
[   27.501802]  ? __virt_addr_valid+0x1db/0x2d0
[   27.501826]  ? kasan_atomics_helper+0x4ba2/0x5450
[   27.501859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.501886]  ? kasan_atomics_helper+0x4ba2/0x5450
[   27.501908]  kasan_report+0x141/0x180
[   27.501932]  ? kasan_atomics_helper+0x4ba2/0x5450
[   27.501959]  __asan_report_store4_noabort+0x1b/0x30
[   27.501986]  kasan_atomics_helper+0x4ba2/0x5450
[   27.502010]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.502032]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.502057]  ? kasan_atomics+0x152/0x310
[   27.502084]  kasan_atomics+0x1dc/0x310
[   27.502107]  ? __pfx_kasan_atomics+0x10/0x10
[   27.502131]  ? __pfx_read_tsc+0x10/0x10
[   27.502154]  ? ktime_get_ts64+0x86/0x230
[   27.502227]  kunit_try_run_case+0x1a5/0x480
[   27.502254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.502278]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.502304]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.502330]  ? __kthread_parkme+0x82/0x180
[   27.502350]  ? preempt_count_sub+0x50/0x80
[   27.502373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.502397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.502421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.502447]  kthread+0x337/0x6f0
[   27.502507]  ? trace_preempt_on+0x20/0xc0
[   27.502532]  ? __pfx_kthread+0x10/0x10
[   27.502553]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.502578]  ? calculate_sigpending+0x7b/0xa0
[   27.502602]  ? __pfx_kthread+0x10/0x10
[   27.502624]  ret_from_fork+0x116/0x1d0
[   27.502645]  ? __pfx_kthread+0x10/0x10
[   27.502665]  ret_from_fork_asm+0x1a/0x30
[   27.502697]  </TASK>
[   27.502709] 
[   27.513689] Allocated by task 313:
[   27.513844]  kasan_save_stack+0x45/0x70
[   27.514324]  kasan_save_track+0x18/0x40
[   27.514921]  kasan_save_alloc_info+0x3b/0x50
[   27.515140]  __kasan_kmalloc+0xb7/0xc0
[   27.515294]  __kmalloc_cache_noprof+0x189/0x420
[   27.515760]  kasan_atomics+0x95/0x310
[   27.516048]  kunit_try_run_case+0x1a5/0x480
[   27.516356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.516555]  kthread+0x337/0x6f0
[   27.516926]  ret_from_fork+0x116/0x1d0
[   27.517284]  ret_from_fork_asm+0x1a/0x30
[   27.517632] 
[   27.517866] The buggy address belongs to the object at ffff8881058a7e80
[   27.517866]  which belongs to the cache kmalloc-64 of size 64
[   27.518612] The buggy address is located 0 bytes to the right of
[   27.518612]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.519314] 
[   27.519404] The buggy address belongs to the physical page:
[   27.519779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.520273] flags: 0x200000000000000(node=0|zone=2)
[   27.520512] page_type: f5(slab)
[   27.520668] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.521043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.521760] page dumped because: kasan: bad access detected
[   27.522175] 
[   27.522366] Memory state around the buggy address:
[   27.522803]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.523236]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.523736] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.524140]                                      ^
[   27.524441]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.524980]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.525451] ==================================================================
[   28.536616] ==================================================================
[   28.536894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   28.537501] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.537754] 
[   28.537856] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.537905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.537920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.537942] Call Trace:
[   28.537959]  <TASK>
[   28.537976]  dump_stack_lvl+0x73/0xb0
[   28.538006]  print_report+0xd1/0x640
[   28.538032]  ? __virt_addr_valid+0x1db/0x2d0
[   28.538058]  ? kasan_atomics_helper+0x16e7/0x5450
[   28.538082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.538110]  ? kasan_atomics_helper+0x16e7/0x5450
[   28.538134]  kasan_report+0x141/0x180
[   28.538158]  ? kasan_atomics_helper+0x16e7/0x5450
[   28.538197]  kasan_check_range+0x10c/0x1c0
[   28.538223]  __kasan_check_write+0x18/0x20
[   28.538249]  kasan_atomics_helper+0x16e7/0x5450
[   28.538274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.538298]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.538325]  ? kasan_atomics+0x152/0x310
[   28.538353]  kasan_atomics+0x1dc/0x310
[   28.538378]  ? __pfx_kasan_atomics+0x10/0x10
[   28.538404]  ? __pfx_read_tsc+0x10/0x10
[   28.538427]  ? ktime_get_ts64+0x86/0x230
[   28.538453]  kunit_try_run_case+0x1a5/0x480
[   28.538525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.538550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.538578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.538605]  ? __kthread_parkme+0x82/0x180
[   28.538627]  ? preempt_count_sub+0x50/0x80
[   28.538653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.538679]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.538705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.538731]  kthread+0x337/0x6f0
[   28.538753]  ? trace_preempt_on+0x20/0xc0
[   28.538778]  ? __pfx_kthread+0x10/0x10
[   28.538801]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.538827]  ? calculate_sigpending+0x7b/0xa0
[   28.538865]  ? __pfx_kthread+0x10/0x10
[   28.538889]  ret_from_fork+0x116/0x1d0
[   28.538910]  ? __pfx_kthread+0x10/0x10
[   28.538933]  ret_from_fork_asm+0x1a/0x30
[   28.538966]  </TASK>
[   28.538979] 
[   28.547441] Allocated by task 313:
[   28.547627]  kasan_save_stack+0x45/0x70
[   28.547779]  kasan_save_track+0x18/0x40
[   28.547931]  kasan_save_alloc_info+0x3b/0x50
[   28.548084]  __kasan_kmalloc+0xb7/0xc0
[   28.548249]  __kmalloc_cache_noprof+0x189/0x420
[   28.548624]  kasan_atomics+0x95/0x310
[   28.548820]  kunit_try_run_case+0x1a5/0x480
[   28.549044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.549296]  kthread+0x337/0x6f0
[   28.549504]  ret_from_fork+0x116/0x1d0
[   28.549649]  ret_from_fork_asm+0x1a/0x30
[   28.549848] 
[   28.549944] The buggy address belongs to the object at ffff8881058a7e80
[   28.549944]  which belongs to the cache kmalloc-64 of size 64
[   28.550451] The buggy address is located 0 bytes to the right of
[   28.550451]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.551005] 
[   28.551100] The buggy address belongs to the physical page:
[   28.551404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.551963] flags: 0x200000000000000(node=0|zone=2)
[   28.552240] page_type: f5(slab)
[   28.552402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.552723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.552977] page dumped because: kasan: bad access detected
[   28.553158] 
[   28.553226] Memory state around the buggy address:
[   28.553386]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.553791]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.554139] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.554454]                                      ^
[   28.554679]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.555051]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.555582] ==================================================================
[   27.945286] ==================================================================
[   27.945760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   27.946024] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.946403] 
[   27.946566] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.946632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.946647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.946682] Call Trace:
[   27.946701]  <TASK>
[   27.946717]  dump_stack_lvl+0x73/0xb0
[   27.946747]  print_report+0xd1/0x640
[   27.946772]  ? __virt_addr_valid+0x1db/0x2d0
[   27.946798]  ? kasan_atomics_helper+0xc70/0x5450
[   27.946820]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.946860]  ? kasan_atomics_helper+0xc70/0x5450
[   27.946883]  kasan_report+0x141/0x180
[   27.946908]  ? kasan_atomics_helper+0xc70/0x5450
[   27.946945]  kasan_check_range+0x10c/0x1c0
[   27.946971]  __kasan_check_write+0x18/0x20
[   27.947007]  kasan_atomics_helper+0xc70/0x5450
[   27.947041]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.947065]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.947091]  ? kasan_atomics+0x152/0x310
[   27.947130]  kasan_atomics+0x1dc/0x310
[   27.947155]  ? __pfx_kasan_atomics+0x10/0x10
[   27.947181]  ? __pfx_read_tsc+0x10/0x10
[   27.947204]  ? ktime_get_ts64+0x86/0x230
[   27.947231]  kunit_try_run_case+0x1a5/0x480
[   27.947258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.947282]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.947318]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.947345]  ? __kthread_parkme+0x82/0x180
[   27.947377]  ? preempt_count_sub+0x50/0x80
[   27.947403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.947429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.947455]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.947480]  kthread+0x337/0x6f0
[   27.947502]  ? trace_preempt_on+0x20/0xc0
[   27.947528]  ? __pfx_kthread+0x10/0x10
[   27.947551]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.947576]  ? calculate_sigpending+0x7b/0xa0
[   27.947602]  ? __pfx_kthread+0x10/0x10
[   27.947669]  ret_from_fork+0x116/0x1d0
[   27.947691]  ? __pfx_kthread+0x10/0x10
[   27.947732]  ret_from_fork_asm+0x1a/0x30
[   27.947765]  </TASK>
[   27.947777] 
[   27.959587] Allocated by task 313:
[   27.959809]  kasan_save_stack+0x45/0x70
[   27.960082]  kasan_save_track+0x18/0x40
[   27.960796]  kasan_save_alloc_info+0x3b/0x50
[   27.961678]  __kasan_kmalloc+0xb7/0xc0
[   27.961985]  __kmalloc_cache_noprof+0x189/0x420
[   27.962151]  kasan_atomics+0x95/0x310
[   27.962283]  kunit_try_run_case+0x1a5/0x480
[   27.962445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.963316]  kthread+0x337/0x6f0
[   27.963484]  ret_from_fork+0x116/0x1d0
[   27.963807]  ret_from_fork_asm+0x1a/0x30
[   27.964178] 
[   27.964343] The buggy address belongs to the object at ffff8881058a7e80
[   27.964343]  which belongs to the cache kmalloc-64 of size 64
[   27.964997] The buggy address is located 0 bytes to the right of
[   27.964997]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.965876] 
[   27.966080] The buggy address belongs to the physical page:
[   27.966613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.967657] flags: 0x200000000000000(node=0|zone=2)
[   27.968325] page_type: f5(slab)
[   27.968643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.968907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.969139] page dumped because: kasan: bad access detected
[   27.969610] 
[   27.969811] Memory state around the buggy address:
[   27.970285]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.971007]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.971642] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.972331]                                      ^
[   27.972963]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.973364]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.973957] ==================================================================
[   28.617326] ==================================================================
[   28.618494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   28.618983] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.619779] 
[   28.620022] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.620192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.620215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.620240] Call Trace:
[   28.620259]  <TASK>
[   28.620277]  dump_stack_lvl+0x73/0xb0
[   28.620308]  print_report+0xd1/0x640
[   28.620333]  ? __virt_addr_valid+0x1db/0x2d0
[   28.620397]  ? kasan_atomics_helper+0x18b1/0x5450
[   28.620420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.620448]  ? kasan_atomics_helper+0x18b1/0x5450
[   28.620472]  kasan_report+0x141/0x180
[   28.620497]  ? kasan_atomics_helper+0x18b1/0x5450
[   28.620524]  kasan_check_range+0x10c/0x1c0
[   28.620552]  __kasan_check_write+0x18/0x20
[   28.620576]  kasan_atomics_helper+0x18b1/0x5450
[   28.620601]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.620625]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.620651]  ? kasan_atomics+0x152/0x310
[   28.620695]  kasan_atomics+0x1dc/0x310
[   28.620719]  ? __pfx_kasan_atomics+0x10/0x10
[   28.620745]  ? __pfx_read_tsc+0x10/0x10
[   28.620768]  ? ktime_get_ts64+0x86/0x230
[   28.620794]  kunit_try_run_case+0x1a5/0x480
[   28.620820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.620855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.620889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.620915]  ? __kthread_parkme+0x82/0x180
[   28.620938]  ? preempt_count_sub+0x50/0x80
[   28.620963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.620990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.621015]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.621040]  kthread+0x337/0x6f0
[   28.621062]  ? trace_preempt_on+0x20/0xc0
[   28.621087]  ? __pfx_kthread+0x10/0x10
[   28.621109]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.621134]  ? calculate_sigpending+0x7b/0xa0
[   28.621167]  ? __pfx_kthread+0x10/0x10
[   28.621190]  ret_from_fork+0x116/0x1d0
[   28.621211]  ? __pfx_kthread+0x10/0x10
[   28.621233]  ret_from_fork_asm+0x1a/0x30
[   28.621266]  </TASK>
[   28.621278] 
[   28.634350] Allocated by task 313:
[   28.634744]  kasan_save_stack+0x45/0x70
[   28.634949]  kasan_save_track+0x18/0x40
[   28.635541]  kasan_save_alloc_info+0x3b/0x50
[   28.635805]  __kasan_kmalloc+0xb7/0xc0
[   28.636176]  __kmalloc_cache_noprof+0x189/0x420
[   28.636584]  kasan_atomics+0x95/0x310
[   28.636985]  kunit_try_run_case+0x1a5/0x480
[   28.637175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.637391]  kthread+0x337/0x6f0
[   28.637539]  ret_from_fork+0x116/0x1d0
[   28.637798]  ret_from_fork_asm+0x1a/0x30
[   28.638015] 
[   28.638134] The buggy address belongs to the object at ffff8881058a7e80
[   28.638134]  which belongs to the cache kmalloc-64 of size 64
[   28.638737] The buggy address is located 0 bytes to the right of
[   28.638737]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.639288] 
[   28.639586] The buggy address belongs to the physical page:
[   28.639874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.640248] flags: 0x200000000000000(node=0|zone=2)
[   28.641045] page_type: f5(slab)
[   28.641187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.641480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.641936] page dumped because: kasan: bad access detected
[   28.642332] 
[   28.642442] Memory state around the buggy address:
[   28.642746]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.643611]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.644052] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.644599]                                      ^
[   28.644804]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.645125]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.645665] ==================================================================
[   28.646393] ==================================================================
[   28.647134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   28.647602] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.647967] 
[   28.648089] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.648141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.648156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.648179] Call Trace:
[   28.648196]  <TASK>
[   28.648211]  dump_stack_lvl+0x73/0xb0
[   28.648241]  print_report+0xd1/0x640
[   28.648265]  ? __virt_addr_valid+0x1db/0x2d0
[   28.648290]  ? kasan_atomics_helper+0x194a/0x5450
[   28.648315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.648345]  ? kasan_atomics_helper+0x194a/0x5450
[   28.648370]  kasan_report+0x141/0x180
[   28.648394]  ? kasan_atomics_helper+0x194a/0x5450
[   28.648423]  kasan_check_range+0x10c/0x1c0
[   28.648448]  __kasan_check_write+0x18/0x20
[   28.648666]  kasan_atomics_helper+0x194a/0x5450
[   28.648692]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.648716]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.648742]  ? kasan_atomics+0x152/0x310
[   28.648770]  kasan_atomics+0x1dc/0x310
[   28.648795]  ? __pfx_kasan_atomics+0x10/0x10
[   28.648821]  ? __pfx_read_tsc+0x10/0x10
[   28.648857]  ? ktime_get_ts64+0x86/0x230
[   28.648887]  kunit_try_run_case+0x1a5/0x480
[   28.648915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.648939]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.648966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.648993]  ? __kthread_parkme+0x82/0x180
[   28.649015]  ? preempt_count_sub+0x50/0x80
[   28.649039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.649067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.649095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.649121]  kthread+0x337/0x6f0
[   28.649142]  ? trace_preempt_on+0x20/0xc0
[   28.649176]  ? __pfx_kthread+0x10/0x10
[   28.649198]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.649224]  ? calculate_sigpending+0x7b/0xa0
[   28.649248]  ? __pfx_kthread+0x10/0x10
[   28.649272]  ret_from_fork+0x116/0x1d0
[   28.649293]  ? __pfx_kthread+0x10/0x10
[   28.649316]  ret_from_fork_asm+0x1a/0x30
[   28.649349]  </TASK>
[   28.649362] 
[   28.659963] Allocated by task 313:
[   28.660131]  kasan_save_stack+0x45/0x70
[   28.660281]  kasan_save_track+0x18/0x40
[   28.660785]  kasan_save_alloc_info+0x3b/0x50
[   28.661123]  __kasan_kmalloc+0xb7/0xc0
[   28.661292]  __kmalloc_cache_noprof+0x189/0x420
[   28.661789]  kasan_atomics+0x95/0x310
[   28.661975]  kunit_try_run_case+0x1a5/0x480
[   28.662181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.662622]  kthread+0x337/0x6f0
[   28.662755]  ret_from_fork+0x116/0x1d0
[   28.662960]  ret_from_fork_asm+0x1a/0x30
[   28.663136] 
[   28.663228] The buggy address belongs to the object at ffff8881058a7e80
[   28.663228]  which belongs to the cache kmalloc-64 of size 64
[   28.664066] The buggy address is located 0 bytes to the right of
[   28.664066]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.664898] 
[   28.664983] The buggy address belongs to the physical page:
[   28.665234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.665798] flags: 0x200000000000000(node=0|zone=2)
[   28.665996] page_type: f5(slab)
[   28.666169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.666788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.667091] page dumped because: kasan: bad access detected
[   28.667322] 
[   28.667444] Memory state around the buggy address:
[   28.667824]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.668126]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.668736] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.669133]                                      ^
[   28.669325]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.669749]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.670247] ==================================================================
[   29.019624] ==================================================================
[   29.020187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   29.020700] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   29.021252] 
[   29.021488] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.021647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.021666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.021689] Call Trace:
[   29.021709]  <TASK>
[   29.021726]  dump_stack_lvl+0x73/0xb0
[   29.021758]  print_report+0xd1/0x640
[   29.021783]  ? __virt_addr_valid+0x1db/0x2d0
[   29.021809]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.021847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.021877]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.021902]  kasan_report+0x141/0x180
[   29.021927]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.021955]  kasan_check_range+0x10c/0x1c0
[   29.021981]  __kasan_check_write+0x18/0x20
[   29.022006]  kasan_atomics_helper+0x20c8/0x5450
[   29.022031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.022055]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.022081]  ? kasan_atomics+0x152/0x310
[   29.022109]  kasan_atomics+0x1dc/0x310
[   29.022133]  ? __pfx_kasan_atomics+0x10/0x10
[   29.022160]  ? __pfx_read_tsc+0x10/0x10
[   29.022185]  ? ktime_get_ts64+0x86/0x230
[   29.022212]  kunit_try_run_case+0x1a5/0x480
[   29.022239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.022263]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.022291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.022319]  ? __kthread_parkme+0x82/0x180
[   29.022341]  ? preempt_count_sub+0x50/0x80
[   29.022365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.022391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.022416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.022442]  kthread+0x337/0x6f0
[   29.022464]  ? trace_preempt_on+0x20/0xc0
[   29.022489]  ? __pfx_kthread+0x10/0x10
[   29.022511]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.022536]  ? calculate_sigpending+0x7b/0xa0
[   29.022561]  ? __pfx_kthread+0x10/0x10
[   29.022584]  ret_from_fork+0x116/0x1d0
[   29.022605]  ? __pfx_kthread+0x10/0x10
[   29.022628]  ret_from_fork_asm+0x1a/0x30
[   29.022661]  </TASK>
[   29.022673] 
[   29.034273] Allocated by task 313:
[   29.034804]  kasan_save_stack+0x45/0x70
[   29.034994]  kasan_save_track+0x18/0x40
[   29.035193]  kasan_save_alloc_info+0x3b/0x50
[   29.035667]  __kasan_kmalloc+0xb7/0xc0
[   29.035954]  __kmalloc_cache_noprof+0x189/0x420
[   29.036401]  kasan_atomics+0x95/0x310
[   29.036575]  kunit_try_run_case+0x1a5/0x480
[   29.036988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.037380]  kthread+0x337/0x6f0
[   29.037624]  ret_from_fork+0x116/0x1d0
[   29.038044]  ret_from_fork_asm+0x1a/0x30
[   29.038266] 
[   29.038590] The buggy address belongs to the object at ffff8881058a7e80
[   29.038590]  which belongs to the cache kmalloc-64 of size 64
[   29.039212] The buggy address is located 0 bytes to the right of
[   29.039212]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   29.040113] 
[   29.040301] The buggy address belongs to the physical page:
[   29.040711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   29.041344] flags: 0x200000000000000(node=0|zone=2)
[   29.041717] page_type: f5(slab)
[   29.041886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.042532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.043195] page dumped because: kasan: bad access detected
[   29.043412] 
[   29.043674] Memory state around the buggy address:
[   29.043960]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.044311]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.044759] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.045077]                                      ^
[   29.045467]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.045855]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.046183] ==================================================================
[   29.067846] ==================================================================
[   29.068427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   29.069035] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   29.069430] 
[   29.069634] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   29.069686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.069701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.069724] Call Trace:
[   29.069740]  <TASK>
[   29.069755]  dump_stack_lvl+0x73/0xb0
[   29.069784]  print_report+0xd1/0x640
[   29.069857]  ? __virt_addr_valid+0x1db/0x2d0
[   29.069883]  ? kasan_atomics_helper+0x218a/0x5450
[   29.069906]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.069934]  ? kasan_atomics_helper+0x218a/0x5450
[   29.069958]  kasan_report+0x141/0x180
[   29.069983]  ? kasan_atomics_helper+0x218a/0x5450
[   29.070011]  kasan_check_range+0x10c/0x1c0
[   29.070038]  __kasan_check_write+0x18/0x20
[   29.070064]  kasan_atomics_helper+0x218a/0x5450
[   29.070089]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.070113]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.070139]  ? kasan_atomics+0x152/0x310
[   29.070186]  kasan_atomics+0x1dc/0x310
[   29.070211]  ? __pfx_kasan_atomics+0x10/0x10
[   29.070238]  ? __pfx_read_tsc+0x10/0x10
[   29.070261]  ? ktime_get_ts64+0x86/0x230
[   29.070288]  kunit_try_run_case+0x1a5/0x480
[   29.070315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.070374]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.070402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.070429]  ? __kthread_parkme+0x82/0x180
[   29.070472]  ? preempt_count_sub+0x50/0x80
[   29.070508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.070566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.070594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.070620]  kthread+0x337/0x6f0
[   29.070641]  ? trace_preempt_on+0x20/0xc0
[   29.070667]  ? __pfx_kthread+0x10/0x10
[   29.070689]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.070715]  ? calculate_sigpending+0x7b/0xa0
[   29.070771]  ? __pfx_kthread+0x10/0x10
[   29.070795]  ret_from_fork+0x116/0x1d0
[   29.070817]  ? __pfx_kthread+0x10/0x10
[   29.070849]  ret_from_fork_asm+0x1a/0x30
[   29.070912]  </TASK>
[   29.070925] 
[   29.078906] Allocated by task 313:
[   29.079155]  kasan_save_stack+0x45/0x70
[   29.079518]  kasan_save_track+0x18/0x40
[   29.079709]  kasan_save_alloc_info+0x3b/0x50
[   29.079976]  __kasan_kmalloc+0xb7/0xc0
[   29.080107]  __kmalloc_cache_noprof+0x189/0x420
[   29.080257]  kasan_atomics+0x95/0x310
[   29.080383]  kunit_try_run_case+0x1a5/0x480
[   29.080524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.080693]  kthread+0x337/0x6f0
[   29.080808]  ret_from_fork+0x116/0x1d0
[   29.081232]  ret_from_fork_asm+0x1a/0x30
[   29.081447] 
[   29.081541] The buggy address belongs to the object at ffff8881058a7e80
[   29.081541]  which belongs to the cache kmalloc-64 of size 64
[   29.082081] The buggy address is located 0 bytes to the right of
[   29.082081]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   29.082884] 
[   29.083053] The buggy address belongs to the physical page:
[   29.083669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   29.084046] flags: 0x200000000000000(node=0|zone=2)
[   29.084318] page_type: f5(slab)
[   29.084583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.084856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.085083] page dumped because: kasan: bad access detected
[   29.085263] 
[   29.085359] Memory state around the buggy address:
[   29.085661]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.086023]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.086431] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.086930]                                      ^
[   29.087089]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.089006]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.089779] ==================================================================
[   27.735964] ==================================================================
[   27.736349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   27.737109] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.737788] 
[   27.737912] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.737967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.737984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.738007] Call Trace:
[   27.738025]  <TASK>
[   27.738040]  dump_stack_lvl+0x73/0xb0
[   27.738071]  print_report+0xd1/0x640
[   27.738096]  ? __virt_addr_valid+0x1db/0x2d0
[   27.738122]  ? kasan_atomics_helper+0x72f/0x5450
[   27.738145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.738310]  ? kasan_atomics_helper+0x72f/0x5450
[   27.738340]  kasan_report+0x141/0x180
[   27.738365]  ? kasan_atomics_helper+0x72f/0x5450
[   27.738393]  kasan_check_range+0x10c/0x1c0
[   27.738419]  __kasan_check_write+0x18/0x20
[   27.738444]  kasan_atomics_helper+0x72f/0x5450
[   27.738520]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.738545]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.738572]  ? kasan_atomics+0x152/0x310
[   27.738600]  kasan_atomics+0x1dc/0x310
[   27.738624]  ? __pfx_kasan_atomics+0x10/0x10
[   27.738651]  ? __pfx_read_tsc+0x10/0x10
[   27.738673]  ? ktime_get_ts64+0x86/0x230
[   27.738699]  kunit_try_run_case+0x1a5/0x480
[   27.738727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.738752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.738779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.738806]  ? __kthread_parkme+0x82/0x180
[   27.738839]  ? preempt_count_sub+0x50/0x80
[   27.738865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.738892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.738919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.738945]  kthread+0x337/0x6f0
[   27.738966]  ? trace_preempt_on+0x20/0xc0
[   27.738991]  ? __pfx_kthread+0x10/0x10
[   27.739013]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.739038]  ? calculate_sigpending+0x7b/0xa0
[   27.739064]  ? __pfx_kthread+0x10/0x10
[   27.739088]  ret_from_fork+0x116/0x1d0
[   27.739109]  ? __pfx_kthread+0x10/0x10
[   27.739131]  ret_from_fork_asm+0x1a/0x30
[   27.739164]  </TASK>
[   27.739176] 
[   27.752666] Allocated by task 313:
[   27.753124]  kasan_save_stack+0x45/0x70
[   27.753419]  kasan_save_track+0x18/0x40
[   27.753886]  kasan_save_alloc_info+0x3b/0x50
[   27.754208]  __kasan_kmalloc+0xb7/0xc0
[   27.754529]  __kmalloc_cache_noprof+0x189/0x420
[   27.754912]  kasan_atomics+0x95/0x310
[   27.755054]  kunit_try_run_case+0x1a5/0x480
[   27.755240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.755813]  kthread+0x337/0x6f0
[   27.756145]  ret_from_fork+0x116/0x1d0
[   27.756682]  ret_from_fork_asm+0x1a/0x30
[   27.757097] 
[   27.757295] The buggy address belongs to the object at ffff8881058a7e80
[   27.757295]  which belongs to the cache kmalloc-64 of size 64
[   27.758025] The buggy address is located 0 bytes to the right of
[   27.758025]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.759084] 
[   27.759257] The buggy address belongs to the physical page:
[   27.759918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.760412] flags: 0x200000000000000(node=0|zone=2)
[   27.760931] page_type: f5(slab)
[   27.761247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.761909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.762153] page dumped because: kasan: bad access detected
[   27.762329] 
[   27.762398] Memory state around the buggy address:
[   27.762842]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.763506]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.764219] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.765055]                                      ^
[   27.765605]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.766228]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.767003] ==================================================================
[   28.171043] ==================================================================
[   28.171293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   28.171792] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.172193] 
[   28.172288] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.172340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.172355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.172379] Call Trace:
[   28.172394]  <TASK>
[   28.172410]  dump_stack_lvl+0x73/0xb0
[   28.172440]  print_report+0xd1/0x640
[   28.172464]  ? __virt_addr_valid+0x1db/0x2d0
[   28.172490]  ? kasan_atomics_helper+0x1079/0x5450
[   28.172513]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.172541]  ? kasan_atomics_helper+0x1079/0x5450
[   28.172565]  kasan_report+0x141/0x180
[   28.172589]  ? kasan_atomics_helper+0x1079/0x5450
[   28.172617]  kasan_check_range+0x10c/0x1c0
[   28.172643]  __kasan_check_write+0x18/0x20
[   28.172669]  kasan_atomics_helper+0x1079/0x5450
[   28.172693]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.172717]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.172743]  ? kasan_atomics+0x152/0x310
[   28.172771]  kasan_atomics+0x1dc/0x310
[   28.172796]  ? __pfx_kasan_atomics+0x10/0x10
[   28.172822]  ? __pfx_read_tsc+0x10/0x10
[   28.172858]  ? ktime_get_ts64+0x86/0x230
[   28.172888]  kunit_try_run_case+0x1a5/0x480
[   28.172923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.172960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.172987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.173016]  ? __kthread_parkme+0x82/0x180
[   28.173039]  ? preempt_count_sub+0x50/0x80
[   28.173064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.173090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.173116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.173143]  kthread+0x337/0x6f0
[   28.173172]  ? trace_preempt_on+0x20/0xc0
[   28.173198]  ? __pfx_kthread+0x10/0x10
[   28.173220]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.173246]  ? calculate_sigpending+0x7b/0xa0
[   28.173271]  ? __pfx_kthread+0x10/0x10
[   28.173295]  ret_from_fork+0x116/0x1d0
[   28.173318]  ? __pfx_kthread+0x10/0x10
[   28.173340]  ret_from_fork_asm+0x1a/0x30
[   28.173372]  </TASK>
[   28.173385] 
[   28.184078] Allocated by task 313:
[   28.184224]  kasan_save_stack+0x45/0x70
[   28.184377]  kasan_save_track+0x18/0x40
[   28.185118]  kasan_save_alloc_info+0x3b/0x50
[   28.185352]  __kasan_kmalloc+0xb7/0xc0
[   28.185525]  __kmalloc_cache_noprof+0x189/0x420
[   28.185864]  kasan_atomics+0x95/0x310
[   28.186043]  kunit_try_run_case+0x1a5/0x480
[   28.186228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.186779]  kthread+0x337/0x6f0
[   28.186947]  ret_from_fork+0x116/0x1d0
[   28.187249]  ret_from_fork_asm+0x1a/0x30
[   28.187596] 
[   28.187676] The buggy address belongs to the object at ffff8881058a7e80
[   28.187676]  which belongs to the cache kmalloc-64 of size 64
[   28.188170] The buggy address is located 0 bytes to the right of
[   28.188170]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.189092] 
[   28.189243] The buggy address belongs to the physical page:
[   28.189581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.190122] flags: 0x200000000000000(node=0|zone=2)
[   28.190345] page_type: f5(slab)
[   28.190582] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.190892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.191195] page dumped because: kasan: bad access detected
[   28.191409] 
[   28.191500] Memory state around the buggy address:
[   28.191680]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.192001]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.192650] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.192984]                                      ^
[   28.193297]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.193569]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.194069] ==================================================================
[   28.035154] ==================================================================
[   28.035501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   28.035909] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.036334] 
[   28.036449] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.036500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.036515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.036538] Call Trace:
[   28.036556]  <TASK>
[   28.036572]  dump_stack_lvl+0x73/0xb0
[   28.036603]  print_report+0xd1/0x640
[   28.036628]  ? __virt_addr_valid+0x1db/0x2d0
[   28.036655]  ? kasan_atomics_helper+0xde0/0x5450
[   28.036678]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.036706]  ? kasan_atomics_helper+0xde0/0x5450
[   28.036731]  kasan_report+0x141/0x180
[   28.036755]  ? kasan_atomics_helper+0xde0/0x5450
[   28.036783]  kasan_check_range+0x10c/0x1c0
[   28.036809]  __kasan_check_write+0x18/0x20
[   28.036847]  kasan_atomics_helper+0xde0/0x5450
[   28.036876]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.036901]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.036927]  ? kasan_atomics+0x152/0x310
[   28.036955]  kasan_atomics+0x1dc/0x310
[   28.036980]  ? __pfx_kasan_atomics+0x10/0x10
[   28.037006]  ? __pfx_read_tsc+0x10/0x10
[   28.037029]  ? ktime_get_ts64+0x86/0x230
[   28.037055]  kunit_try_run_case+0x1a5/0x480
[   28.037082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.037107]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.037136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.037163]  ? __kthread_parkme+0x82/0x180
[   28.037185]  ? preempt_count_sub+0x50/0x80
[   28.037211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.037238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.037263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.037289]  kthread+0x337/0x6f0
[   28.037311]  ? trace_preempt_on+0x20/0xc0
[   28.037337]  ? __pfx_kthread+0x10/0x10
[   28.037360]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.037385]  ? calculate_sigpending+0x7b/0xa0
[   28.037411]  ? __pfx_kthread+0x10/0x10
[   28.037434]  ret_from_fork+0x116/0x1d0
[   28.037456]  ? __pfx_kthread+0x10/0x10
[   28.037478]  ret_from_fork_asm+0x1a/0x30
[   28.037513]  </TASK>
[   28.037526] 
[   28.045289] Allocated by task 313:
[   28.045423]  kasan_save_stack+0x45/0x70
[   28.045571]  kasan_save_track+0x18/0x40
[   28.045716]  kasan_save_alloc_info+0x3b/0x50
[   28.045945]  __kasan_kmalloc+0xb7/0xc0
[   28.046222]  __kmalloc_cache_noprof+0x189/0x420
[   28.046439]  kasan_atomics+0x95/0x310
[   28.046622]  kunit_try_run_case+0x1a5/0x480
[   28.046837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.047145]  kthread+0x337/0x6f0
[   28.047322]  ret_from_fork+0x116/0x1d0
[   28.047546]  ret_from_fork_asm+0x1a/0x30
[   28.047692] 
[   28.047761] The buggy address belongs to the object at ffff8881058a7e80
[   28.047761]  which belongs to the cache kmalloc-64 of size 64
[   28.048395] The buggy address is located 0 bytes to the right of
[   28.048395]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.049208] 
[   28.049316] The buggy address belongs to the physical page:
[   28.049627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.049944] flags: 0x200000000000000(node=0|zone=2)
[   28.050114] page_type: f5(slab)
[   28.050402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.051014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.051430] page dumped because: kasan: bad access detected
[   28.051700] 
[   28.051778] Memory state around the buggy address:
[   28.051990]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.052315]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.052587] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.052804]                                      ^
[   28.053014]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.053340]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.053886] ==================================================================
[   28.108942] ==================================================================
[   28.109210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   28.109935] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.110668] 
[   28.110808] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.110869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.110884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.110908] Call Trace:
[   28.110927]  <TASK>
[   28.110945]  dump_stack_lvl+0x73/0xb0
[   28.110992]  print_report+0xd1/0x640
[   28.111018]  ? __virt_addr_valid+0x1db/0x2d0
[   28.111057]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.111091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.111119]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.111153]  kasan_report+0x141/0x180
[   28.111178]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.111206]  kasan_check_range+0x10c/0x1c0
[   28.111232]  __kasan_check_write+0x18/0x20
[   28.111257]  kasan_atomics_helper+0xfa9/0x5450
[   28.111282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.111306]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.111333]  ? kasan_atomics+0x152/0x310
[   28.111360]  kasan_atomics+0x1dc/0x310
[   28.111385]  ? __pfx_kasan_atomics+0x10/0x10
[   28.111411]  ? __pfx_read_tsc+0x10/0x10
[   28.111435]  ? ktime_get_ts64+0x86/0x230
[   28.111476]  kunit_try_run_case+0x1a5/0x480
[   28.111504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.111529]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.111556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.111583]  ? __kthread_parkme+0x82/0x180
[   28.111605]  ? preempt_count_sub+0x50/0x80
[   28.111631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.111657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.111682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.111710]  kthread+0x337/0x6f0
[   28.111732]  ? trace_preempt_on+0x20/0xc0
[   28.111758]  ? __pfx_kthread+0x10/0x10
[   28.111780]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.111806]  ? calculate_sigpending+0x7b/0xa0
[   28.111841]  ? __pfx_kthread+0x10/0x10
[   28.111865]  ret_from_fork+0x116/0x1d0
[   28.111886]  ? __pfx_kthread+0x10/0x10
[   28.111909]  ret_from_fork_asm+0x1a/0x30
[   28.111942]  </TASK>
[   28.111954] 
[   28.126657] Allocated by task 313:
[   28.126936]  kasan_save_stack+0x45/0x70
[   28.127496]  kasan_save_track+0x18/0x40
[   28.127700]  kasan_save_alloc_info+0x3b/0x50
[   28.127900]  __kasan_kmalloc+0xb7/0xc0
[   28.128070]  __kmalloc_cache_noprof+0x189/0x420
[   28.128273]  kasan_atomics+0x95/0x310
[   28.128437]  kunit_try_run_case+0x1a5/0x480
[   28.128629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.129323]  kthread+0x337/0x6f0
[   28.129826]  ret_from_fork+0x116/0x1d0
[   28.130219]  ret_from_fork_asm+0x1a/0x30
[   28.130764] 
[   28.130882] The buggy address belongs to the object at ffff8881058a7e80
[   28.130882]  which belongs to the cache kmalloc-64 of size 64
[   28.131892] The buggy address is located 0 bytes to the right of
[   28.131892]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.132955] 
[   28.133065] The buggy address belongs to the physical page:
[   28.133781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.134461] flags: 0x200000000000000(node=0|zone=2)
[   28.134910] page_type: f5(slab)
[   28.135064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.136057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.136549] page dumped because: kasan: bad access detected
[   28.136781] 
[   28.136883] Memory state around the buggy address:
[   28.137080]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.137993]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.138513] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.138998]                                      ^
[   28.139511]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.140224]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.140538] ==================================================================
[   27.526100] ==================================================================
[   27.526562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   27.527340] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.527585] 
[   27.527946] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.528003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.528019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.528042] Call Trace:
[   27.528061]  <TASK>
[   27.528077]  dump_stack_lvl+0x73/0xb0
[   27.528109]  print_report+0xd1/0x640
[   27.528134]  ? __virt_addr_valid+0x1db/0x2d0
[   27.528289]  ? kasan_atomics_helper+0x4b88/0x5450
[   27.528321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.528350]  ? kasan_atomics_helper+0x4b88/0x5450
[   27.528375]  kasan_report+0x141/0x180
[   27.528401]  ? kasan_atomics_helper+0x4b88/0x5450
[   27.528430]  __asan_report_load4_noabort+0x18/0x20
[   27.528506]  kasan_atomics_helper+0x4b88/0x5450
[   27.528537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.528561]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.528589]  ? kasan_atomics+0x152/0x310
[   27.528617]  kasan_atomics+0x1dc/0x310
[   27.528641]  ? __pfx_kasan_atomics+0x10/0x10
[   27.528667]  ? __pfx_read_tsc+0x10/0x10
[   27.528690]  ? ktime_get_ts64+0x86/0x230
[   27.528717]  kunit_try_run_case+0x1a5/0x480
[   27.528743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.528768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.528797]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.528825]  ? __kthread_parkme+0x82/0x180
[   27.528860]  ? preempt_count_sub+0x50/0x80
[   27.528892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.528918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.528943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.528969]  kthread+0x337/0x6f0
[   27.528992]  ? trace_preempt_on+0x20/0xc0
[   27.529017]  ? __pfx_kthread+0x10/0x10
[   27.529041]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.529067]  ? calculate_sigpending+0x7b/0xa0
[   27.529093]  ? __pfx_kthread+0x10/0x10
[   27.529117]  ret_from_fork+0x116/0x1d0
[   27.529139]  ? __pfx_kthread+0x10/0x10
[   27.529162]  ret_from_fork_asm+0x1a/0x30
[   27.529194]  </TASK>
[   27.529206] 
[   27.540234] Allocated by task 313:
[   27.541005]  kasan_save_stack+0x45/0x70
[   27.541210]  kasan_save_track+0x18/0x40
[   27.541745]  kasan_save_alloc_info+0x3b/0x50
[   27.541990]  __kasan_kmalloc+0xb7/0xc0
[   27.542308]  __kmalloc_cache_noprof+0x189/0x420
[   27.542655]  kasan_atomics+0x95/0x310
[   27.542841]  kunit_try_run_case+0x1a5/0x480
[   27.543053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.543497]  kthread+0x337/0x6f0
[   27.543856]  ret_from_fork+0x116/0x1d0
[   27.544062]  ret_from_fork_asm+0x1a/0x30
[   27.544395] 
[   27.544497] The buggy address belongs to the object at ffff8881058a7e80
[   27.544497]  which belongs to the cache kmalloc-64 of size 64
[   27.545378] The buggy address is located 0 bytes to the right of
[   27.545378]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.546267] 
[   27.546394] The buggy address belongs to the physical page:
[   27.546974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.547411] flags: 0x200000000000000(node=0|zone=2)
[   27.547774] page_type: f5(slab)
[   27.547969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.548477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.548871] page dumped because: kasan: bad access detected
[   27.549123] 
[   27.549395] Memory state around the buggy address:
[   27.549621]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.549941]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.550654] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.550939]                                      ^
[   27.551469]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.551961]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.552525] ==================================================================
[   28.194675] ==================================================================
[   28.195067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   28.195632] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.196274] 
[   28.196385] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.196436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.196452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.196475] Call Trace:
[   28.196558]  <TASK>
[   28.196576]  dump_stack_lvl+0x73/0xb0
[   28.196608]  print_report+0xd1/0x640
[   28.196633]  ? __virt_addr_valid+0x1db/0x2d0
[   28.196660]  ? kasan_atomics_helper+0x4a1c/0x5450
[   28.196683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.196711]  ? kasan_atomics_helper+0x4a1c/0x5450
[   28.196894]  kasan_report+0x141/0x180
[   28.196921]  ? kasan_atomics_helper+0x4a1c/0x5450
[   28.196950]  __asan_report_load4_noabort+0x18/0x20
[   28.196978]  kasan_atomics_helper+0x4a1c/0x5450
[   28.197004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.197029]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.197056]  ? kasan_atomics+0x152/0x310
[   28.197083]  kasan_atomics+0x1dc/0x310
[   28.197108]  ? __pfx_kasan_atomics+0x10/0x10
[   28.197134]  ? __pfx_read_tsc+0x10/0x10
[   28.197166]  ? ktime_get_ts64+0x86/0x230
[   28.197193]  kunit_try_run_case+0x1a5/0x480
[   28.197220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.197246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.197272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.197299]  ? __kthread_parkme+0x82/0x180
[   28.197321]  ? preempt_count_sub+0x50/0x80
[   28.197346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.197372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.197398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.197423]  kthread+0x337/0x6f0
[   28.197445]  ? trace_preempt_on+0x20/0xc0
[   28.197485]  ? __pfx_kthread+0x10/0x10
[   28.197508]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.197533]  ? calculate_sigpending+0x7b/0xa0
[   28.197559]  ? __pfx_kthread+0x10/0x10
[   28.197582]  ret_from_fork+0x116/0x1d0
[   28.197603]  ? __pfx_kthread+0x10/0x10
[   28.197626]  ret_from_fork_asm+0x1a/0x30
[   28.197658]  </TASK>
[   28.197671] 
[   28.207693] Allocated by task 313:
[   28.207880]  kasan_save_stack+0x45/0x70
[   28.208225]  kasan_save_track+0x18/0x40
[   28.208487]  kasan_save_alloc_info+0x3b/0x50
[   28.208769]  __kasan_kmalloc+0xb7/0xc0
[   28.209183]  __kmalloc_cache_noprof+0x189/0x420
[   28.209471]  kasan_atomics+0x95/0x310
[   28.209756]  kunit_try_run_case+0x1a5/0x480
[   28.210041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.210403]  kthread+0x337/0x6f0
[   28.210573]  ret_from_fork+0x116/0x1d0
[   28.210948]  ret_from_fork_asm+0x1a/0x30
[   28.211253] 
[   28.211332] The buggy address belongs to the object at ffff8881058a7e80
[   28.211332]  which belongs to the cache kmalloc-64 of size 64
[   28.212167] The buggy address is located 0 bytes to the right of
[   28.212167]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.212718] 
[   28.212859] The buggy address belongs to the physical page:
[   28.213057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.213378] flags: 0x200000000000000(node=0|zone=2)
[   28.214073] page_type: f5(slab)
[   28.214297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.214844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.215309] page dumped because: kasan: bad access detected
[   28.215513] 
[   28.215711] Memory state around the buggy address:
[   28.215999]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.216618]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.216960] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.217448]                                      ^
[   28.217628]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.218140]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.218478] ==================================================================
[   28.670782] ==================================================================
[   28.671107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   28.671639] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.672080] 
[   28.672271] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.672389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.672406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.672430] Call Trace:
[   28.672448]  <TASK>
[   28.672476]  dump_stack_lvl+0x73/0xb0
[   28.672507]  print_report+0xd1/0x640
[   28.672629]  ? __virt_addr_valid+0x1db/0x2d0
[   28.672660]  ? kasan_atomics_helper+0x19e3/0x5450
[   28.672684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.672712]  ? kasan_atomics_helper+0x19e3/0x5450
[   28.672737]  kasan_report+0x141/0x180
[   28.672762]  ? kasan_atomics_helper+0x19e3/0x5450
[   28.672790]  kasan_check_range+0x10c/0x1c0
[   28.672927]  __kasan_check_write+0x18/0x20
[   28.672954]  kasan_atomics_helper+0x19e3/0x5450
[   28.672979]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.673003]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.673029]  ? kasan_atomics+0x152/0x310
[   28.673057]  kasan_atomics+0x1dc/0x310
[   28.673081]  ? __pfx_kasan_atomics+0x10/0x10
[   28.673107]  ? __pfx_read_tsc+0x10/0x10
[   28.673130]  ? ktime_get_ts64+0x86/0x230
[   28.673156]  kunit_try_run_case+0x1a5/0x480
[   28.673190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.673215]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.673244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.673270]  ? __kthread_parkme+0x82/0x180
[   28.673291]  ? preempt_count_sub+0x50/0x80
[   28.673315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.673342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.673366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.673393]  kthread+0x337/0x6f0
[   28.673415]  ? trace_preempt_on+0x20/0xc0
[   28.673439]  ? __pfx_kthread+0x10/0x10
[   28.673470]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.673495]  ? calculate_sigpending+0x7b/0xa0
[   28.673520]  ? __pfx_kthread+0x10/0x10
[   28.673543]  ret_from_fork+0x116/0x1d0
[   28.673564]  ? __pfx_kthread+0x10/0x10
[   28.673587]  ret_from_fork_asm+0x1a/0x30
[   28.673620]  </TASK>
[   28.673632] 
[   28.683690] Allocated by task 313:
[   28.683901]  kasan_save_stack+0x45/0x70
[   28.684333]  kasan_save_track+0x18/0x40
[   28.684703]  kasan_save_alloc_info+0x3b/0x50
[   28.684958]  __kasan_kmalloc+0xb7/0xc0
[   28.685122]  __kmalloc_cache_noprof+0x189/0x420
[   28.685497]  kasan_atomics+0x95/0x310
[   28.685704]  kunit_try_run_case+0x1a5/0x480
[   28.685995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.686191]  kthread+0x337/0x6f0
[   28.686413]  ret_from_fork+0x116/0x1d0
[   28.686698]  ret_from_fork_asm+0x1a/0x30
[   28.686910] 
[   28.687006] The buggy address belongs to the object at ffff8881058a7e80
[   28.687006]  which belongs to the cache kmalloc-64 of size 64
[   28.687866] The buggy address is located 0 bytes to the right of
[   28.687866]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.688678] 
[   28.688885] The buggy address belongs to the physical page:
[   28.689078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.689635] flags: 0x200000000000000(node=0|zone=2)
[   28.689996] page_type: f5(slab)
[   28.690150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.690626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.690955] page dumped because: kasan: bad access detected
[   28.691204] 
[   28.691286] Memory state around the buggy address:
[   28.691681]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.692094]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.692600] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.692883]                                      ^
[   28.693202]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.693508]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.693983] ==================================================================
[   28.934189] ==================================================================
[   28.934779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   28.935359] Read of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.935895] 
[   28.936093] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.936144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.936159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.936182] Call Trace:
[   28.936202]  <TASK>
[   28.936219]  dump_stack_lvl+0x73/0xb0
[   28.936249]  print_report+0xd1/0x640
[   28.936286]  ? __virt_addr_valid+0x1db/0x2d0
[   28.936311]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.936335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.936377]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.936401]  kasan_report+0x141/0x180
[   28.936426]  ? kasan_atomics_helper+0x4f71/0x5450
[   28.936454]  __asan_report_load8_noabort+0x18/0x20
[   28.936529]  kasan_atomics_helper+0x4f71/0x5450
[   28.936556]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.936580]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.936607]  ? kasan_atomics+0x152/0x310
[   28.936636]  kasan_atomics+0x1dc/0x310
[   28.936661]  ? __pfx_kasan_atomics+0x10/0x10
[   28.936687]  ? __pfx_read_tsc+0x10/0x10
[   28.936711]  ? ktime_get_ts64+0x86/0x230
[   28.936738]  kunit_try_run_case+0x1a5/0x480
[   28.936765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.936789]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.936816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.936853]  ? __kthread_parkme+0x82/0x180
[   28.936881]  ? preempt_count_sub+0x50/0x80
[   28.936906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.936932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.936956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.936982]  kthread+0x337/0x6f0
[   28.937004]  ? trace_preempt_on+0x20/0xc0
[   28.937028]  ? __pfx_kthread+0x10/0x10
[   28.937051]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.937076]  ? calculate_sigpending+0x7b/0xa0
[   28.937101]  ? __pfx_kthread+0x10/0x10
[   28.937124]  ret_from_fork+0x116/0x1d0
[   28.937147]  ? __pfx_kthread+0x10/0x10
[   28.937180]  ret_from_fork_asm+0x1a/0x30
[   28.937214]  </TASK>
[   28.937227] 
[   28.950791] Allocated by task 313:
[   28.951142]  kasan_save_stack+0x45/0x70
[   28.951365]  kasan_save_track+0x18/0x40
[   28.951860]  kasan_save_alloc_info+0x3b/0x50
[   28.952253]  __kasan_kmalloc+0xb7/0xc0
[   28.952606]  __kmalloc_cache_noprof+0x189/0x420
[   28.952816]  kasan_atomics+0x95/0x310
[   28.953032]  kunit_try_run_case+0x1a5/0x480
[   28.953439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.953907]  kthread+0x337/0x6f0
[   28.954286]  ret_from_fork+0x116/0x1d0
[   28.954476]  ret_from_fork_asm+0x1a/0x30
[   28.954821] 
[   28.954953] The buggy address belongs to the object at ffff8881058a7e80
[   28.954953]  which belongs to the cache kmalloc-64 of size 64
[   28.955787] The buggy address is located 0 bytes to the right of
[   28.955787]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.956638] 
[   28.956789] The buggy address belongs to the physical page:
[   28.956988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.957569] flags: 0x200000000000000(node=0|zone=2)
[   28.958175] page_type: f5(slab)
[   28.958477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.958968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.959528] page dumped because: kasan: bad access detected
[   28.959864] 
[   28.959969] Memory state around the buggy address:
[   28.960401]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.960824]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.961382] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.961909]                                      ^
[   28.962257]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.962751]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.963387] ==================================================================
[   28.006314] ==================================================================
[   28.006955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   28.007582] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.007818] 
[   28.007921] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.007973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.007988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.008012] Call Trace:
[   28.008029]  <TASK>
[   28.008047]  dump_stack_lvl+0x73/0xb0
[   28.008076]  print_report+0xd1/0x640
[   28.008101]  ? __virt_addr_valid+0x1db/0x2d0
[   28.008127]  ? kasan_atomics_helper+0xd47/0x5450
[   28.008150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.008178]  ? kasan_atomics_helper+0xd47/0x5450
[   28.008201]  kasan_report+0x141/0x180
[   28.008226]  ? kasan_atomics_helper+0xd47/0x5450
[   28.008253]  kasan_check_range+0x10c/0x1c0
[   28.008279]  __kasan_check_write+0x18/0x20
[   28.008305]  kasan_atomics_helper+0xd47/0x5450
[   28.008329]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.008353]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.008381]  ? kasan_atomics+0x152/0x310
[   28.008410]  kasan_atomics+0x1dc/0x310
[   28.008436]  ? __pfx_kasan_atomics+0x10/0x10
[   28.008463]  ? __pfx_read_tsc+0x10/0x10
[   28.008487]  ? ktime_get_ts64+0x86/0x230
[   28.008514]  kunit_try_run_case+0x1a5/0x480
[   28.008552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.008577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.008607]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.008634]  ? __kthread_parkme+0x82/0x180
[   28.008657]  ? preempt_count_sub+0x50/0x80
[   28.008681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.008708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.008734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.008759]  kthread+0x337/0x6f0
[   28.008782]  ? trace_preempt_on+0x20/0xc0
[   28.008806]  ? __pfx_kthread+0x10/0x10
[   28.008838]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.008863]  ? calculate_sigpending+0x7b/0xa0
[   28.008894]  ? __pfx_kthread+0x10/0x10
[   28.008918]  ret_from_fork+0x116/0x1d0
[   28.008940]  ? __pfx_kthread+0x10/0x10
[   28.008962]  ret_from_fork_asm+0x1a/0x30
[   28.008996]  </TASK>
[   28.009008] 
[   28.023287] Allocated by task 313:
[   28.023426]  kasan_save_stack+0x45/0x70
[   28.023823]  kasan_save_track+0x18/0x40
[   28.024193]  kasan_save_alloc_info+0x3b/0x50
[   28.024794]  __kasan_kmalloc+0xb7/0xc0
[   28.025172]  __kmalloc_cache_noprof+0x189/0x420
[   28.025681]  kasan_atomics+0x95/0x310
[   28.025853]  kunit_try_run_case+0x1a5/0x480
[   28.026008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.026233]  kthread+0x337/0x6f0
[   28.026531]  ret_from_fork+0x116/0x1d0
[   28.026954]  ret_from_fork_asm+0x1a/0x30
[   28.027358] 
[   28.027532] The buggy address belongs to the object at ffff8881058a7e80
[   28.027532]  which belongs to the cache kmalloc-64 of size 64
[   28.028744] The buggy address is located 0 bytes to the right of
[   28.028744]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.029845] 
[   28.030018] The buggy address belongs to the physical page:
[   28.030545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.030796] flags: 0x200000000000000(node=0|zone=2)
[   28.030980] page_type: f5(slab)
[   28.031103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.031354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.031811] page dumped because: kasan: bad access detected
[   28.032032] 
[   28.032114] Memory state around the buggy address:
[   28.032552]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.032854]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.033141] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.033468]                                      ^
[   28.033674]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.033951]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.034271] ==================================================================
[   28.419886] ==================================================================
[   28.420121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   28.420377] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.420753] 
[   28.420894] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.420958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.420972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.421006] Call Trace:
[   28.421024]  <TASK>
[   28.421041]  dump_stack_lvl+0x73/0xb0
[   28.421070]  print_report+0xd1/0x640
[   28.421094]  ? __virt_addr_valid+0x1db/0x2d0
[   28.421118]  ? kasan_atomics_helper+0x1467/0x5450
[   28.421141]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.421169]  ? kasan_atomics_helper+0x1467/0x5450
[   28.421363]  kasan_report+0x141/0x180
[   28.421405]  ? kasan_atomics_helper+0x1467/0x5450
[   28.421435]  kasan_check_range+0x10c/0x1c0
[   28.421462]  __kasan_check_write+0x18/0x20
[   28.421487]  kasan_atomics_helper+0x1467/0x5450
[   28.421514]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.421538]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.421565]  ? kasan_atomics+0x152/0x310
[   28.421593]  kasan_atomics+0x1dc/0x310
[   28.421617]  ? __pfx_kasan_atomics+0x10/0x10
[   28.421643]  ? __pfx_read_tsc+0x10/0x10
[   28.421667]  ? ktime_get_ts64+0x86/0x230
[   28.421693]  kunit_try_run_case+0x1a5/0x480
[   28.421720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.421744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.421772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.421799]  ? __kthread_parkme+0x82/0x180
[   28.421821]  ? preempt_count_sub+0x50/0x80
[   28.421858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.421884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.421910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.421936]  kthread+0x337/0x6f0
[   28.421967]  ? trace_preempt_on+0x20/0xc0
[   28.421992]  ? __pfx_kthread+0x10/0x10
[   28.422014]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.422136]  ? calculate_sigpending+0x7b/0xa0
[   28.422179]  ? __pfx_kthread+0x10/0x10
[   28.422220]  ret_from_fork+0x116/0x1d0
[   28.422243]  ? __pfx_kthread+0x10/0x10
[   28.422277]  ret_from_fork_asm+0x1a/0x30
[   28.422310]  </TASK>
[   28.422323] 
[   28.434210] Allocated by task 313:
[   28.434383]  kasan_save_stack+0x45/0x70
[   28.434793]  kasan_save_track+0x18/0x40
[   28.435000]  kasan_save_alloc_info+0x3b/0x50
[   28.435429]  __kasan_kmalloc+0xb7/0xc0
[   28.435741]  __kmalloc_cache_noprof+0x189/0x420
[   28.435958]  kasan_atomics+0x95/0x310
[   28.436113]  kunit_try_run_case+0x1a5/0x480
[   28.436535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.437120]  kthread+0x337/0x6f0
[   28.437301]  ret_from_fork+0x116/0x1d0
[   28.437699]  ret_from_fork_asm+0x1a/0x30
[   28.438054] 
[   28.438163] The buggy address belongs to the object at ffff8881058a7e80
[   28.438163]  which belongs to the cache kmalloc-64 of size 64
[   28.438884] The buggy address is located 0 bytes to the right of
[   28.438884]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.439722] 
[   28.439821] The buggy address belongs to the physical page:
[   28.440054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.440793] flags: 0x200000000000000(node=0|zone=2)
[   28.441417] page_type: f5(slab)
[   28.441760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.442074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.442802] page dumped because: kasan: bad access detected
[   28.443044] 
[   28.443131] Memory state around the buggy address:
[   28.443582]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.443893]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.444396] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.444894]                                      ^
[   28.445582]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.445905]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.446127] ==================================================================
[   28.394593] ==================================================================
[   28.394823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   28.395076] Read of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.395303] 
[   28.395385] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.395434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.395449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.395470] Call Trace:
[   28.395486]  <TASK>
[   28.395501]  dump_stack_lvl+0x73/0xb0
[   28.395527]  print_report+0xd1/0x640
[   28.395550]  ? __virt_addr_valid+0x1db/0x2d0
[   28.395575]  ? kasan_atomics_helper+0x4eae/0x5450
[   28.395598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.395626]  ? kasan_atomics_helper+0x4eae/0x5450
[   28.395649]  kasan_report+0x141/0x180
[   28.395673]  ? kasan_atomics_helper+0x4eae/0x5450
[   28.395701]  __asan_report_load8_noabort+0x18/0x20
[   28.395740]  kasan_atomics_helper+0x4eae/0x5450
[   28.395766]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.395790]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.395816]  ? kasan_atomics+0x152/0x310
[   28.395853]  kasan_atomics+0x1dc/0x310
[   28.395878]  ? __pfx_kasan_atomics+0x10/0x10
[   28.395905]  ? __pfx_read_tsc+0x10/0x10
[   28.395929]  ? ktime_get_ts64+0x86/0x230
[   28.395954]  kunit_try_run_case+0x1a5/0x480
[   28.395981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.396006]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.396033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.396060]  ? __kthread_parkme+0x82/0x180
[   28.396082]  ? preempt_count_sub+0x50/0x80
[   28.396107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.396133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.396159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.396185]  kthread+0x337/0x6f0
[   28.396207]  ? trace_preempt_on+0x20/0xc0
[   28.396231]  ? __pfx_kthread+0x10/0x10
[   28.396254]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.396279]  ? calculate_sigpending+0x7b/0xa0
[   28.396305]  ? __pfx_kthread+0x10/0x10
[   28.396327]  ret_from_fork+0x116/0x1d0
[   28.396349]  ? __pfx_kthread+0x10/0x10
[   28.396372]  ret_from_fork_asm+0x1a/0x30
[   28.396404]  </TASK>
[   28.396416] 
[   28.405328] Allocated by task 313:
[   28.405460]  kasan_save_stack+0x45/0x70
[   28.405604]  kasan_save_track+0x18/0x40
[   28.405740]  kasan_save_alloc_info+0x3b/0x50
[   28.405902]  __kasan_kmalloc+0xb7/0xc0
[   28.406036]  __kmalloc_cache_noprof+0x189/0x420
[   28.406193]  kasan_atomics+0x95/0x310
[   28.406326]  kunit_try_run_case+0x1a5/0x480
[   28.406719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.406985]  kthread+0x337/0x6f0
[   28.407155]  ret_from_fork+0x116/0x1d0
[   28.407347]  ret_from_fork_asm+0x1a/0x30
[   28.407540] 
[   28.407633] The buggy address belongs to the object at ffff8881058a7e80
[   28.407633]  which belongs to the cache kmalloc-64 of size 64
[   28.408179] The buggy address is located 0 bytes to the right of
[   28.408179]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.408742] 
[   28.408934] The buggy address belongs to the physical page:
[   28.409192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.411753] flags: 0x200000000000000(node=0|zone=2)
[   28.412601] page_type: f5(slab)
[   28.413078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.413863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.414108] page dumped because: kasan: bad access detected
[   28.414887] 
[   28.415377] Memory state around the buggy address:
[   28.416332]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.417646]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.417913] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.418145]                                      ^
[   28.418312]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.418863]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.419481] ==================================================================
[   28.517076] ==================================================================
[   28.517383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   28.517763] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.518048] 
[   28.518135] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.518186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.518201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.518225] Call Trace:
[   28.518244]  <TASK>
[   28.518260]  dump_stack_lvl+0x73/0xb0
[   28.518288]  print_report+0xd1/0x640
[   28.518313]  ? __virt_addr_valid+0x1db/0x2d0
[   28.518338]  ? kasan_atomics_helper+0x164f/0x5450
[   28.518362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.518390]  ? kasan_atomics_helper+0x164f/0x5450
[   28.518413]  kasan_report+0x141/0x180
[   28.518438]  ? kasan_atomics_helper+0x164f/0x5450
[   28.518466]  kasan_check_range+0x10c/0x1c0
[   28.518492]  __kasan_check_write+0x18/0x20
[   28.518517]  kasan_atomics_helper+0x164f/0x5450
[   28.518543]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.518567]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.518593]  ? kasan_atomics+0x152/0x310
[   28.518621]  kasan_atomics+0x1dc/0x310
[   28.518645]  ? __pfx_kasan_atomics+0x10/0x10
[   28.518672]  ? __pfx_read_tsc+0x10/0x10
[   28.518695]  ? ktime_get_ts64+0x86/0x230
[   28.518722]  kunit_try_run_case+0x1a5/0x480
[   28.518748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.518773]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.518799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.518827]  ? __kthread_parkme+0x82/0x180
[   28.518861]  ? preempt_count_sub+0x50/0x80
[   28.518886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.518912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.518938]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.518964]  kthread+0x337/0x6f0
[   28.518987]  ? trace_preempt_on+0x20/0xc0
[   28.519013]  ? __pfx_kthread+0x10/0x10
[   28.519036]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.519061]  ? calculate_sigpending+0x7b/0xa0
[   28.519087]  ? __pfx_kthread+0x10/0x10
[   28.519110]  ret_from_fork+0x116/0x1d0
[   28.519132]  ? __pfx_kthread+0x10/0x10
[   28.519154]  ret_from_fork_asm+0x1a/0x30
[   28.519242]  </TASK>
[   28.519255] 
[   28.528222] Allocated by task 313:
[   28.528365]  kasan_save_stack+0x45/0x70
[   28.528540]  kasan_save_track+0x18/0x40
[   28.528738]  kasan_save_alloc_info+0x3b/0x50
[   28.529209]  __kasan_kmalloc+0xb7/0xc0
[   28.529389]  __kmalloc_cache_noprof+0x189/0x420
[   28.529749]  kasan_atomics+0x95/0x310
[   28.529954]  kunit_try_run_case+0x1a5/0x480
[   28.530134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.530325]  kthread+0x337/0x6f0
[   28.530448]  ret_from_fork+0x116/0x1d0
[   28.530581]  ret_from_fork_asm+0x1a/0x30
[   28.530722] 
[   28.530793] The buggy address belongs to the object at ffff8881058a7e80
[   28.530793]  which belongs to the cache kmalloc-64 of size 64
[   28.531168] The buggy address is located 0 bytes to the right of
[   28.531168]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.531739] 
[   28.531841] The buggy address belongs to the physical page:
[   28.532092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.532444] flags: 0x200000000000000(node=0|zone=2)
[   28.532725] page_type: f5(slab)
[   28.532862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.533104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.533334] page dumped because: kasan: bad access detected
[   28.533512] 
[   28.533650] Memory state around the buggy address:
[   28.533889]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.534268]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.534784] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.535120]                                      ^
[   28.535592]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.535872]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.536157] ==================================================================
[   28.497478] ==================================================================
[   28.497789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   28.498101] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.498491] 
[   28.498601] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.498652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.498667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.498689] Call Trace:
[   28.498706]  <TASK>
[   28.498723]  dump_stack_lvl+0x73/0xb0
[   28.498751]  print_report+0xd1/0x640
[   28.498776]  ? __virt_addr_valid+0x1db/0x2d0
[   28.498802]  ? kasan_atomics_helper+0x15b6/0x5450
[   28.498825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.498864]  ? kasan_atomics_helper+0x15b6/0x5450
[   28.498888]  kasan_report+0x141/0x180
[   28.498912]  ? kasan_atomics_helper+0x15b6/0x5450
[   28.498942]  kasan_check_range+0x10c/0x1c0
[   28.498969]  __kasan_check_write+0x18/0x20
[   28.498994]  kasan_atomics_helper+0x15b6/0x5450
[   28.499019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.499043]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.499070]  ? kasan_atomics+0x152/0x310
[   28.499098]  kasan_atomics+0x1dc/0x310
[   28.499122]  ? __pfx_kasan_atomics+0x10/0x10
[   28.499149]  ? __pfx_read_tsc+0x10/0x10
[   28.499172]  ? ktime_get_ts64+0x86/0x230
[   28.499198]  kunit_try_run_case+0x1a5/0x480
[   28.499225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.499251]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.499280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.499307]  ? __kthread_parkme+0x82/0x180
[   28.499329]  ? preempt_count_sub+0x50/0x80
[   28.499354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.499381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.499406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.499433]  kthread+0x337/0x6f0
[   28.499454]  ? trace_preempt_on+0x20/0xc0
[   28.499479]  ? __pfx_kthread+0x10/0x10
[   28.499502]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.499528]  ? calculate_sigpending+0x7b/0xa0
[   28.499554]  ? __pfx_kthread+0x10/0x10
[   28.499578]  ret_from_fork+0x116/0x1d0
[   28.499599]  ? __pfx_kthread+0x10/0x10
[   28.499622]  ret_from_fork_asm+0x1a/0x30
[   28.499654]  </TASK>
[   28.499667] 
[   28.507775] Allocated by task 313:
[   28.507929]  kasan_save_stack+0x45/0x70
[   28.508099]  kasan_save_track+0x18/0x40
[   28.508445]  kasan_save_alloc_info+0x3b/0x50
[   28.508705]  __kasan_kmalloc+0xb7/0xc0
[   28.508915]  __kmalloc_cache_noprof+0x189/0x420
[   28.509140]  kasan_atomics+0x95/0x310
[   28.509343]  kunit_try_run_case+0x1a5/0x480
[   28.509703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.509946]  kthread+0x337/0x6f0
[   28.510120]  ret_from_fork+0x116/0x1d0
[   28.510346]  ret_from_fork_asm+0x1a/0x30
[   28.510610] 
[   28.510689] The buggy address belongs to the object at ffff8881058a7e80
[   28.510689]  which belongs to the cache kmalloc-64 of size 64
[   28.511210] The buggy address is located 0 bytes to the right of
[   28.511210]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.511851] 
[   28.511938] The buggy address belongs to the physical page:
[   28.512188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.512577] flags: 0x200000000000000(node=0|zone=2)
[   28.512785] page_type: f5(slab)
[   28.512964] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.513205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.513435] page dumped because: kasan: bad access detected
[   28.513608] 
[   28.513676] Memory state around the buggy address:
[   28.513840]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.514159]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.514820] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.515155]                                      ^
[   28.515327]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.515957]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.516344] ==================================================================
[   28.073725] ==================================================================
[   28.073998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   28.074231] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.074523] 
[   28.075642] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.075695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.075710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.075732] Call Trace:
[   28.075749]  <TASK>
[   28.075764]  dump_stack_lvl+0x73/0xb0
[   28.075794]  print_report+0xd1/0x640
[   28.075820]  ? __virt_addr_valid+0x1db/0x2d0
[   28.075860]  ? kasan_atomics_helper+0xf10/0x5450
[   28.075885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.075914]  ? kasan_atomics_helper+0xf10/0x5450
[   28.075938]  kasan_report+0x141/0x180
[   28.075962]  ? kasan_atomics_helper+0xf10/0x5450
[   28.075990]  kasan_check_range+0x10c/0x1c0
[   28.076016]  __kasan_check_write+0x18/0x20
[   28.076042]  kasan_atomics_helper+0xf10/0x5450
[   28.076067]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.076091]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.076117]  ? kasan_atomics+0x152/0x310
[   28.076145]  kasan_atomics+0x1dc/0x310
[   28.076801]  ? __pfx_kasan_atomics+0x10/0x10
[   28.076850]  ? __pfx_read_tsc+0x10/0x10
[   28.076880]  ? ktime_get_ts64+0x86/0x230
[   28.076908]  kunit_try_run_case+0x1a5/0x480
[   28.076936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.076961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.076988]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.077016]  ? __kthread_parkme+0x82/0x180
[   28.077037]  ? preempt_count_sub+0x50/0x80
[   28.077062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.077088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.077114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.077139]  kthread+0x337/0x6f0
[   28.077409]  ? trace_preempt_on+0x20/0xc0
[   28.077437]  ? __pfx_kthread+0x10/0x10
[   28.077508]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.077537]  ? calculate_sigpending+0x7b/0xa0
[   28.077563]  ? __pfx_kthread+0x10/0x10
[   28.077586]  ret_from_fork+0x116/0x1d0
[   28.077607]  ? __pfx_kthread+0x10/0x10
[   28.077630]  ret_from_fork_asm+0x1a/0x30
[   28.077663]  </TASK>
[   28.077676] 
[   28.087655] Allocated by task 313:
[   28.088433]  kasan_save_stack+0x45/0x70
[   28.088951]  kasan_save_track+0x18/0x40
[   28.089617]  kasan_save_alloc_info+0x3b/0x50
[   28.090255]  __kasan_kmalloc+0xb7/0xc0
[   28.090923]  __kmalloc_cache_noprof+0x189/0x420
[   28.091651]  kasan_atomics+0x95/0x310
[   28.092304]  kunit_try_run_case+0x1a5/0x480
[   28.093092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.093951]  kthread+0x337/0x6f0
[   28.094559]  ret_from_fork+0x116/0x1d0
[   28.095257]  ret_from_fork_asm+0x1a/0x30
[   28.095905] 
[   28.096308] The buggy address belongs to the object at ffff8881058a7e80
[   28.096308]  which belongs to the cache kmalloc-64 of size 64
[   28.098153] The buggy address is located 0 bytes to the right of
[   28.098153]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.099925] 
[   28.100397] The buggy address belongs to the physical page:
[   28.101041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.101838] flags: 0x200000000000000(node=0|zone=2)
[   28.102514] page_type: f5(slab)
[   28.102652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.102904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.103138] page dumped because: kasan: bad access detected
[   28.103625] 
[   28.103872] Memory state around the buggy address:
[   28.104281]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.105119]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.105885] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.106640]                                      ^
[   28.107096]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.107708]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.108239] ==================================================================
[   28.727087] ==================================================================
[   28.727475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   28.727794] Write of size 8 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.728093] 
[   28.728197] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.728246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.728261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.728285] Call Trace:
[   28.728303]  <TASK>
[   28.728318]  dump_stack_lvl+0x73/0xb0
[   28.728348]  print_report+0xd1/0x640
[   28.728373]  ? __virt_addr_valid+0x1db/0x2d0
[   28.728399]  ? kasan_atomics_helper+0x1b22/0x5450
[   28.728422]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.728450]  ? kasan_atomics_helper+0x1b22/0x5450
[   28.728473]  kasan_report+0x141/0x180
[   28.728497]  ? kasan_atomics_helper+0x1b22/0x5450
[   28.728525]  kasan_check_range+0x10c/0x1c0
[   28.728551]  __kasan_check_write+0x18/0x20
[   28.728575]  kasan_atomics_helper+0x1b22/0x5450
[   28.728600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.728623]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.728649]  ? kasan_atomics+0x152/0x310
[   28.728677]  kasan_atomics+0x1dc/0x310
[   28.728702]  ? __pfx_kasan_atomics+0x10/0x10
[   28.728727]  ? __pfx_read_tsc+0x10/0x10
[   28.728751]  ? ktime_get_ts64+0x86/0x230
[   28.728777]  kunit_try_run_case+0x1a5/0x480
[   28.728803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.728828]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.728874]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.728902]  ? __kthread_parkme+0x82/0x180
[   28.728923]  ? preempt_count_sub+0x50/0x80
[   28.728948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.728974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.728999]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.729024]  kthread+0x337/0x6f0
[   28.729046]  ? trace_preempt_on+0x20/0xc0
[   28.729071]  ? __pfx_kthread+0x10/0x10
[   28.729093]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.729118]  ? calculate_sigpending+0x7b/0xa0
[   28.729144]  ? __pfx_kthread+0x10/0x10
[   28.729167]  ret_from_fork+0x116/0x1d0
[   28.729189]  ? __pfx_kthread+0x10/0x10
[   28.729211]  ret_from_fork_asm+0x1a/0x30
[   28.729243]  </TASK>
[   28.729255] 
[   28.736770] Allocated by task 313:
[   28.736926]  kasan_save_stack+0x45/0x70
[   28.737946]  kasan_save_track+0x18/0x40
[   28.738132]  kasan_save_alloc_info+0x3b/0x50
[   28.738282]  __kasan_kmalloc+0xb7/0xc0
[   28.738412]  __kmalloc_cache_noprof+0x189/0x420
[   28.738914]  kasan_atomics+0x95/0x310
[   28.739229]  kunit_try_run_case+0x1a5/0x480
[   28.739425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.739691]  kthread+0x337/0x6f0
[   28.739811]  ret_from_fork+0x116/0x1d0
[   28.739949]  ret_from_fork_asm+0x1a/0x30
[   28.740179] 
[   28.740276] The buggy address belongs to the object at ffff8881058a7e80
[   28.740276]  which belongs to the cache kmalloc-64 of size 64
[   28.740892] The buggy address is located 0 bytes to the right of
[   28.740892]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.741880] 
[   28.741992] The buggy address belongs to the physical page:
[   28.742210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.743356] flags: 0x200000000000000(node=0|zone=2)
[   28.744128] page_type: f5(slab)
[   28.744368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.744619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.744872] page dumped because: kasan: bad access detected
[   28.745051] 
[   28.745121] Memory state around the buggy address:
[   28.745280]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.745502]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.745723] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.746983]                                      ^
[   28.747960]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.749073]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.750212] ==================================================================
[   27.914296] ==================================================================
[   27.915128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   27.915624] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.916234] 
[   27.916491] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.916554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.916569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.916594] Call Trace:
[   27.916614]  <TASK>
[   27.916632]  dump_stack_lvl+0x73/0xb0
[   27.916662]  print_report+0xd1/0x640
[   27.916687]  ? __virt_addr_valid+0x1db/0x2d0
[   27.916712]  ? kasan_atomics_helper+0xb6a/0x5450
[   27.916737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.916767]  ? kasan_atomics_helper+0xb6a/0x5450
[   27.916791]  kasan_report+0x141/0x180
[   27.916816]  ? kasan_atomics_helper+0xb6a/0x5450
[   27.916855]  kasan_check_range+0x10c/0x1c0
[   27.916885]  __kasan_check_write+0x18/0x20
[   27.916911]  kasan_atomics_helper+0xb6a/0x5450
[   27.916936]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.916960]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.916987]  ? kasan_atomics+0x152/0x310
[   27.917015]  kasan_atomics+0x1dc/0x310
[   27.917040]  ? __pfx_kasan_atomics+0x10/0x10
[   27.917067]  ? __pfx_read_tsc+0x10/0x10
[   27.917091]  ? ktime_get_ts64+0x86/0x230
[   27.917117]  kunit_try_run_case+0x1a5/0x480
[   27.917144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.917303]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.917341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.917385]  ? __kthread_parkme+0x82/0x180
[   27.917409]  ? preempt_count_sub+0x50/0x80
[   27.917478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.917506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.917533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.917558]  kthread+0x337/0x6f0
[   27.917580]  ? trace_preempt_on+0x20/0xc0
[   27.917607]  ? __pfx_kthread+0x10/0x10
[   27.917630]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.917655]  ? calculate_sigpending+0x7b/0xa0
[   27.917680]  ? __pfx_kthread+0x10/0x10
[   27.917703]  ret_from_fork+0x116/0x1d0
[   27.917725]  ? __pfx_kthread+0x10/0x10
[   27.917747]  ret_from_fork_asm+0x1a/0x30
[   27.917779]  </TASK>
[   27.917792] 
[   27.931307] Allocated by task 313:
[   27.931663]  kasan_save_stack+0x45/0x70
[   27.931868]  kasan_save_track+0x18/0x40
[   27.932053]  kasan_save_alloc_info+0x3b/0x50
[   27.932654]  __kasan_kmalloc+0xb7/0xc0
[   27.933084]  __kmalloc_cache_noprof+0x189/0x420
[   27.933374]  kasan_atomics+0x95/0x310
[   27.933752]  kunit_try_run_case+0x1a5/0x480
[   27.933976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.934502]  kthread+0x337/0x6f0
[   27.934956]  ret_from_fork+0x116/0x1d0
[   27.935326]  ret_from_fork_asm+0x1a/0x30
[   27.935809] 
[   27.935936] The buggy address belongs to the object at ffff8881058a7e80
[   27.935936]  which belongs to the cache kmalloc-64 of size 64
[   27.937000] The buggy address is located 0 bytes to the right of
[   27.937000]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.937758] 
[   27.937869] The buggy address belongs to the physical page:
[   27.938091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.939060] flags: 0x200000000000000(node=0|zone=2)
[   27.939354] page_type: f5(slab)
[   27.939871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.940599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.940921] page dumped because: kasan: bad access detected
[   27.941148] 
[   27.941497] Memory state around the buggy address:
[   27.941726]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.942022]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.942677] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.942984]                                      ^
[   27.943474]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.943998]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.944697] ==================================================================
[   28.141846] ==================================================================
[   28.142206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   28.142693] Read of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   28.143037] 
[   28.143134] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   28.143186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.143203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.143230] Call Trace:
[   28.143245]  <TASK>
[   28.143262]  dump_stack_lvl+0x73/0xb0
[   28.143292]  print_report+0xd1/0x640
[   28.143316]  ? __virt_addr_valid+0x1db/0x2d0
[   28.143342]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.143365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.143394]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.143418]  kasan_report+0x141/0x180
[   28.143442]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.143483]  __asan_report_load4_noabort+0x18/0x20
[   28.143510]  kasan_atomics_helper+0x4a36/0x5450
[   28.143535]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.143560]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.143587]  ? kasan_atomics+0x152/0x310
[   28.143615]  kasan_atomics+0x1dc/0x310
[   28.143641]  ? __pfx_kasan_atomics+0x10/0x10
[   28.143667]  ? __pfx_read_tsc+0x10/0x10
[   28.143691]  ? ktime_get_ts64+0x86/0x230
[   28.143716]  kunit_try_run_case+0x1a5/0x480
[   28.143743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.143768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.143796]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.143823]  ? __kthread_parkme+0x82/0x180
[   28.143855]  ? preempt_count_sub+0x50/0x80
[   28.143880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.143907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.143933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.143960]  kthread+0x337/0x6f0
[   28.143981]  ? trace_preempt_on+0x20/0xc0
[   28.144006]  ? __pfx_kthread+0x10/0x10
[   28.144029]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.144055]  ? calculate_sigpending+0x7b/0xa0
[   28.144080]  ? __pfx_kthread+0x10/0x10
[   28.144103]  ret_from_fork+0x116/0x1d0
[   28.144124]  ? __pfx_kthread+0x10/0x10
[   28.144147]  ret_from_fork_asm+0x1a/0x30
[   28.144179]  </TASK>
[   28.144193] 
[   28.157189] Allocated by task 313:
[   28.157372]  kasan_save_stack+0x45/0x70
[   28.157616]  kasan_save_track+0x18/0x40
[   28.157785]  kasan_save_alloc_info+0x3b/0x50
[   28.157974]  __kasan_kmalloc+0xb7/0xc0
[   28.158134]  __kmalloc_cache_noprof+0x189/0x420
[   28.158816]  kasan_atomics+0x95/0x310
[   28.159365]  kunit_try_run_case+0x1a5/0x480
[   28.159972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.160408]  kthread+0x337/0x6f0
[   28.160751]  ret_from_fork+0x116/0x1d0
[   28.160963]  ret_from_fork_asm+0x1a/0x30
[   28.161137] 
[   28.161609] The buggy address belongs to the object at ffff8881058a7e80
[   28.161609]  which belongs to the cache kmalloc-64 of size 64
[   28.162363] The buggy address is located 0 bytes to the right of
[   28.162363]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   28.163427] 
[   28.163710] The buggy address belongs to the physical page:
[   28.163966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   28.164525] flags: 0x200000000000000(node=0|zone=2)
[   28.164988] page_type: f5(slab)
[   28.165345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.165962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.166580] page dumped because: kasan: bad access detected
[   28.166838] 
[   28.166930] Memory state around the buggy address:
[   28.167138]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.167419]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.168135] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.168741]                                      ^
[   28.169157]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.169646]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.170098] ==================================================================
[   27.618473] ==================================================================
[   27.618995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   27.619374] Write of size 4 at addr ffff8881058a7eb0 by task kunit_try_catch/313
[   27.619799] 
[   27.619922] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   27.619972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.619989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.620011] Call Trace:
[   27.620028]  <TASK>
[   27.620044]  dump_stack_lvl+0x73/0xb0
[   27.620074]  print_report+0xd1/0x640
[   27.620099]  ? __virt_addr_valid+0x1db/0x2d0
[   27.620125]  ? kasan_atomics_helper+0x4a0/0x5450
[   27.620176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.620204]  ? kasan_atomics_helper+0x4a0/0x5450
[   27.620228]  kasan_report+0x141/0x180
[   27.620263]  ? kasan_atomics_helper+0x4a0/0x5450
[   27.620290]  kasan_check_range+0x10c/0x1c0
[   27.620316]  __kasan_check_write+0x18/0x20
[   27.620341]  kasan_atomics_helper+0x4a0/0x5450
[   27.620375]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.620399]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.620424]  ? kasan_atomics+0x152/0x310
[   27.620518]  kasan_atomics+0x1dc/0x310
[   27.620549]  ? __pfx_kasan_atomics+0x10/0x10
[   27.620574]  ? __pfx_read_tsc+0x10/0x10
[   27.620598]  ? ktime_get_ts64+0x86/0x230
[   27.620623]  kunit_try_run_case+0x1a5/0x480
[   27.620651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.620675]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.620702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.620730]  ? __kthread_parkme+0x82/0x180
[   27.620751]  ? preempt_count_sub+0x50/0x80
[   27.620776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.620802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.620839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.620869]  kthread+0x337/0x6f0
[   27.620891]  ? trace_preempt_on+0x20/0xc0
[   27.620917]  ? __pfx_kthread+0x10/0x10
[   27.620939]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.620964]  ? calculate_sigpending+0x7b/0xa0
[   27.620990]  ? __pfx_kthread+0x10/0x10
[   27.621012]  ret_from_fork+0x116/0x1d0
[   27.621034]  ? __pfx_kthread+0x10/0x10
[   27.621056]  ret_from_fork_asm+0x1a/0x30
[   27.621089]  </TASK>
[   27.621103] 
[   27.629376] Allocated by task 313:
[   27.629521]  kasan_save_stack+0x45/0x70
[   27.629672]  kasan_save_track+0x18/0x40
[   27.629813]  kasan_save_alloc_info+0x3b/0x50
[   27.630219]  __kasan_kmalloc+0xb7/0xc0
[   27.630524]  __kmalloc_cache_noprof+0x189/0x420
[   27.630757]  kasan_atomics+0x95/0x310
[   27.630960]  kunit_try_run_case+0x1a5/0x480
[   27.631172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.631463]  kthread+0x337/0x6f0
[   27.631668]  ret_from_fork+0x116/0x1d0
[   27.631871]  ret_from_fork_asm+0x1a/0x30
[   27.632071] 
[   27.632185] The buggy address belongs to the object at ffff8881058a7e80
[   27.632185]  which belongs to the cache kmalloc-64 of size 64
[   27.632742] The buggy address is located 0 bytes to the right of
[   27.632742]  allocated 48-byte region [ffff8881058a7e80, ffff8881058a7eb0)
[   27.633303] 
[   27.633379] The buggy address belongs to the physical page:
[   27.633622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   27.633901] flags: 0x200000000000000(node=0|zone=2)
[   27.634148] page_type: f5(slab)
[   27.634339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.634869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.635214] page dumped because: kasan: bad access detected
[   27.635460] 
[   27.635543] Memory state around the buggy address:
[   27.635702]  ffff8881058a7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.636034]  ffff8881058a7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.636522] >ffff8881058a7e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.636842]                                      ^
[   27.637088]  ffff8881058a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.637422]  ffff8881058a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.637779] ==================================================================