Hay
Date
July 16, 2025, 12:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   33.546725] ==================================================================
[   33.546777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.546829] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.546881] 
[   33.546911] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.546999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.547027] Hardware name: linux,dummy-virt (DT)
[   33.547061] Call trace:
[   33.547151]  show_stack+0x20/0x38 (C)
[   33.547206]  dump_stack_lvl+0x8c/0xd0
[   33.547290]  print_report+0x118/0x5d0
[   33.547367]  kasan_report+0xdc/0x128
[   33.547424]  __asan_report_load8_noabort+0x20/0x30
[   33.547528]  kasan_atomics_helper+0x3e20/0x4858
[   33.547617]  kasan_atomics+0x198/0x2e0
[   33.547666]  kunit_try_run_case+0x170/0x3f0
[   33.547715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.547770]  kthread+0x328/0x630
[   33.547818]  ret_from_fork+0x10/0x20
[   33.547868] 
[   33.547888] Allocated by task 296:
[   33.547919]  kasan_save_stack+0x3c/0x68
[   33.547959]  kasan_save_track+0x20/0x40
[   33.547999]  kasan_save_alloc_info+0x40/0x58
[   33.548040]  __kasan_kmalloc+0xd4/0xd8
[   33.548081]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.548125]  kasan_atomics+0xb8/0x2e0
[   33.548181]  kunit_try_run_case+0x170/0x3f0
[   33.548220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.548266]  kthread+0x328/0x630
[   33.549277]  ret_from_fork+0x10/0x20
[   33.549410] 
[   33.549491] The buggy address belongs to the object at fff00000c9bb2f80
[   33.549491]  which belongs to the cache kmalloc-64 of size 64
[   33.549581] The buggy address is located 0 bytes to the right of
[   33.549581]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.549658] 
[   33.549679] The buggy address belongs to the physical page:
[   33.549714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.549770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.549822] page_type: f5(slab)
[   33.549860] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.549914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.549956] page dumped because: kasan: bad access detected
[   33.549991] 
[   33.550011] Memory state around the buggy address:
[   33.550046]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.550094]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.550178] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.550266]                                      ^
[   33.550411]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.550555]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.550632] ==================================================================
[   33.503600] ==================================================================
[   33.503666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.503845] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.503918] 
[   33.503977] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.504194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.504274] Hardware name: linux,dummy-virt (DT)
[   33.504364] Call trace:
[   33.504389]  show_stack+0x20/0x38 (C)
[   33.504463]  dump_stack_lvl+0x8c/0xd0
[   33.504527]  print_report+0x118/0x5d0
[   33.504573]  kasan_report+0xdc/0x128
[   33.504617]  kasan_check_range+0x100/0x1a8
[   33.504781]  __kasan_check_write+0x20/0x30
[   33.504944]  kasan_atomics_helper+0x14e4/0x4858
[   33.505067]  kasan_atomics+0x198/0x2e0
[   33.505146]  kunit_try_run_case+0x170/0x3f0
[   33.505204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.505261]  kthread+0x328/0x630
[   33.505451]  ret_from_fork+0x10/0x20
[   33.505587] 
[   33.505631] Allocated by task 296:
[   33.505757]  kasan_save_stack+0x3c/0x68
[   33.505797]  kasan_save_track+0x20/0x40
[   33.505860]  kasan_save_alloc_info+0x40/0x58
[   33.505902]  __kasan_kmalloc+0xd4/0xd8
[   33.506088]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.506167]  kasan_atomics+0xb8/0x2e0
[   33.506273]  kunit_try_run_case+0x170/0x3f0
[   33.506349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.506617]  kthread+0x328/0x630
[   33.506717]  ret_from_fork+0x10/0x20
[   33.506788] 
[   33.506810] The buggy address belongs to the object at fff00000c9bb2f80
[   33.506810]  which belongs to the cache kmalloc-64 of size 64
[   33.506883] The buggy address is located 0 bytes to the right of
[   33.506883]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.506951] 
[   33.506974] The buggy address belongs to the physical page:
[   33.507009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.507070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.507121] page_type: f5(slab)
[   33.507176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.507230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.507284] page dumped because: kasan: bad access detected
[   33.507327] 
[   33.507357] Memory state around the buggy address:
[   33.507412]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.507459]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.507514] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.507556]                                      ^
[   33.507592]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.507638]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.507695] ==================================================================
[   33.489915] ==================================================================
[   33.489966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.490037] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.490091] 
[   33.490123] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.490323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.490523] Hardware name: linux,dummy-virt (DT)
[   33.490631] Call trace:
[   33.490717]  show_stack+0x20/0x38 (C)
[   33.490769]  dump_stack_lvl+0x8c/0xd0
[   33.490820]  print_report+0x118/0x5d0
[   33.490994]  kasan_report+0xdc/0x128
[   33.491174]  __asan_report_load8_noabort+0x20/0x30
[   33.491273]  kasan_atomics_helper+0x3f04/0x4858
[   33.491377]  kasan_atomics+0x198/0x2e0
[   33.491453]  kunit_try_run_case+0x170/0x3f0
[   33.491574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.491669]  kthread+0x328/0x630
[   33.491783]  ret_from_fork+0x10/0x20
[   33.491836] 
[   33.491856] Allocated by task 296:
[   33.491901]  kasan_save_stack+0x3c/0x68
[   33.492021]  kasan_save_track+0x20/0x40
[   33.492116]  kasan_save_alloc_info+0x40/0x58
[   33.492276]  __kasan_kmalloc+0xd4/0xd8
[   33.492317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.492378]  kasan_atomics+0xb8/0x2e0
[   33.492418]  kunit_try_run_case+0x170/0x3f0
[   33.492628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.492695]  kthread+0x328/0x630
[   33.492815]  ret_from_fork+0x10/0x20
[   33.492922] 
[   33.493000] The buggy address belongs to the object at fff00000c9bb2f80
[   33.493000]  which belongs to the cache kmalloc-64 of size 64
[   33.493284] The buggy address is located 0 bytes to the right of
[   33.493284]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.493410] 
[   33.493462] The buggy address belongs to the physical page:
[   33.493496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.493585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.493678] page_type: f5(slab)
[   33.493717] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.493768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.493814] page dumped because: kasan: bad access detected
[   33.493847] 
[   33.493867] Memory state around the buggy address:
[   33.494135]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.494249]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.494303] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.494380]                                      ^
[   33.494437]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.494593]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.494738] ==================================================================
[   33.350590] ==================================================================
[   33.350645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.350698] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.350780] 
[   33.350818] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.350906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.350970] Hardware name: linux,dummy-virt (DT)
[   33.351019] Call trace:
[   33.351044]  show_stack+0x20/0x38 (C)
[   33.351111]  dump_stack_lvl+0x8c/0xd0
[   33.351172]  print_report+0x118/0x5d0
[   33.351217]  kasan_report+0xdc/0x128
[   33.351270]  kasan_check_range+0x100/0x1a8
[   33.351319]  __kasan_check_write+0x20/0x30
[   33.351365]  kasan_atomics_helper+0x99c/0x4858
[   33.351416]  kasan_atomics+0x198/0x2e0
[   33.351462]  kunit_try_run_case+0x170/0x3f0
[   33.351665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.351759]  kthread+0x328/0x630
[   33.351868]  ret_from_fork+0x10/0x20
[   33.352029] 
[   33.352139] Allocated by task 296:
[   33.352226]  kasan_save_stack+0x3c/0x68
[   33.352320]  kasan_save_track+0x20/0x40
[   33.352447]  kasan_save_alloc_info+0x40/0x58
[   33.352603]  __kasan_kmalloc+0xd4/0xd8
[   33.352667]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.352711]  kasan_atomics+0xb8/0x2e0
[   33.352773]  kunit_try_run_case+0x170/0x3f0
[   33.352814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.353009]  kthread+0x328/0x630
[   33.353212]  ret_from_fork+0x10/0x20
[   33.353309] 
[   33.353332] The buggy address belongs to the object at fff00000c9bb2f80
[   33.353332]  which belongs to the cache kmalloc-64 of size 64
[   33.353427] The buggy address is located 0 bytes to the right of
[   33.353427]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.353591] 
[   33.353661] The buggy address belongs to the physical page:
[   33.353723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.353846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.354030] page_type: f5(slab)
[   33.354171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.354235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.354316] page dumped because: kasan: bad access detected
[   33.354350] 
[   33.354377] Memory state around the buggy address:
[   33.354480]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.355239] ==================================================================
[   33.495313] ==================================================================
[   33.495366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.495433] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.495494] 
[   33.495538] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.495789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.495845] Hardware name: linux,dummy-virt (DT)
[   33.495880] Call trace:
[   33.495903]  show_stack+0x20/0x38 (C)
[   33.496063]  dump_stack_lvl+0x8c/0xd0
[   33.496117]  print_report+0x118/0x5d0
[   33.496232]  kasan_report+0xdc/0x128
[   33.496559]  kasan_check_range+0x100/0x1a8
[   33.496680]  __kasan_check_write+0x20/0x30
[   33.496786]  kasan_atomics_helper+0x1414/0x4858
[   33.496867]  kasan_atomics+0x198/0x2e0
[   33.497009]  kunit_try_run_case+0x170/0x3f0
[   33.497123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.497201]  kthread+0x328/0x630
[   33.497253]  ret_from_fork+0x10/0x20
[   33.497303] 
[   33.497324] Allocated by task 296:
[   33.497379]  kasan_save_stack+0x3c/0x68
[   33.497420]  kasan_save_track+0x20/0x40
[   33.497459]  kasan_save_alloc_info+0x40/0x58
[   33.497500]  __kasan_kmalloc+0xd4/0xd8
[   33.497552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.497596]  kasan_atomics+0xb8/0x2e0
[   33.497636]  kunit_try_run_case+0x170/0x3f0
[   33.497677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.497722]  kthread+0x328/0x630
[   33.497847]  ret_from_fork+0x10/0x20
[   33.498119] 
[   33.498196] The buggy address belongs to the object at fff00000c9bb2f80
[   33.498196]  which belongs to the cache kmalloc-64 of size 64
[   33.498376] The buggy address is located 0 bytes to the right of
[   33.498376]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.498686] 
[   33.498772] The buggy address belongs to the physical page:
[   33.498816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.498870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.498920] page_type: f5(slab)
[   33.498987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.499245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.499310] page dumped because: kasan: bad access detected
[   33.499378] 
[   33.499428] Memory state around the buggy address:
[   33.499474]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.499724]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.499784] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.499826]                                      ^
[   33.500016]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.500104]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.500231] ==================================================================
[   33.531523] ==================================================================
[   33.531571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.531620] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.531736] 
[   33.531831] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.531980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.532054] Hardware name: linux,dummy-virt (DT)
[   33.532141] Call trace:
[   33.532209]  show_stack+0x20/0x38 (C)
[   33.532257]  dump_stack_lvl+0x8c/0xd0
[   33.532306]  print_report+0x118/0x5d0
[   33.532351]  kasan_report+0xdc/0x128
[   33.532667]  __asan_report_load8_noabort+0x20/0x30
[   33.532812]  kasan_atomics_helper+0x3e10/0x4858
[   33.532930]  kasan_atomics+0x198/0x2e0
[   33.532999]  kunit_try_run_case+0x170/0x3f0
[   33.533049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.533289]  kthread+0x328/0x630
[   33.533384]  ret_from_fork+0x10/0x20
[   33.533434] 
[   33.533455] Allocated by task 296:
[   33.533527]  kasan_save_stack+0x3c/0x68
[   33.533569]  kasan_save_track+0x20/0x40
[   33.533608]  kasan_save_alloc_info+0x40/0x58
[   33.533649]  __kasan_kmalloc+0xd4/0xd8
[   33.533806]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.533963]  kasan_atomics+0xb8/0x2e0
[   33.534028]  kunit_try_run_case+0x170/0x3f0
[   33.534319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.534440]  kthread+0x328/0x630
[   33.534545]  ret_from_fork+0x10/0x20
[   33.534624] 
[   33.534664] The buggy address belongs to the object at fff00000c9bb2f80
[   33.534664]  which belongs to the cache kmalloc-64 of size 64
[   33.534726] The buggy address is located 0 bytes to the right of
[   33.534726]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.534991] 
[   33.535015] The buggy address belongs to the physical page:
[   33.535066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.535156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.535288] page_type: f5(slab)
[   33.535354] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.535407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.535451] page dumped because: kasan: bad access detected
[   33.535589] 
[   33.535650] Memory state around the buggy address:
[   33.535801]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.535897]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.536005] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.536074]                                      ^
[   33.536133]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.536356]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.536409] ==================================================================
[   33.501226] ==================================================================
[   33.501284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.501334] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.501386] 
[   33.501418] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.501518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.501548] Hardware name: linux,dummy-virt (DT)
[   33.501580] Call trace:
[   33.501605]  show_stack+0x20/0x38 (C)
[   33.501652]  dump_stack_lvl+0x8c/0xd0
[   33.501702]  print_report+0x118/0x5d0
[   33.501746]  kasan_report+0xdc/0x128
[   33.501790]  kasan_check_range+0x100/0x1a8
[   33.501838]  __kasan_check_write+0x20/0x30
[   33.501886]  kasan_atomics_helper+0x147c/0x4858
[   33.501938]  kasan_atomics+0x198/0x2e0
[   33.501987]  kunit_try_run_case+0x170/0x3f0
[   33.502035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.502090]  kthread+0x328/0x630
[   33.502133]  ret_from_fork+0x10/0x20
[   33.502180] 
[   33.502202] Allocated by task 296:
[   33.502232]  kasan_save_stack+0x3c/0x68
[   33.502271]  kasan_save_track+0x20/0x40
[   33.502309]  kasan_save_alloc_info+0x40/0x58
[   33.502350]  __kasan_kmalloc+0xd4/0xd8
[   33.502395]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.502438]  kasan_atomics+0xb8/0x2e0
[   33.502477]  kunit_try_run_case+0x170/0x3f0
[   33.502529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.502575]  kthread+0x328/0x630
[   33.502610]  ret_from_fork+0x10/0x20
[   33.502648] 
[   33.502669] The buggy address belongs to the object at fff00000c9bb2f80
[   33.502669]  which belongs to the cache kmalloc-64 of size 64
[   33.502730] The buggy address is located 0 bytes to the right of
[   33.502730]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.502797] 
[   33.502820] The buggy address belongs to the physical page:
[   33.502854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.502904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.502954] page_type: f5(slab)
[   33.502991] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.503045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.503088] page dumped because: kasan: bad access detected
[   33.503122] 
[   33.503142] Memory state around the buggy address:
[   33.503176]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.503221]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.503266] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.503307]                                      ^
[   33.503342]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.503387]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.503428] ==================================================================
[   33.401627] ==================================================================
[   33.401678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.401884] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.401958] 
[   33.402008] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.402154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.402212] Hardware name: linux,dummy-virt (DT)
[   33.402246] Call trace:
[   33.402298]  show_stack+0x20/0x38 (C)
[   33.402372]  dump_stack_lvl+0x8c/0xd0
[   33.402422]  print_report+0x118/0x5d0
[   33.402469]  kasan_report+0xdc/0x128
[   33.402552]  kasan_check_range+0x100/0x1a8
[   33.402778]  __kasan_check_write+0x20/0x30
[   33.402851]  kasan_atomics_helper+0xd3c/0x4858
[   33.402910]  kasan_atomics+0x198/0x2e0
[   33.402960]  kunit_try_run_case+0x170/0x3f0
[   33.403009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.403064]  kthread+0x328/0x630
[   33.403105]  ret_from_fork+0x10/0x20
[   33.403155] 
[   33.403175] Allocated by task 296:
[   33.403205]  kasan_save_stack+0x3c/0x68
[   33.403246]  kasan_save_track+0x20/0x40
[   33.403286]  kasan_save_alloc_info+0x40/0x58
[   33.403328]  __kasan_kmalloc+0xd4/0xd8
[   33.403368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.403422]  kasan_atomics+0xb8/0x2e0
[   33.403462]  kunit_try_run_case+0x170/0x3f0
[   33.403522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.403570]  kthread+0x328/0x630
[   33.403605]  ret_from_fork+0x10/0x20
[   33.403644] 
[   33.403665] The buggy address belongs to the object at fff00000c9bb2f80
[   33.403665]  which belongs to the cache kmalloc-64 of size 64
[   33.403910] The buggy address is located 0 bytes to the right of
[   33.403910]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.404161] 
[   33.404196] The buggy address belongs to the physical page:
[   33.404229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.404403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.406008] page_type: f5(slab)
[   33.406063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.406117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.406161] page dumped because: kasan: bad access detected
[   33.406197] 
[   33.406217] Memory state around the buggy address:
[   33.406253]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.406300]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.406346] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.406393]                                      ^
[   33.406429]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.406474]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.406527] ==================================================================
[   33.406935] ==================================================================
[   33.406985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.407037] Read of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.407091] 
[   33.407122] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.407208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.407237] Hardware name: linux,dummy-virt (DT)
[   33.407272] Call trace:
[   33.407295]  show_stack+0x20/0x38 (C)
[   33.407345]  dump_stack_lvl+0x8c/0xd0
[   33.407395]  print_report+0x118/0x5d0
[   33.407441]  kasan_report+0xdc/0x128
[   33.407487]  __asan_report_load4_noabort+0x20/0x30
[   33.407556]  kasan_atomics_helper+0x3e04/0x4858
[   33.407608]  kasan_atomics+0x198/0x2e0
[   33.407658]  kunit_try_run_case+0x170/0x3f0
[   33.407708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.407763]  kthread+0x328/0x630
[   33.407807]  ret_from_fork+0x10/0x20
[   33.407855] 
[   33.407893] Allocated by task 296:
[   33.407925]  kasan_save_stack+0x3c/0x68
[   33.407965]  kasan_save_track+0x20/0x40
[   33.408014]  kasan_save_alloc_info+0x40/0x58
[   33.408062]  __kasan_kmalloc+0xd4/0xd8
[   33.408103]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.408149]  kasan_atomics+0xb8/0x2e0
[   33.408188]  kunit_try_run_case+0x170/0x3f0
[   33.408228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.408280]  kthread+0x328/0x630
[   33.408320]  ret_from_fork+0x10/0x20
[   33.408359] 
[   33.408380] The buggy address belongs to the object at fff00000c9bb2f80
[   33.408380]  which belongs to the cache kmalloc-64 of size 64
[   33.408441] The buggy address is located 0 bytes to the right of
[   33.408441]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.408526] 
[   33.408553] The buggy address belongs to the physical page:
[   33.408595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.408650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.408701] page_type: f5(slab)
[   33.408741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.408802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.408846] page dumped because: kasan: bad access detected
[   33.408880] 
[   33.408908] Memory state around the buggy address:
[   33.408951]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.408997]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.409043] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.409083]                                      ^
[   33.409118]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.409164]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.409205] ==================================================================
[   33.364777] ==================================================================
[   33.364879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.364931] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.364983] 
[   33.365012] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.365101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.365277] Hardware name: linux,dummy-virt (DT)
[   33.365529]  kasan_report+0xdc/0x128
[   33.365933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.366585]  __kasan_kmalloc+0xd4/0xd8
[   33.366966] The buggy address is located 0 bytes to the right of
[   33.366966]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.367033] 
[   33.367069] The buggy address belongs to the physical page:
[   33.367103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.367157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.367209] page_type: f5(slab)
[   33.367248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.367311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.367369] page dumped because: kasan: bad access detected
[   33.367402] 
[   33.367424] Memory state around the buggy address:
[   33.367468]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.367525]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.367576] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.367617]                                      ^
[   33.367652]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.367697]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.367740] ==================================================================
[   33.421087] ==================================================================
[   33.421170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.421221] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.421311] 
[   33.421370] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.421487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.421529] Hardware name: linux,dummy-virt (DT)
[   33.421561] Call trace:
[   33.421586]  show_stack+0x20/0x38 (C)
[   33.421675]  dump_stack_lvl+0x8c/0xd0
[   33.421724]  print_report+0x118/0x5d0
[   33.421771]  kasan_report+0xdc/0x128
[   33.421816]  kasan_check_range+0x100/0x1a8
[   33.421864]  __kasan_check_write+0x20/0x30
[   33.422018]  kasan_atomics_helper+0xe44/0x4858
[   33.422150]  kasan_atomics+0x198/0x2e0
[   33.422203]  kunit_try_run_case+0x170/0x3f0
[   33.422269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.422337]  kthread+0x328/0x630
[   33.422411]  ret_from_fork+0x10/0x20
[   33.422691] 
[   33.422753] Allocated by task 296:
[   33.422787]  kasan_save_stack+0x3c/0x68
[   33.422832]  kasan_save_track+0x20/0x40
[   33.422891]  kasan_save_alloc_info+0x40/0x58
[   33.423012]  __kasan_kmalloc+0xd4/0xd8
[   33.423055]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.423098]  kasan_atomics+0xb8/0x2e0
[   33.423151]  kunit_try_run_case+0x170/0x3f0
[   33.423192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.423238]  kthread+0x328/0x630
[   33.423445]  ret_from_fork+0x10/0x20
[   33.423498] 
[   33.423607] The buggy address belongs to the object at fff00000c9bb2f80
[   33.423607]  which belongs to the cache kmalloc-64 of size 64
[   33.423727] The buggy address is located 0 bytes to the right of
[   33.423727]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.423943] 
[   33.424071] The buggy address belongs to the physical page:
[   33.424106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.424201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.424324] page_type: f5(slab)
[   33.424383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.424437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.424481] page dumped because: kasan: bad access detected
[   33.424699] 
[   33.424842] Memory state around the buggy address:
[   33.424946]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.425012]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.425103] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.425402]                                      ^
[   33.425481]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.425663]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.425759] ==================================================================
[   33.551760] ==================================================================
[   33.551844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.551949] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.552049] 
[   33.552436] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.552600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.552659] Hardware name: linux,dummy-virt (DT)
[   33.552816] Call trace:
[   33.552904]  show_stack+0x20/0x38 (C)
[   33.553083]  dump_stack_lvl+0x8c/0xd0
[   33.553189]  print_report+0x118/0x5d0
[   33.553344]  kasan_report+0xdc/0x128
[   33.553442]  kasan_check_range+0x100/0x1a8
[   33.553488]  __kasan_check_write+0x20/0x30
[   33.553559]  kasan_atomics_helper+0x17ec/0x4858
[   33.553609]  kasan_atomics+0x198/0x2e0
[   33.553656]  kunit_try_run_case+0x170/0x3f0
[   33.553704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.554112]  kthread+0x328/0x630
[   33.554220]  ret_from_fork+0x10/0x20
[   33.554297] 
[   33.554382] Allocated by task 296:
[   33.554554]  kasan_save_stack+0x3c/0x68
[   33.554639]  kasan_save_track+0x20/0x40
[   33.554974]  kasan_save_alloc_info+0x40/0x58
[   33.555058]  __kasan_kmalloc+0xd4/0xd8
[   33.555188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.555256]  kasan_atomics+0xb8/0x2e0
[   33.555328]  kunit_try_run_case+0x170/0x3f0
[   33.555368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.555415]  kthread+0x328/0x630
[   33.555595]  ret_from_fork+0x10/0x20
[   33.555751] 
[   33.555879] The buggy address belongs to the object at fff00000c9bb2f80
[   33.555879]  which belongs to the cache kmalloc-64 of size 64
[   33.556021] The buggy address is located 0 bytes to the right of
[   33.556021]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.556170] 
[   33.556385] The buggy address belongs to the physical page:
[   33.556478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.556685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.556803] page_type: f5(slab)
[   33.556865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.556919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.557109] page dumped because: kasan: bad access detected
[   33.557145] 
[   33.557166] Memory state around the buggy address:
[   33.557201]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.557404]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.557559] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.557629]                                      ^
[   33.557666]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.557748]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.557854] ==================================================================
[   33.512665] ==================================================================
[   33.512754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.512810] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.512863] 
[   33.512923] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.513035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.513073] Hardware name: linux,dummy-virt (DT)
[   33.513122] Call trace:
[   33.513148]  show_stack+0x20/0x38 (C)
[   33.513196]  dump_stack_lvl+0x8c/0xd0
[   33.513245]  print_report+0x118/0x5d0
[   33.513289]  kasan_report+0xdc/0x128
[   33.513333]  kasan_check_range+0x100/0x1a8
[   33.513381]  __kasan_check_write+0x20/0x30
[   33.513429]  kasan_atomics_helper+0x15b4/0x4858
[   33.513651]  kasan_atomics+0x198/0x2e0
[   33.513738]  kunit_try_run_case+0x170/0x3f0
[   33.513791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.513863]  kthread+0x328/0x630
[   33.513935]  ret_from_fork+0x10/0x20
[   33.514067] 
[   33.514220] Allocated by task 296:
[   33.514277]  kasan_save_stack+0x3c/0x68
[   33.514320]  kasan_save_track+0x20/0x40
[   33.514382]  kasan_save_alloc_info+0x40/0x58
[   33.514425]  __kasan_kmalloc+0xd4/0xd8
[   33.514467]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.514522]  kasan_atomics+0xb8/0x2e0
[   33.514563]  kunit_try_run_case+0x170/0x3f0
[   33.514604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.514755]  kthread+0x328/0x630
[   33.514802]  ret_from_fork+0x10/0x20
[   33.514840] 
[   33.514880] The buggy address belongs to the object at fff00000c9bb2f80
[   33.514880]  which belongs to the cache kmalloc-64 of size 64
[   33.514974] The buggy address is located 0 bytes to the right of
[   33.514974]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.515044] 
[   33.515072] The buggy address belongs to the physical page:
[   33.515106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.515158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.515305] page_type: f5(slab)
[   33.515350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.515404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.515448] page dumped because: kasan: bad access detected
[   33.515494] 
[   33.515527] Memory state around the buggy address:
[   33.515562]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.515607]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.515662] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.515704]                                      ^
[   33.515741]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.515814]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.515857] ==================================================================
[   33.457597] ==================================================================
[   33.457651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.457701] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.457753] 
[   33.457821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.457922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.457951] Hardware name: linux,dummy-virt (DT)
[   33.457983] Call trace:
[   33.458014]  show_stack+0x20/0x38 (C)
[   33.458181]  dump_stack_lvl+0x8c/0xd0
[   33.458234]  print_report+0x118/0x5d0
[   33.458344]  kasan_report+0xdc/0x128
[   33.458455]  kasan_check_range+0x100/0x1a8
[   33.458545]  __kasan_check_write+0x20/0x30
[   33.458632]  kasan_atomics_helper+0x10c0/0x4858
[   33.458686]  kasan_atomics+0x198/0x2e0
[   33.458752]  kunit_try_run_case+0x170/0x3f0
[   33.458827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.458981]  kthread+0x328/0x630
[   33.459027]  ret_from_fork+0x10/0x20
[   33.459074] 
[   33.459200] Allocated by task 296:
[   33.459286]  kasan_save_stack+0x3c/0x68
[   33.459361]  kasan_save_track+0x20/0x40
[   33.459419]  kasan_save_alloc_info+0x40/0x58
[   33.459477]  __kasan_kmalloc+0xd4/0xd8
[   33.459527]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.459570]  kasan_atomics+0xb8/0x2e0
[   33.459675]  kunit_try_run_case+0x170/0x3f0
[   33.459804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.459947]  kthread+0x328/0x630
[   33.460001]  ret_from_fork+0x10/0x20
[   33.460136] 
[   33.460186] The buggy address belongs to the object at fff00000c9bb2f80
[   33.460186]  which belongs to the cache kmalloc-64 of size 64
[   33.460318] The buggy address is located 0 bytes to the right of
[   33.460318]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.460434] 
[   33.460535] The buggy address belongs to the physical page:
[   33.460619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.460713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.460799] page_type: f5(slab)
[   33.460900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.460953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.461022] page dumped because: kasan: bad access detected
[   33.461057] 
[   33.461077] Memory state around the buggy address:
[   33.461111]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.461157]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.461202] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.461477]                                      ^
[   33.461525]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.461608]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.461736] ==================================================================
[   33.453395] ==================================================================
[   33.453446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.453496] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.453562] 
[   33.453592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.453679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.453708] Hardware name: linux,dummy-virt (DT)
[   33.453782] Call trace:
[   33.453936]  show_stack+0x20/0x38 (C)
[   33.454011]  dump_stack_lvl+0x8c/0xd0
[   33.454064]  print_report+0x118/0x5d0
[   33.454116]  kasan_report+0xdc/0x128
[   33.454161]  kasan_check_range+0x100/0x1a8
[   33.454225]  __kasan_check_write+0x20/0x30
[   33.454274]  kasan_atomics_helper+0x1058/0x4858
[   33.454326]  kasan_atomics+0x198/0x2e0
[   33.454543]  kunit_try_run_case+0x170/0x3f0
[   33.454609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.454687]  kthread+0x328/0x630
[   33.454732]  ret_from_fork+0x10/0x20
[   33.454807] 
[   33.454866] Allocated by task 296:
[   33.454923]  kasan_save_stack+0x3c/0x68
[   33.454965]  kasan_save_track+0x20/0x40
[   33.455004]  kasan_save_alloc_info+0x40/0x58
[   33.455063]  __kasan_kmalloc+0xd4/0xd8
[   33.455119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.455165]  kasan_atomics+0xb8/0x2e0
[   33.455223]  kunit_try_run_case+0x170/0x3f0
[   33.455270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.455317]  kthread+0x328/0x630
[   33.455352]  ret_from_fork+0x10/0x20
[   33.455389] 
[   33.455411] The buggy address belongs to the object at fff00000c9bb2f80
[   33.455411]  which belongs to the cache kmalloc-64 of size 64
[   33.455495] The buggy address is located 0 bytes to the right of
[   33.455495]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.455690] 
[   33.455739] The buggy address belongs to the physical page:
[   33.455855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.456038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.456149] page_type: f5(slab)
[   33.456292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.456486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.456584] page dumped because: kasan: bad access detected
[   33.456668] 
[   33.456762] Memory state around the buggy address:
[   33.456839]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.456888]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.456964] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.457006]                                      ^
[   33.457066]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.457114]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.457155] ==================================================================
[   33.341828] ==================================================================
[   33.341899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.341952] Read of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.342005] 
[   33.342035] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.342883]  kasan_save_stack+0x3c/0x68
[   33.343530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.345440] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.346744]  kasan_save_track+0x20/0x40
[   33.346811]  kasan_save_alloc_info+0x40/0x58
[   33.346858]  __kasan_kmalloc+0xd4/0xd8
[   33.346945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.346989]  kasan_atomics+0xb8/0x2e0
[   33.347045]  kunit_try_run_case+0x170/0x3f0
[   33.347141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.347186]  kthread+0x328/0x630
[   33.347220]  ret_from_fork+0x10/0x20
[   33.347336] 
[   33.347384] The buggy address belongs to the object at fff00000c9bb2f80
[   33.347384]  which belongs to the cache kmalloc-64 of size 64
[   33.347447] The buggy address is located 0 bytes to the right of
[   33.347447]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.347758] 
[   33.347798] The buggy address belongs to the physical page:
[   33.347889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.347978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.348167] page_type: f5(slab)
[   33.348244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.348441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.348487] page dumped because: kasan: bad access detected
[   33.348561] 
[   33.348582] Memory state around the buggy address:
[   33.348861]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.348990]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.349057] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.349355]                                      ^
[   33.349440]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.349566]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.349676] ==================================================================
[   33.397061] ==================================================================
[   33.397314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.397386] Read of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.397455] 
[   33.397542] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.397707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.397814] Hardware name: linux,dummy-virt (DT)
[   33.397854] Call trace:
[   33.397877]  show_stack+0x20/0x38 (C)
[   33.397931]  dump_stack_lvl+0x8c/0xd0
[   33.398007]  print_report+0x118/0x5d0
[   33.398092]  kasan_report+0xdc/0x128
[   33.398157]  __asan_report_load4_noabort+0x20/0x30
[   33.398236]  kasan_atomics_helper+0x3dd8/0x4858
[   33.398289]  kasan_atomics+0x198/0x2e0
[   33.398376]  kunit_try_run_case+0x170/0x3f0
[   33.398433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.398517]  kthread+0x328/0x630
[   33.398589]  ret_from_fork+0x10/0x20
[   33.398639] 
[   33.398659] Allocated by task 296:
[   33.398690]  kasan_save_stack+0x3c/0x68
[   33.398731]  kasan_save_track+0x20/0x40
[   33.398798]  kasan_save_alloc_info+0x40/0x58
[   33.398938]  __kasan_kmalloc+0xd4/0xd8
[   33.398983]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.399110]  kasan_atomics+0xb8/0x2e0
[   33.399206]  kunit_try_run_case+0x170/0x3f0
[   33.399254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.399349]  kthread+0x328/0x630
[   33.399422]  ret_from_fork+0x10/0x20
[   33.399628] 
[   33.399659] The buggy address belongs to the object at fff00000c9bb2f80
[   33.399659]  which belongs to the cache kmalloc-64 of size 64
[   33.399723] The buggy address is located 0 bytes to the right of
[   33.399723]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.399804] 
[   33.399845] The buggy address belongs to the physical page:
[   33.399879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.399960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.400013] page_type: f5(slab)
[   33.400051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.400105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.400148] page dumped because: kasan: bad access detected
[   33.400305] 
[   33.400405] Memory state around the buggy address:
[   33.400522]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.400588]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.400653] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.400840]                                      ^
[   33.400892]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.400941]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.401162] ==================================================================
[   33.426719] ==================================================================
[   33.426771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.426937] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.427002] 
[   33.427061] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.427197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.427426] Hardware name: linux,dummy-virt (DT)
[   33.427484] Call trace:
[   33.427575]  show_stack+0x20/0x38 (C)
[   33.427628]  dump_stack_lvl+0x8c/0xd0
[   33.427695]  print_report+0x118/0x5d0
[   33.427792]  kasan_report+0xdc/0x128
[   33.427887]  __asan_report_store8_noabort+0x20/0x30
[   33.428040]  kasan_atomics_helper+0x3e5c/0x4858
[   33.428137]  kasan_atomics+0x198/0x2e0
[   33.428187]  kunit_try_run_case+0x170/0x3f0
[   33.428270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.428325]  kthread+0x328/0x630
[   33.428592]  ret_from_fork+0x10/0x20
[   33.428648] 
[   33.428671] Allocated by task 296:
[   33.428701]  kasan_save_stack+0x3c/0x68
[   33.428741]  kasan_save_track+0x20/0x40
[   33.428780]  kasan_save_alloc_info+0x40/0x58
[   33.428821]  __kasan_kmalloc+0xd4/0xd8
[   33.428946]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.429032]  kasan_atomics+0xb8/0x2e0
[   33.429140]  kunit_try_run_case+0x170/0x3f0
[   33.429248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.429460]  kthread+0x328/0x630
[   33.429600]  ret_from_fork+0x10/0x20
[   33.429647] 
[   33.429688] The buggy address belongs to the object at fff00000c9bb2f80
[   33.429688]  which belongs to the cache kmalloc-64 of size 64
[   33.429774] The buggy address is located 0 bytes to the right of
[   33.429774]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.429843] 
[   33.429864] The buggy address belongs to the physical page:
[   33.429897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.429949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.430000] page_type: f5(slab)
[   33.430102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.430291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.430349] page dumped because: kasan: bad access detected
[   33.430417] 
[   33.430488] Memory state around the buggy address:
[   33.430540]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.430587]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.430833] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.430923]                                      ^
[   33.431075]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.431172]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.431214] ==================================================================
[   33.416421] ==================================================================
[   33.416619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.416685] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.416762] 
[   33.416810] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.416898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.416927] Hardware name: linux,dummy-virt (DT)
[   33.416961] Call trace:
[   33.416984]  show_stack+0x20/0x38 (C)
[   33.417216]  dump_stack_lvl+0x8c/0xd0
[   33.417321]  print_report+0x118/0x5d0
[   33.417370]  kasan_report+0xdc/0x128
[   33.417416]  __asan_report_load8_noabort+0x20/0x30
[   33.417470]  kasan_atomics_helper+0x3f58/0x4858
[   33.417566]  kasan_atomics+0x198/0x2e0
[   33.417643]  kunit_try_run_case+0x170/0x3f0
[   33.417710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.417767]  kthread+0x328/0x630
[   33.417812]  ret_from_fork+0x10/0x20
[   33.417878] 
[   33.417907] Allocated by task 296:
[   33.417939]  kasan_save_stack+0x3c/0x68
[   33.417980]  kasan_save_track+0x20/0x40
[   33.418018]  kasan_save_alloc_info+0x40/0x58
[   33.418059]  __kasan_kmalloc+0xd4/0xd8
[   33.418108]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.418152]  kasan_atomics+0xb8/0x2e0
[   33.418192]  kunit_try_run_case+0x170/0x3f0
[   33.418441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.418545]  kthread+0x328/0x630
[   33.418644]  ret_from_fork+0x10/0x20
[   33.418720] 
[   33.418749] The buggy address belongs to the object at fff00000c9bb2f80
[   33.418749]  which belongs to the cache kmalloc-64 of size 64
[   33.418919] The buggy address is located 0 bytes to the right of
[   33.418919]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.418989] 
[   33.419010] The buggy address belongs to the physical page:
[   33.419122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.419184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.419304] page_type: f5(slab)
[   33.419369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.419424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.419467] page dumped because: kasan: bad access detected
[   33.419691] 
[   33.419721] Memory state around the buggy address:
[   33.419759]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.419997]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.420094] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.420154]                                      ^
[   33.420190]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.420454]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.420598] ==================================================================
[   33.516742] ==================================================================
[   33.516924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.516983] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.517036] 
[   33.517073] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.517159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.517189] Hardware name: linux,dummy-virt (DT)
[   33.517221] Call trace:
[   33.517245]  show_stack+0x20/0x38 (C)
[   33.517321]  dump_stack_lvl+0x8c/0xd0
[   33.517395]  print_report+0x118/0x5d0
[   33.517441]  kasan_report+0xdc/0x128
[   33.517485]  __asan_report_load8_noabort+0x20/0x30
[   33.517550]  kasan_atomics_helper+0x3db0/0x4858
[   33.517602]  kasan_atomics+0x198/0x2e0
[   33.517760]  kunit_try_run_case+0x170/0x3f0
[   33.517826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.518099]  kthread+0x328/0x630
[   33.518190]  ret_from_fork+0x10/0x20
[   33.518242] 
[   33.518262] Allocated by task 296:
[   33.518334]  kasan_save_stack+0x3c/0x68
[   33.518389]  kasan_save_track+0x20/0x40
[   33.518446]  kasan_save_alloc_info+0x40/0x58
[   33.518555]  __kasan_kmalloc+0xd4/0xd8
[   33.518614]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.518659]  kasan_atomics+0xb8/0x2e0
[   33.518699]  kunit_try_run_case+0x170/0x3f0
[   33.518849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.518936]  kthread+0x328/0x630
[   33.519042]  ret_from_fork+0x10/0x20
[   33.519086] 
[   33.519126] The buggy address belongs to the object at fff00000c9bb2f80
[   33.519126]  which belongs to the cache kmalloc-64 of size 64
[   33.519222] The buggy address is located 0 bytes to the right of
[   33.519222]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.519292] 
[   33.519320] The buggy address belongs to the physical page:
[   33.519354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.519571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.519629] page_type: f5(slab)
[   33.519668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.519722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.519778] page dumped because: kasan: bad access detected
[   33.519812] 
[   33.519832] Memory state around the buggy address:
[   33.520248]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.520300]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.520347] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.520389]                                      ^
[   33.520426]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.520472]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.520531] ==================================================================
[   33.523633] ==================================================================
[   33.523673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.523718] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.523769] 
[   33.523797] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.523882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.523910] Hardware name: linux,dummy-virt (DT)
[   33.523943] Call trace:
[   33.523965]  show_stack+0x20/0x38 (C)
[   33.524013]  dump_stack_lvl+0x8c/0xd0
[   33.524060]  print_report+0x118/0x5d0
[   33.524125]  kasan_report+0xdc/0x128
[   33.524171]  __asan_report_load8_noabort+0x20/0x30
[   33.524221]  kasan_atomics_helper+0x3df4/0x4858
[   33.524284]  kasan_atomics+0x198/0x2e0
[   33.524341]  kunit_try_run_case+0x170/0x3f0
[   33.524390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.524446]  kthread+0x328/0x630
[   33.524489]  ret_from_fork+0x10/0x20
[   33.524550] 
[   33.524569] Allocated by task 296:
[   33.524599]  kasan_save_stack+0x3c/0x68
[   33.524638]  kasan_save_track+0x20/0x40
[   33.524676]  kasan_save_alloc_info+0x40/0x58
[   33.524717]  __kasan_kmalloc+0xd4/0xd8
[   33.524757]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.524800]  kasan_atomics+0xb8/0x2e0
[   33.524838]  kunit_try_run_case+0x170/0x3f0
[   33.524890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.524937]  kthread+0x328/0x630
[   33.524973]  ret_from_fork+0x10/0x20
[   33.525011] 
[   33.525032] The buggy address belongs to the object at fff00000c9bb2f80
[   33.525032]  which belongs to the cache kmalloc-64 of size 64
[   33.525093] The buggy address is located 0 bytes to the right of
[   33.525093]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.525161] 
[   33.525183] The buggy address belongs to the physical page:
[   33.525215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.525270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.525317] page_type: f5(slab)
[   33.525354] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.525407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.525452] page dumped because: kasan: bad access detected
[   33.525485] 
[   33.525516] Memory state around the buggy address:
[   33.525550]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.525596]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.525642] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.525683]                                      ^
[   33.525718]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.525764]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.525865] ==================================================================
[   33.467598] ==================================================================
[   33.467693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.467748] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.467832] 
[   33.467868] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.467965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.467995] Hardware name: linux,dummy-virt (DT)
[   33.468027] Call trace:
[   33.468052]  show_stack+0x20/0x38 (C)
[   33.468101]  dump_stack_lvl+0x8c/0xd0
[   33.468177]  print_report+0x118/0x5d0
[   33.468222]  kasan_report+0xdc/0x128
[   33.468268]  kasan_check_range+0x100/0x1a8
[   33.468315]  __kasan_check_write+0x20/0x30
[   33.468503]  kasan_atomics_helper+0x1190/0x4858
[   33.468629]  kasan_atomics+0x198/0x2e0
[   33.468808]  kunit_try_run_case+0x170/0x3f0
[   33.469012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.469170]  kthread+0x328/0x630
[   33.469251]  ret_from_fork+0x10/0x20
[   33.469312] 
[   33.469340] Allocated by task 296:
[   33.469439]  kasan_save_stack+0x3c/0x68
[   33.469492]  kasan_save_track+0x20/0x40
[   33.469581]  kasan_save_alloc_info+0x40/0x58
[   33.469643]  __kasan_kmalloc+0xd4/0xd8
[   33.469683]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.469726]  kasan_atomics+0xb8/0x2e0
[   33.469766]  kunit_try_run_case+0x170/0x3f0
[   33.469806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.469973]  kthread+0x328/0x630
[   33.470066]  ret_from_fork+0x10/0x20
[   33.470209] 
[   33.470268] The buggy address belongs to the object at fff00000c9bb2f80
[   33.470268]  which belongs to the cache kmalloc-64 of size 64
[   33.470564] The buggy address is located 0 bytes to the right of
[   33.470564]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.470730] 
[   33.470763] The buggy address belongs to the physical page:
[   33.470844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.470959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.471071] page_type: f5(slab)
[   33.471125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.471177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.471222] page dumped because: kasan: bad access detected
[   33.471255] 
[   33.471286] Memory state around the buggy address:
[   33.471329]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.471377]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.471431] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.471473]                                      ^
[   33.471528]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.471574]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.471616] ==================================================================
[   33.442417] ==================================================================
[   33.442490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.442591] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.442644] 
[   33.442675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.442790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.443073] Hardware name: linux,dummy-virt (DT)
[   33.443116] Call trace:
[   33.443142]  show_stack+0x20/0x38 (C)
[   33.443272]  dump_stack_lvl+0x8c/0xd0
[   33.443564]  print_report+0x118/0x5d0
[   33.443625]  kasan_report+0xdc/0x128
[   33.443673]  kasan_check_range+0x100/0x1a8
[   33.443747]  __kasan_check_write+0x20/0x30
[   33.444294]  kasan_atomics_helper+0xf88/0x4858
[   33.444386]  kasan_atomics+0x198/0x2e0
[   33.444537]  kunit_try_run_case+0x170/0x3f0
[   33.444661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.444809]  kthread+0x328/0x630
[   33.444921]  ret_from_fork+0x10/0x20
[   33.445008] 
[   33.445029] Allocated by task 296:
[   33.445081]  kasan_save_stack+0x3c/0x68
[   33.445125]  kasan_save_track+0x20/0x40
[   33.445163]  kasan_save_alloc_info+0x40/0x58
[   33.445204]  __kasan_kmalloc+0xd4/0xd8
[   33.445245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.445290]  kasan_atomics+0xb8/0x2e0
[   33.445332]  kunit_try_run_case+0x170/0x3f0
[   33.445540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.445925]  kthread+0x328/0x630
[   33.446120]  ret_from_fork+0x10/0x20
[   33.446169] 
[   33.446191] The buggy address belongs to the object at fff00000c9bb2f80
[   33.446191]  which belongs to the cache kmalloc-64 of size 64
[   33.446384] The buggy address is located 0 bytes to the right of
[   33.446384]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.446595] 
[   33.446668] The buggy address belongs to the physical page:
[   33.446706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.446768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.446817] page_type: f5(slab)
[   33.446999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.447094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.447188] page dumped because: kasan: bad access detected
[   33.447252] 
[   33.447275] Memory state around the buggy address:
[   33.447309]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.447534]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.447717] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.447818]                                      ^
[   33.447886]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.448170]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.448232] ==================================================================
[   33.537427] ==================================================================
[   33.537480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.537577] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.537631] 
[   33.537733] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.537849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.537923] Hardware name: linux,dummy-virt (DT)
[   33.537974] Call trace:
[   33.537998]  show_stack+0x20/0x38 (C)
[   33.538047]  dump_stack_lvl+0x8c/0xd0
[   33.538130]  print_report+0x118/0x5d0
[   33.538262]  kasan_report+0xdc/0x128
[   33.538463]  kasan_check_range+0x100/0x1a8
[   33.540730]  __kasan_check_write+0x20/0x30
[   33.541084]  kasan_atomics_helper+0x175c/0x4858
[   33.541151]  kasan_atomics+0x198/0x2e0
[   33.542786]  kunit_try_run_case+0x170/0x3f0
[   33.542851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.543305]  kthread+0x328/0x630
[   33.543385]  ret_from_fork+0x10/0x20
[   33.543447] 
[   33.543471] Allocated by task 296:
[   33.543544]  kasan_save_stack+0x3c/0x68
[   33.543602]  kasan_save_track+0x20/0x40
[   33.543650]  kasan_save_alloc_info+0x40/0x58
[   33.543692]  __kasan_kmalloc+0xd4/0xd8
[   33.543743]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.543792]  kasan_atomics+0xb8/0x2e0
[   33.543833]  kunit_try_run_case+0x170/0x3f0
[   33.543890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.543938]  kthread+0x328/0x630
[   33.543973]  ret_from_fork+0x10/0x20
[   33.544021] 
[   33.544044] The buggy address belongs to the object at fff00000c9bb2f80
[   33.544044]  which belongs to the cache kmalloc-64 of size 64
[   33.544106] The buggy address is located 0 bytes to the right of
[   33.544106]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.544182] 
[   33.544213] The buggy address belongs to the physical page:
[   33.544247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.544313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.544364] page_type: f5(slab)
[   33.544411] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.544473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.544541] page dumped because: kasan: bad access detected
[   33.544576] 
[   33.544597] Memory state around the buggy address:
[   33.544631]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.544676]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.544723] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.544764]                                      ^
[   33.544798]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.544844]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.544886] ==================================================================
[   33.476817] ==================================================================
[   33.476876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.476926] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.476979] 
[   33.477019] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.477116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.477144] Hardware name: linux,dummy-virt (DT)
[   33.477190] Call trace:
[   33.477214]  show_stack+0x20/0x38 (C)
[   33.477263]  dump_stack_lvl+0x8c/0xd0
[   33.477311]  print_report+0x118/0x5d0
[   33.477358]  kasan_report+0xdc/0x128
[   33.477410]  kasan_check_range+0x100/0x1a8
[   33.477465]  __kasan_check_write+0x20/0x30
[   33.477527]  kasan_atomics_helper+0x126c/0x4858
[   33.477579]  kasan_atomics+0x198/0x2e0
[   33.477628]  kunit_try_run_case+0x170/0x3f0
[   33.477681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.477737]  kthread+0x328/0x630
[   33.477781]  ret_from_fork+0x10/0x20
[   33.477830] 
[   33.477850] Allocated by task 296:
[   33.477888]  kasan_save_stack+0x3c/0x68
[   33.477929]  kasan_save_track+0x20/0x40
[   33.477966]  kasan_save_alloc_info+0x40/0x58
[   33.478020]  __kasan_kmalloc+0xd4/0xd8
[   33.478060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.478109]  kasan_atomics+0xb8/0x2e0
[   33.478157]  kunit_try_run_case+0x170/0x3f0
[   33.478206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.478254]  kthread+0x328/0x630
[   33.478289]  ret_from_fork+0x10/0x20
[   33.478327] 
[   33.478349] The buggy address belongs to the object at fff00000c9bb2f80
[   33.478349]  which belongs to the cache kmalloc-64 of size 64
[   33.478420] The buggy address is located 0 bytes to the right of
[   33.478420]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.478489] 
[   33.478520] The buggy address belongs to the physical page:
[   33.478554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.478608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.478699] page_type: f5(slab)
[   33.478750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.478800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.478845] page dumped because: kasan: bad access detected
[   33.478877] 
[   33.478897] Memory state around the buggy address:
[   33.478931]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.479356]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.479444] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.479490]                                      ^
[   33.479538]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.479794]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.479931] ==================================================================
[   33.431502] ==================================================================
[   33.431576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.431627] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.431679] 
[   33.431736] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.431825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.431913] Hardware name: linux,dummy-virt (DT)
[   33.431951] Call trace:
[   33.431974]  show_stack+0x20/0x38 (C)
[   33.432023]  dump_stack_lvl+0x8c/0xd0
[   33.432070]  print_report+0x118/0x5d0
[   33.432176]  kasan_report+0xdc/0x128
[   33.432226]  kasan_check_range+0x100/0x1a8
[   33.432276]  __kasan_check_write+0x20/0x30
[   33.432325]  kasan_atomics_helper+0xeb8/0x4858
[   33.432377]  kasan_atomics+0x198/0x2e0
[   33.432425]  kunit_try_run_case+0x170/0x3f0
[   33.432621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.432705]  kthread+0x328/0x630
[   33.432777]  ret_from_fork+0x10/0x20
[   33.432847] 
[   33.432869] Allocated by task 296:
[   33.432898]  kasan_save_stack+0x3c/0x68
[   33.432940]  kasan_save_track+0x20/0x40
[   33.433115]  kasan_save_alloc_info+0x40/0x58
[   33.433269]  __kasan_kmalloc+0xd4/0xd8
[   33.433365]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.433431]  kasan_atomics+0xb8/0x2e0
[   33.433472]  kunit_try_run_case+0x170/0x3f0
[   33.433525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.433572]  kthread+0x328/0x630
[   33.433614]  ret_from_fork+0x10/0x20
[   33.433674] 
[   33.433703] The buggy address belongs to the object at fff00000c9bb2f80
[   33.433703]  which belongs to the cache kmalloc-64 of size 64
[   33.433789] The buggy address is located 0 bytes to the right of
[   33.433789]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.433871] 
[   33.433897] The buggy address belongs to the physical page:
[   33.433952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.434003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.434054] page_type: f5(slab)
[   33.434092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.434155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.434206] page dumped because: kasan: bad access detected
[   33.434251] 
[   33.434287] Memory state around the buggy address:
[   33.434337]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.434395]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.434448] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.434901]                                      ^
[   33.434954]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.435030]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.435119] ==================================================================
[   33.521284] ==================================================================
[   33.521333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.521383] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.521436] 
[   33.521465] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.521566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.521594] Hardware name: linux,dummy-virt (DT)
[   33.521628] Call trace:
[   33.521651]  show_stack+0x20/0x38 (C)
[   33.521699]  dump_stack_lvl+0x8c/0xd0
[   33.521746]  print_report+0x118/0x5d0
[   33.521793]  kasan_report+0xdc/0x128
[   33.521836]  kasan_check_range+0x100/0x1a8
[   33.521883]  __kasan_check_write+0x20/0x30
[   33.521931]  kasan_atomics_helper+0x1644/0x4858
[   33.521982]  kasan_atomics+0x198/0x2e0
[   33.522031]  kunit_try_run_case+0x170/0x3f0
[   33.522079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.522134]  kthread+0x328/0x630
[   33.522177]  ret_from_fork+0x10/0x20
[   33.522225] 
[   33.522245] Allocated by task 296:
[   33.522274]  kasan_save_stack+0x3c/0x68
[   33.522314]  kasan_save_track+0x20/0x40
[   33.522350]  kasan_save_alloc_info+0x40/0x58
[   33.522397]  __kasan_kmalloc+0xd4/0xd8
[   33.522436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.522479]  kasan_atomics+0xb8/0x2e0
[   33.522530]  kunit_try_run_case+0x170/0x3f0
[   33.522583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.522630]  kthread+0x328/0x630
[   33.522665]  ret_from_fork+0x10/0x20
[   33.522703] 
[   33.522725] The buggy address belongs to the object at fff00000c9bb2f80
[   33.522725]  which belongs to the cache kmalloc-64 of size 64
[   33.522785] The buggy address is located 0 bytes to the right of
[   33.522785]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.522874] 
[   33.522897] The buggy address belongs to the physical page:
[   33.522931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.522985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.523043] page_type: f5(slab)
[   33.523080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.523130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.523175] page dumped because: kasan: bad access detected
[   33.523208] 
[   33.523237] Memory state around the buggy address:
[   33.523280]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.523327]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.523382] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.523423]                                      ^
[   33.523467]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.523523]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.523564] ==================================================================
[   33.508549] ==================================================================
[   33.508604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.508655] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.508708] 
[   33.508740] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.509009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.509076] Hardware name: linux,dummy-virt (DT)
[   33.509114] Call trace:
[   33.509141]  show_stack+0x20/0x38 (C)
[   33.509196]  dump_stack_lvl+0x8c/0xd0
[   33.509246]  print_report+0x118/0x5d0
[   33.509290]  kasan_report+0xdc/0x128
[   33.509430]  kasan_check_range+0x100/0x1a8
[   33.509567]  __kasan_check_write+0x20/0x30
[   33.509625]  kasan_atomics_helper+0x154c/0x4858
[   33.509678]  kasan_atomics+0x198/0x2e0
[   33.509743]  kunit_try_run_case+0x170/0x3f0
[   33.509843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.509955]  kthread+0x328/0x630
[   33.510000]  ret_from_fork+0x10/0x20
[   33.510075] 
[   33.510098] Allocated by task 296:
[   33.510129]  kasan_save_stack+0x3c/0x68
[   33.510195]  kasan_save_track+0x20/0x40
[   33.510261]  kasan_save_alloc_info+0x40/0x58
[   33.510304]  __kasan_kmalloc+0xd4/0xd8
[   33.510345]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.510396]  kasan_atomics+0xb8/0x2e0
[   33.510451]  kunit_try_run_case+0x170/0x3f0
[   33.510494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.510706]  kthread+0x328/0x630
[   33.510783]  ret_from_fork+0x10/0x20
[   33.510829] 
[   33.510876] The buggy address belongs to the object at fff00000c9bb2f80
[   33.510876]  which belongs to the cache kmalloc-64 of size 64
[   33.510966] The buggy address is located 0 bytes to the right of
[   33.510966]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.511038] 
[   33.511062] The buggy address belongs to the physical page:
[   33.511120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.511173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.511223] page_type: f5(slab)
[   33.511344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.511416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.511460] page dumped because: kasan: bad access detected
[   33.511495] 
[   33.511533] Memory state around the buggy address:
[   33.511596]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.511642]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.511688] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.511838]                                      ^
[   33.511996]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.512090]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.512169] ==================================================================
[   33.360308] ==================================================================
[   33.360377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.360610] Write of size 4 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.360673] 
[   33.360705] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.360882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.361012] Hardware name: linux,dummy-virt (DT)
[   33.361068] Call trace:
[   33.361094]  show_stack+0x20/0x38 (C)
[   33.361144]  dump_stack_lvl+0x8c/0xd0
[   33.361220]  print_report+0x118/0x5d0
[   33.361285]  kasan_report+0xdc/0x128
[   33.361694]  kasan_check_range+0x100/0x1a8
[   33.361792]  __kasan_check_write+0x20/0x30
[   33.361843]  kasan_atomics_helper+0xa6c/0x4858
[   33.361903]  kasan_atomics+0x198/0x2e0
[   33.361969]  kunit_try_run_case+0x170/0x3f0
[   33.362022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.362097]  kthread+0x328/0x630
[   33.362140]  ret_from_fork+0x10/0x20
[   33.362196] 
[   33.362250] Allocated by task 296:
[   33.362374]  kasan_save_stack+0x3c/0x68
[   33.362420]  kasan_save_track+0x20/0x40
[   33.362459]  kasan_save_alloc_info+0x40/0x58
[   33.362500]  __kasan_kmalloc+0xd4/0xd8
[   33.362628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.362715]  kasan_atomics+0xb8/0x2e0
[   33.362761]  kunit_try_run_case+0x170/0x3f0
[   33.362829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.362875]  kthread+0x328/0x630
[   33.362910]  ret_from_fork+0x10/0x20
[   33.362971] 
[   33.363005] The buggy address belongs to the object at fff00000c9bb2f80
[   33.363005]  which belongs to the cache kmalloc-64 of size 64
[   33.363068] The buggy address is located 0 bytes to the right of
[   33.363068]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.363201] 
[   33.363223] The buggy address belongs to the physical page:
[   33.363257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.363345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.363396] page_type: f5(slab)
[   33.363435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.363497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.363712] page dumped because: kasan: bad access detected
[   33.363757] 
[   33.363777] Memory state around the buggy address:
[   33.363896]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.363952]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.364048] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.364106]                                      ^
[   33.364143]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.364277]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.364376] ==================================================================
[   33.472675] ==================================================================
[   33.472755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.472808] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.472953] 
[   33.473059] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.473170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.473218] Hardware name: linux,dummy-virt (DT)
[   33.473252] Call trace:
[   33.473309]  show_stack+0x20/0x38 (C)
[   33.473362]  dump_stack_lvl+0x8c/0xd0
[   33.473437]  print_report+0x118/0x5d0
[   33.473487]  kasan_report+0xdc/0x128
[   33.473632]  kasan_check_range+0x100/0x1a8
[   33.473780]  __kasan_check_write+0x20/0x30
[   33.473848]  kasan_atomics_helper+0x11f8/0x4858
[   33.473901]  kasan_atomics+0x198/0x2e0
[   33.473966]  kunit_try_run_case+0x170/0x3f0
[   33.474021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.474095]  kthread+0x328/0x630
[   33.474159]  ret_from_fork+0x10/0x20
[   33.474245] 
[   33.474293] Allocated by task 296:
[   33.474325]  kasan_save_stack+0x3c/0x68
[   33.474400]  kasan_save_track+0x20/0x40
[   33.474457]  kasan_save_alloc_info+0x40/0x58
[   33.474500]  __kasan_kmalloc+0xd4/0xd8
[   33.474550]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.474593]  kasan_atomics+0xb8/0x2e0
[   33.474633]  kunit_try_run_case+0x170/0x3f0
[   33.474762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.474911]  kthread+0x328/0x630
[   33.474956]  ret_from_fork+0x10/0x20
[   33.475023] 
[   33.475048] The buggy address belongs to the object at fff00000c9bb2f80
[   33.475048]  which belongs to the cache kmalloc-64 of size 64
[   33.475137] The buggy address is located 0 bytes to the right of
[   33.475137]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.475227] 
[   33.475361] The buggy address belongs to the physical page:
[   33.475457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.475528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.475643] page_type: f5(slab)
[   33.475718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.475804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.475869] page dumped because: kasan: bad access detected
[   33.475902] 
[   33.475922] Memory state around the buggy address:
[   33.475958]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.476004]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.476081] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.476123]                                      ^
[   33.476272]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.476364]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.476504] ==================================================================
[   33.483852] ==================================================================
[   33.483969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.484066] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.484223] 
[   33.484406] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.484599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.484701] Hardware name: linux,dummy-virt (DT)
[   33.484807] Call trace:
[   33.484867]  show_stack+0x20/0x38 (C)
[   33.484921]  dump_stack_lvl+0x8c/0xd0
[   33.484968]  print_report+0x118/0x5d0
[   33.485016]  kasan_report+0xdc/0x128
[   33.485059]  kasan_check_range+0x100/0x1a8
[   33.485148]  __kasan_check_write+0x20/0x30
[   33.485200]  kasan_atomics_helper+0x1384/0x4858
[   33.485413]  kasan_atomics+0x198/0x2e0
[   33.485504]  kunit_try_run_case+0x170/0x3f0
[   33.485605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.485700]  kthread+0x328/0x630
[   33.485795]  ret_from_fork+0x10/0x20
[   33.486056] 
[   33.486078] Allocated by task 296:
[   33.486173]  kasan_save_stack+0x3c/0x68
[   33.486245]  kasan_save_track+0x20/0x40
[   33.486284]  kasan_save_alloc_info+0x40/0x58
[   33.486395]  __kasan_kmalloc+0xd4/0xd8
[   33.486448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.486536]  kasan_atomics+0xb8/0x2e0
[   33.486593]  kunit_try_run_case+0x170/0x3f0
[   33.486634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.486680]  kthread+0x328/0x630
[   33.486716]  ret_from_fork+0x10/0x20
[   33.486754] 
[   33.486775] The buggy address belongs to the object at fff00000c9bb2f80
[   33.486775]  which belongs to the cache kmalloc-64 of size 64
[   33.486991] The buggy address is located 0 bytes to the right of
[   33.486991]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.487174] 
[   33.487271] The buggy address belongs to the physical page:
[   33.487471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.487694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.487834] page_type: f5(slab)
[   33.487923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.487979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.488023] page dumped because: kasan: bad access detected
[   33.488190] 
[   33.488211] Memory state around the buggy address:
[   33.488367]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.488554]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.488689] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.488741]                                      ^
[   33.488778]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.488943]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.488988] ==================================================================
[   33.409369] ==================================================================
[   33.409413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.409470] Read of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.410090] 
[   33.410191] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.410328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.410482] Hardware name: linux,dummy-virt (DT)
[   33.410567] Call trace:
[   33.410700]  show_stack+0x20/0x38 (C)
[   33.410843]  dump_stack_lvl+0x8c/0xd0
[   33.410912]  print_report+0x118/0x5d0
[   33.410968]  kasan_report+0xdc/0x128
[   33.411014]  kasan_check_range+0x100/0x1a8
[   33.411062]  __kasan_check_read+0x20/0x30
[   33.411110]  kasan_atomics_helper+0xdd4/0x4858
[   33.411160]  kasan_atomics+0x198/0x2e0
[   33.411404]  kunit_try_run_case+0x170/0x3f0
[   33.411476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.411592]  kthread+0x328/0x630
[   33.411768]  ret_from_fork+0x10/0x20
[   33.412057] 
[   33.412176] Allocated by task 296:
[   33.412265]  kasan_save_stack+0x3c/0x68
[   33.412382]  kasan_save_track+0x20/0x40
[   33.412479]  kasan_save_alloc_info+0x40/0x58
[   33.412553]  __kasan_kmalloc+0xd4/0xd8
[   33.412809]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.412900]  kasan_atomics+0xb8/0x2e0
[   33.413040]  kunit_try_run_case+0x170/0x3f0
[   33.413154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.413313]  kthread+0x328/0x630
[   33.413428]  ret_from_fork+0x10/0x20
[   33.413693] 
[   33.413786] The buggy address belongs to the object at fff00000c9bb2f80
[   33.413786]  which belongs to the cache kmalloc-64 of size 64
[   33.413936] The buggy address is located 0 bytes to the right of
[   33.413936]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.414025] 
[   33.414048] The buggy address belongs to the physical page:
[   33.414081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.414334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.414485] page_type: f5(slab)
[   33.414612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.414710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.415014] page dumped because: kasan: bad access detected
[   33.415115] 
[   33.415175] Memory state around the buggy address:
[   33.415288]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.415404]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.415554] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.415668]                                      ^
[   33.415750]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.415804]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.415880] ==================================================================
[   33.462269] ==================================================================
[   33.462320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.462421] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.462475] 
[   33.462516] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.462633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.462711] Hardware name: linux,dummy-virt (DT)
[   33.462765] Call trace:
[   33.462835]  show_stack+0x20/0x38 (C)
[   33.462911]  dump_stack_lvl+0x8c/0xd0
[   33.462962]  print_report+0x118/0x5d0
[   33.463008]  kasan_report+0xdc/0x128
[   33.463167]  kasan_check_range+0x100/0x1a8
[   33.463236]  __kasan_check_write+0x20/0x30
[   33.463305]  kasan_atomics_helper+0x1128/0x4858
[   33.463412]  kasan_atomics+0x198/0x2e0
[   33.463496]  kunit_try_run_case+0x170/0x3f0
[   33.463594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.463651]  kthread+0x328/0x630
[   33.463695]  ret_from_fork+0x10/0x20
[   33.463777] 
[   33.463818] Allocated by task 296:
[   33.463954]  kasan_save_stack+0x3c/0x68
[   33.464038]  kasan_save_track+0x20/0x40
[   33.464078]  kasan_save_alloc_info+0x40/0x58
[   33.464213]  __kasan_kmalloc+0xd4/0xd8
[   33.464255]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.464299]  kasan_atomics+0xb8/0x2e0
[   33.464338]  kunit_try_run_case+0x170/0x3f0
[   33.464398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.464445]  kthread+0x328/0x630
[   33.464481]  ret_from_fork+0x10/0x20
[   33.464529] 
[   33.464552] The buggy address belongs to the object at fff00000c9bb2f80
[   33.464552]  which belongs to the cache kmalloc-64 of size 64
[   33.464614] The buggy address is located 0 bytes to the right of
[   33.464614]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.464764] 
[   33.464988] The buggy address belongs to the physical page:
[   33.465069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.465172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.465266] page_type: f5(slab)
[   33.465439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.465630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.465713] page dumped because: kasan: bad access detected
[   33.465839] 
[   33.465940] Memory state around the buggy address:
[   33.466000]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.466046]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.466358] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.466456]                                      ^
[   33.466595]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.466682]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.466723] ==================================================================
[   33.436992] ==================================================================
[   33.437077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.437186] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.437240] 
[   33.437277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.437366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.437414] Hardware name: linux,dummy-virt (DT)
[   33.437449] Call trace:
[   33.437489]  show_stack+0x20/0x38 (C)
[   33.437577]  dump_stack_lvl+0x8c/0xd0
[   33.437626]  print_report+0x118/0x5d0
[   33.437672]  kasan_report+0xdc/0x128
[   33.437717]  kasan_check_range+0x100/0x1a8
[   33.437765]  __kasan_check_write+0x20/0x30
[   33.437814]  kasan_atomics_helper+0xf20/0x4858
[   33.438089]  kasan_atomics+0x198/0x2e0
[   33.438174]  kunit_try_run_case+0x170/0x3f0
[   33.438226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.438301]  kthread+0x328/0x630
[   33.438383]  ret_from_fork+0x10/0x20
[   33.438446] 
[   33.438469] Allocated by task 296:
[   33.438499]  kasan_save_stack+0x3c/0x68
[   33.438552]  kasan_save_track+0x20/0x40
[   33.438736]  kasan_save_alloc_info+0x40/0x58
[   33.438785]  __kasan_kmalloc+0xd4/0xd8
[   33.438908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.438954]  kasan_atomics+0xb8/0x2e0
[   33.439030]  kunit_try_run_case+0x170/0x3f0
[   33.439071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.439117]  kthread+0x328/0x630
[   33.439153]  ret_from_fork+0x10/0x20
[   33.439192] 
[   33.439348] The buggy address belongs to the object at fff00000c9bb2f80
[   33.439348]  which belongs to the cache kmalloc-64 of size 64
[   33.439547] The buggy address is located 0 bytes to the right of
[   33.439547]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.439651] 
[   33.439679] The buggy address belongs to the physical page:
[   33.439748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.439804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.439986] page_type: f5(slab)
[   33.440109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.440205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.440283] page dumped because: kasan: bad access detected
[   33.440413] 
[   33.440474] Memory state around the buggy address:
[   33.440599]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.440647]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.440692] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.440734]                                      ^
[   33.441029]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.441126]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.441286] ==================================================================
[   33.449473] ==================================================================
[   33.449574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.449627] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.449680] 
[   33.449711] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.449798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.449837] Hardware name: linux,dummy-virt (DT)
[   33.449869] Call trace:
[   33.449893]  show_stack+0x20/0x38 (C)
[   33.449943]  dump_stack_lvl+0x8c/0xd0
[   33.449991]  print_report+0x118/0x5d0
[   33.450036]  kasan_report+0xdc/0x128
[   33.450082]  kasan_check_range+0x100/0x1a8
[   33.450141]  __kasan_check_write+0x20/0x30
[   33.450190]  kasan_atomics_helper+0xff0/0x4858
[   33.450250]  kasan_atomics+0x198/0x2e0
[   33.450299]  kunit_try_run_case+0x170/0x3f0
[   33.450352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.450415]  kthread+0x328/0x630
[   33.450468]  ret_from_fork+0x10/0x20
[   33.450528] 
[   33.450549] Allocated by task 296:
[   33.450587]  kasan_save_stack+0x3c/0x68
[   33.450629]  kasan_save_track+0x20/0x40
[   33.450676]  kasan_save_alloc_info+0x40/0x58
[   33.450727]  __kasan_kmalloc+0xd4/0xd8
[   33.450772]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.450817]  kasan_atomics+0xb8/0x2e0
[   33.450865]  kunit_try_run_case+0x170/0x3f0
[   33.450907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.450953]  kthread+0x328/0x630
[   33.450988]  ret_from_fork+0x10/0x20
[   33.451026] 
[   33.451055] The buggy address belongs to the object at fff00000c9bb2f80
[   33.451055]  which belongs to the cache kmalloc-64 of size 64
[   33.451116] The buggy address is located 0 bytes to the right of
[   33.451116]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.451193] 
[   33.451220] The buggy address belongs to the physical page:
[   33.451256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.451308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.451357] page_type: f5(slab)
[   33.451395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.451449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.451498] page dumped because: kasan: bad access detected
[   33.452073] 
[   33.452109] Memory state around the buggy address:
[   33.452247]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.452464]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.452586] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.452685]                                      ^
[   33.452780]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.452876]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.452957] ==================================================================
[   33.480486] ==================================================================
[   33.480556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.480607] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.480673] 
[   33.480714] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.480808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.480855] Hardware name: linux,dummy-virt (DT)
[   33.480890] Call trace:
[   33.480913]  show_stack+0x20/0x38 (C)
[   33.480962]  dump_stack_lvl+0x8c/0xd0
[   33.481009]  print_report+0x118/0x5d0
[   33.481084]  kasan_report+0xdc/0x128
[   33.481205]  kasan_check_range+0x100/0x1a8
[   33.481299]  __kasan_check_write+0x20/0x30
[   33.481349]  kasan_atomics_helper+0x12d8/0x4858
[   33.481402]  kasan_atomics+0x198/0x2e0
[   33.481455]  kunit_try_run_case+0x170/0x3f0
[   33.481568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.481645]  kthread+0x328/0x630
[   33.481689]  ret_from_fork+0x10/0x20
[   33.481738] 
[   33.481758] Allocated by task 296:
[   33.481789]  kasan_save_stack+0x3c/0x68
[   33.481856]  kasan_save_track+0x20/0x40
[   33.481970]  kasan_save_alloc_info+0x40/0x58
[   33.482035]  __kasan_kmalloc+0xd4/0xd8
[   33.482112]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.482158]  kasan_atomics+0xb8/0x2e0
[   33.482198]  kunit_try_run_case+0x170/0x3f0
[   33.482255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.482331]  kthread+0x328/0x630
[   33.482372]  ret_from_fork+0x10/0x20
[   33.482410] 
[   33.482434] The buggy address belongs to the object at fff00000c9bb2f80
[   33.482434]  which belongs to the cache kmalloc-64 of size 64
[   33.482495] The buggy address is located 0 bytes to the right of
[   33.482495]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.482574] 
[   33.482705] The buggy address belongs to the physical page:
[   33.482741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.482884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.482958] page_type: f5(slab)
[   33.483005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.483056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.483102] page dumped because: kasan: bad access detected
[   33.483151] 
[   33.483172] Memory state around the buggy address:
[   33.483206]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.483253]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.483298] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.483339]                                      ^
[   33.483375]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.483535]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.483616] ==================================================================
[   33.526401] ==================================================================
[   33.526453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.526518] Write of size 8 at addr fff00000c9bb2fb0 by task kunit_try_catch/296
[   33.526571] 
[   33.526621] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT 
[   33.526710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.526758] Hardware name: linux,dummy-virt (DT)
[   33.526831] Call trace:
[   33.526857]  show_stack+0x20/0x38 (C)
[   33.526905]  dump_stack_lvl+0x8c/0xd0
[   33.526954]  print_report+0x118/0x5d0
[   33.526998]  kasan_report+0xdc/0x128
[   33.527044]  kasan_check_range+0x100/0x1a8
[   33.527091]  __kasan_check_write+0x20/0x30
[   33.527137]  kasan_atomics_helper+0x16d0/0x4858
[   33.527189]  kasan_atomics+0x198/0x2e0
[   33.527238]  kunit_try_run_case+0x170/0x3f0
[   33.527286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.527341]  kthread+0x328/0x630
[   33.527384]  ret_from_fork+0x10/0x20
[   33.527440] 
[   33.527531] Allocated by task 296:
[   33.527579]  kasan_save_stack+0x3c/0x68
[   33.527621]  kasan_save_track+0x20/0x40
[   33.527660]  kasan_save_alloc_info+0x40/0x58
[   33.527727]  __kasan_kmalloc+0xd4/0xd8
[   33.527769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.527821]  kasan_atomics+0xb8/0x2e0
[   33.527906]  kunit_try_run_case+0x170/0x3f0
[   33.528216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.528422]  kthread+0x328/0x630
[   33.528536]  ret_from_fork+0x10/0x20
[   33.528594] 
[   33.528617] The buggy address belongs to the object at fff00000c9bb2f80
[   33.528617]  which belongs to the cache kmalloc-64 of size 64
[   33.528680] The buggy address is located 0 bytes to the right of
[   33.528680]  allocated 48-byte region [fff00000c9bb2f80, fff00000c9bb2fb0)
[   33.528746] 
[   33.529015] The buggy address belongs to the physical page:
[   33.529118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bb2
[   33.529285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.529371] page_type: f5(slab)
[   33.529572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.529767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.529963] page dumped because: kasan: bad access detected
[   33.530038] 
[   33.530136] Memory state around the buggy address:
[   33.530239]  fff00000c9bb2e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.530407]  fff00000c9bb2f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.530455] >fff00000c9bb2f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.530497]                                      ^
[   33.530814]  fff00000c9bb3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.530875]  fff00000c9bb3080: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.530999] ==================================================================

[   26.986401] ==================================================================
[   26.987108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   26.987773] Read of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.988529] 
[   26.988732] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.988814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.988828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.988850] Call Trace:
[   26.988872]  <TASK>
[   26.988889]  dump_stack_lvl+0x73/0xb0
[   26.988919]  print_report+0xd1/0x610
[   26.988942]  ? __virt_addr_valid+0x1db/0x2d0
[   26.988967]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.988989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.989016]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.989039]  kasan_report+0x141/0x180
[   26.989062]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.989105]  __asan_report_load8_noabort+0x18/0x20
[   26.989131]  kasan_atomics_helper+0x4f98/0x5450
[   26.989155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.989178]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.989204]  ? kasan_atomics+0x152/0x310
[   26.989231]  kasan_atomics+0x1dc/0x310
[   26.989255]  ? __pfx_kasan_atomics+0x10/0x10
[   26.989279]  ? __pfx_read_tsc+0x10/0x10
[   26.989303]  ? ktime_get_ts64+0x86/0x230
[   26.989339]  kunit_try_run_case+0x1a5/0x480
[   26.989364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.989387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.989411]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.989435]  ? __kthread_parkme+0x82/0x180
[   26.989457]  ? preempt_count_sub+0x50/0x80
[   26.989481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.989506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.989533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.989560]  kthread+0x337/0x6f0
[   26.989581]  ? trace_preempt_on+0x20/0xc0
[   26.989623]  ? __pfx_kthread+0x10/0x10
[   26.989645]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.989667]  ? calculate_sigpending+0x7b/0xa0
[   26.989691]  ? __pfx_kthread+0x10/0x10
[   26.989714]  ret_from_fork+0x116/0x1d0
[   26.989734]  ? __pfx_kthread+0x10/0x10
[   26.989756]  ret_from_fork_asm+0x1a/0x30
[   26.989788]  </TASK>
[   26.989799] 
[   26.997159] Allocated by task 314:
[   26.997291]  kasan_save_stack+0x45/0x70
[   26.997503]  kasan_save_track+0x18/0x40
[   26.997694]  kasan_save_alloc_info+0x3b/0x50
[   26.998014]  __kasan_kmalloc+0xb7/0xc0
[   26.998204]  __kmalloc_cache_noprof+0x189/0x420
[   26.998363]  kasan_atomics+0x95/0x310
[   26.998486]  kunit_try_run_case+0x1a5/0x480
[   26.998623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.998836]  kthread+0x337/0x6f0
[   26.999036]  ret_from_fork+0x116/0x1d0
[   26.999347]  ret_from_fork_asm+0x1a/0x30
[   26.999541] 
[   26.999627] The buggy address belongs to the object at ffff88810623b200
[   26.999627]  which belongs to the cache kmalloc-64 of size 64
[   27.000084] The buggy address is located 0 bytes to the right of
[   27.000084]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   27.000745] 
[   27.000870] The buggy address belongs to the physical page:
[   27.001136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   27.001509] flags: 0x200000000000000(node=0|zone=2)
[   27.001763] page_type: f5(slab)
[   27.001880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.002096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.002310] page dumped because: kasan: bad access detected
[   27.002509] 
[   27.002595] Memory state around the buggy address:
[   27.002849]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.003171]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.003531] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.004004]                                      ^
[   27.004252]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.004509]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.004937] ==================================================================
[   27.067435] ==================================================================
[   27.067760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   27.068193] Read of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   27.068429] 
[   27.068511] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.068560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.068573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.068594] Call Trace:
[   27.068626]  <TASK>
[   27.068641]  dump_stack_lvl+0x73/0xb0
[   27.068670]  print_report+0xd1/0x610
[   27.068694]  ? __virt_addr_valid+0x1db/0x2d0
[   27.068718]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.068741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.068768]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.068802]  kasan_report+0x141/0x180
[   27.068826]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.068853]  __asan_report_load8_noabort+0x18/0x20
[   27.068891]  kasan_atomics_helper+0x4fa5/0x5450
[   27.068915]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.068939]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.068964]  ? kasan_atomics+0x152/0x310
[   27.068991]  kasan_atomics+0x1dc/0x310
[   27.069015]  ? __pfx_kasan_atomics+0x10/0x10
[   27.069040]  ? __pfx_read_tsc+0x10/0x10
[   27.069063]  ? ktime_get_ts64+0x86/0x230
[   27.069089]  kunit_try_run_case+0x1a5/0x480
[   27.069114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.069138]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.069162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.069187]  ? __kthread_parkme+0x82/0x180
[   27.069219]  ? preempt_count_sub+0x50/0x80
[   27.069245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.069270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.069308]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.069346]  kthread+0x337/0x6f0
[   27.069367]  ? trace_preempt_on+0x20/0xc0
[   27.069402]  ? __pfx_kthread+0x10/0x10
[   27.069423]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.069446]  ? calculate_sigpending+0x7b/0xa0
[   27.069482]  ? __pfx_kthread+0x10/0x10
[   27.069506]  ret_from_fork+0x116/0x1d0
[   27.069526]  ? __pfx_kthread+0x10/0x10
[   27.069547]  ret_from_fork_asm+0x1a/0x30
[   27.069588]  </TASK>
[   27.069601] 
[   27.077195] Allocated by task 314:
[   27.077388]  kasan_save_stack+0x45/0x70
[   27.077606]  kasan_save_track+0x18/0x40
[   27.077814]  kasan_save_alloc_info+0x3b/0x50
[   27.078009]  __kasan_kmalloc+0xb7/0xc0
[   27.078193]  __kmalloc_cache_noprof+0x189/0x420
[   27.078415]  kasan_atomics+0x95/0x310
[   27.078580]  kunit_try_run_case+0x1a5/0x480
[   27.078795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.079001]  kthread+0x337/0x6f0
[   27.079186]  ret_from_fork+0x116/0x1d0
[   27.079333]  ret_from_fork_asm+0x1a/0x30
[   27.079469] 
[   27.079535] The buggy address belongs to the object at ffff88810623b200
[   27.079535]  which belongs to the cache kmalloc-64 of size 64
[   27.080145] The buggy address is located 0 bytes to the right of
[   27.080145]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   27.080602] 
[   27.080706] The buggy address belongs to the physical page:
[   27.080983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   27.081310] flags: 0x200000000000000(node=0|zone=2)
[   27.081545] page_type: f5(slab)
[   27.081760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.082082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.082414] page dumped because: kasan: bad access detected
[   27.082715] 
[   27.082783] Memory state around the buggy address:
[   27.083000]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.083214]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.083493] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.083847]                                      ^
[   27.084024]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.084349]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.084690] ==================================================================
[   26.713276] ==================================================================
[   26.713605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   26.714123] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.714392] 
[   26.714479] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.714567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.714592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.714626] Call Trace:
[   26.714645]  <TASK>
[   26.714662]  dump_stack_lvl+0x73/0xb0
[   26.714693]  print_report+0xd1/0x610
[   26.714716]  ? __virt_addr_valid+0x1db/0x2d0
[   26.714741]  ? kasan_atomics_helper+0x194a/0x5450
[   26.714795]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.714822]  ? kasan_atomics_helper+0x194a/0x5450
[   26.714857]  kasan_report+0x141/0x180
[   26.714879]  ? kasan_atomics_helper+0x194a/0x5450
[   26.714906]  kasan_check_range+0x10c/0x1c0
[   26.714930]  __kasan_check_write+0x18/0x20
[   26.714954]  kasan_atomics_helper+0x194a/0x5450
[   26.714978]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.715000]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.715026]  ? kasan_atomics+0x152/0x310
[   26.715052]  kasan_atomics+0x1dc/0x310
[   26.715076]  ? __pfx_kasan_atomics+0x10/0x10
[   26.715101]  ? __pfx_read_tsc+0x10/0x10
[   26.715151]  ? ktime_get_ts64+0x86/0x230
[   26.715177]  kunit_try_run_case+0x1a5/0x480
[   26.715214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.715237]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.715263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.715287]  ? __kthread_parkme+0x82/0x180
[   26.715309]  ? preempt_count_sub+0x50/0x80
[   26.715343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.715368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.715396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.715424]  kthread+0x337/0x6f0
[   26.715446]  ? trace_preempt_on+0x20/0xc0
[   26.715471]  ? __pfx_kthread+0x10/0x10
[   26.715492]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.715514]  ? calculate_sigpending+0x7b/0xa0
[   26.715540]  ? __pfx_kthread+0x10/0x10
[   26.715563]  ret_from_fork+0x116/0x1d0
[   26.715584]  ? __pfx_kthread+0x10/0x10
[   26.715615]  ret_from_fork_asm+0x1a/0x30
[   26.715648]  </TASK>
[   26.715660] 
[   26.723553] Allocated by task 314:
[   26.723845]  kasan_save_stack+0x45/0x70
[   26.724028]  kasan_save_track+0x18/0x40
[   26.724247]  kasan_save_alloc_info+0x3b/0x50
[   26.724465]  __kasan_kmalloc+0xb7/0xc0
[   26.724617]  __kmalloc_cache_noprof+0x189/0x420
[   26.724822]  kasan_atomics+0x95/0x310
[   26.725025]  kunit_try_run_case+0x1a5/0x480
[   26.725172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.725433]  kthread+0x337/0x6f0
[   26.725688]  ret_from_fork+0x116/0x1d0
[   26.725929]  ret_from_fork_asm+0x1a/0x30
[   26.726115] 
[   26.726184] The buggy address belongs to the object at ffff88810623b200
[   26.726184]  which belongs to the cache kmalloc-64 of size 64
[   26.726707] The buggy address is located 0 bytes to the right of
[   26.726707]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.727193] 
[   26.727293] The buggy address belongs to the physical page:
[   26.727520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.728000] flags: 0x200000000000000(node=0|zone=2)
[   26.728256] page_type: f5(slab)
[   26.728384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.728612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.728893] page dumped because: kasan: bad access detected
[   26.729191] 
[   26.729282] Memory state around the buggy address:
[   26.729510]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.730036]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.731133] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.731541]                                      ^
[   26.731918]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.732363]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.732805] ==================================================================
[   26.833234] ==================================================================
[   26.833502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   26.834112] Read of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.834775] 
[   26.834968] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.835028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.835042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.835074] Call Trace:
[   26.835095]  <TASK>
[   26.835114]  dump_stack_lvl+0x73/0xb0
[   26.835144]  print_report+0xd1/0x610
[   26.835167]  ? __virt_addr_valid+0x1db/0x2d0
[   26.835201]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.835223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.835250]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.835283]  kasan_report+0x141/0x180
[   26.835306]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.835342]  __asan_report_load8_noabort+0x18/0x20
[   26.835367]  kasan_atomics_helper+0x4f30/0x5450
[   26.835391]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.835414]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.835439]  ? kasan_atomics+0x152/0x310
[   26.835466]  kasan_atomics+0x1dc/0x310
[   26.835490]  ? __pfx_kasan_atomics+0x10/0x10
[   26.835515]  ? __pfx_read_tsc+0x10/0x10
[   26.835538]  ? ktime_get_ts64+0x86/0x230
[   26.835564]  kunit_try_run_case+0x1a5/0x480
[   26.835607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.835631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.835655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.835679]  ? __kthread_parkme+0x82/0x180
[   26.835700]  ? preempt_count_sub+0x50/0x80
[   26.835724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.835749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.835776]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.835804]  kthread+0x337/0x6f0
[   26.835825]  ? trace_preempt_on+0x20/0xc0
[   26.835849]  ? __pfx_kthread+0x10/0x10
[   26.835871]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.835893]  ? calculate_sigpending+0x7b/0xa0
[   26.835918]  ? __pfx_kthread+0x10/0x10
[   26.835940]  ret_from_fork+0x116/0x1d0
[   26.835961]  ? __pfx_kthread+0x10/0x10
[   26.835983]  ret_from_fork_asm+0x1a/0x30
[   26.836015]  </TASK>
[   26.836027] 
[   26.847669] Allocated by task 314:
[   26.848011]  kasan_save_stack+0x45/0x70
[   26.848377]  kasan_save_track+0x18/0x40
[   26.848754]  kasan_save_alloc_info+0x3b/0x50
[   26.849073]  __kasan_kmalloc+0xb7/0xc0
[   26.849201]  __kmalloc_cache_noprof+0x189/0x420
[   26.849360]  kasan_atomics+0x95/0x310
[   26.849489]  kunit_try_run_case+0x1a5/0x480
[   26.849746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.850225]  kthread+0x337/0x6f0
[   26.850549]  ret_from_fork+0x116/0x1d0
[   26.850917]  ret_from_fork_asm+0x1a/0x30
[   26.851280] 
[   26.851440] The buggy address belongs to the object at ffff88810623b200
[   26.851440]  which belongs to the cache kmalloc-64 of size 64
[   26.852506] The buggy address is located 0 bytes to the right of
[   26.852506]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.853028] 
[   26.853099] The buggy address belongs to the physical page:
[   26.853268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.853520] flags: 0x200000000000000(node=0|zone=2)
[   26.853800] page_type: f5(slab)
[   26.853971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.854285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.854616] page dumped because: kasan: bad access detected
[   26.854865] 
[   26.854977] Memory state around the buggy address:
[   26.855143]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.855454]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.855781] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.856085]                                      ^
[   26.856302]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.856647]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.856939] ==================================================================
[   25.991075] ==================================================================
[   25.991335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   25.992705] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.993404] 
[   25.993622] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.993679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.993694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.993718] Call Trace:
[   25.993740]  <TASK>
[   25.993760]  dump_stack_lvl+0x73/0xb0
[   25.993794]  print_report+0xd1/0x610
[   25.993817]  ? __virt_addr_valid+0x1db/0x2d0
[   25.993842]  ? kasan_atomics_helper+0x697/0x5450
[   25.993864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.993891]  ? kasan_atomics_helper+0x697/0x5450
[   25.993914]  kasan_report+0x141/0x180
[   25.993937]  ? kasan_atomics_helper+0x697/0x5450
[   25.993964]  kasan_check_range+0x10c/0x1c0
[   25.993989]  __kasan_check_write+0x18/0x20
[   25.994013]  kasan_atomics_helper+0x697/0x5450
[   25.994036]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.994058]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.994083]  ? kasan_atomics+0x152/0x310
[   25.994110]  kasan_atomics+0x1dc/0x310
[   25.994134]  ? __pfx_kasan_atomics+0x10/0x10
[   25.994159]  ? __pfx_read_tsc+0x10/0x10
[   25.994184]  ? ktime_get_ts64+0x86/0x230
[   25.994213]  kunit_try_run_case+0x1a5/0x480
[   25.994238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.994261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.994285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.994340]  ? __kthread_parkme+0x82/0x180
[   25.994364]  ? preempt_count_sub+0x50/0x80
[   25.994389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.994412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.994440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.994468]  kthread+0x337/0x6f0
[   25.994488]  ? trace_preempt_on+0x20/0xc0
[   25.994512]  ? __pfx_kthread+0x10/0x10
[   25.994534]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.994556]  ? calculate_sigpending+0x7b/0xa0
[   25.994600]  ? __pfx_kthread+0x10/0x10
[   25.994622]  ret_from_fork+0x116/0x1d0
[   25.994641]  ? __pfx_kthread+0x10/0x10
[   25.994663]  ret_from_fork_asm+0x1a/0x30
[   25.994695]  </TASK>
[   25.994708] 
[   26.006274] Allocated by task 314:
[   26.006564]  kasan_save_stack+0x45/0x70
[   26.006922]  kasan_save_track+0x18/0x40
[   26.007266]  kasan_save_alloc_info+0x3b/0x50
[   26.007667]  __kasan_kmalloc+0xb7/0xc0
[   26.007992]  __kmalloc_cache_noprof+0x189/0x420
[   26.008383]  kasan_atomics+0x95/0x310
[   26.008509]  kunit_try_run_case+0x1a5/0x480
[   26.008821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.009289]  kthread+0x337/0x6f0
[   26.009612]  ret_from_fork+0x116/0x1d0
[   26.009810]  ret_from_fork_asm+0x1a/0x30
[   26.009947] 
[   26.010015] The buggy address belongs to the object at ffff88810623b200
[   26.010015]  which belongs to the cache kmalloc-64 of size 64
[   26.010378] The buggy address is located 0 bytes to the right of
[   26.010378]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.011098] 
[   26.011252] The buggy address belongs to the physical page:
[   26.011735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.012391] flags: 0x200000000000000(node=0|zone=2)
[   26.012841] page_type: f5(slab)
[   26.013139] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.013824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.014452] page dumped because: kasan: bad access detected
[   26.014947] 
[   26.015111] Memory state around the buggy address:
[   26.015321]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.015529]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.016122] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.016756]                                      ^
[   26.017177]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.017678]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.017885] ==================================================================
[   26.894428] ==================================================================
[   26.894799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   26.895155] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.895542] 
[   26.895736] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.895805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.895819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.895875] Call Trace:
[   26.895897]  <TASK>
[   26.895917]  dump_stack_lvl+0x73/0xb0
[   26.895948]  print_report+0xd1/0x610
[   26.895971]  ? __virt_addr_valid+0x1db/0x2d0
[   26.895996]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.896022]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.896050]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.896073]  kasan_report+0x141/0x180
[   26.896096]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.896124]  kasan_check_range+0x10c/0x1c0
[   26.896148]  __kasan_check_write+0x18/0x20
[   26.896172]  kasan_atomics_helper+0x1e12/0x5450
[   26.896196]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.896218]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.896244]  ? kasan_atomics+0x152/0x310
[   26.896271]  kasan_atomics+0x1dc/0x310
[   26.896295]  ? __pfx_kasan_atomics+0x10/0x10
[   26.896332]  ? __pfx_read_tsc+0x10/0x10
[   26.896355]  ? ktime_get_ts64+0x86/0x230
[   26.896382]  kunit_try_run_case+0x1a5/0x480
[   26.896409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.896431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.896457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.896481]  ? __kthread_parkme+0x82/0x180
[   26.896503]  ? preempt_count_sub+0x50/0x80
[   26.896528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.896553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.896581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.896609]  kthread+0x337/0x6f0
[   26.896630]  ? trace_preempt_on+0x20/0xc0
[   26.896655]  ? __pfx_kthread+0x10/0x10
[   26.896676]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.896698]  ? calculate_sigpending+0x7b/0xa0
[   26.896723]  ? __pfx_kthread+0x10/0x10
[   26.896745]  ret_from_fork+0x116/0x1d0
[   26.896766]  ? __pfx_kthread+0x10/0x10
[   26.896788]  ret_from_fork_asm+0x1a/0x30
[   26.896820]  </TASK>
[   26.896832] 
[   26.904207] Allocated by task 314:
[   26.904346]  kasan_save_stack+0x45/0x70
[   26.904488]  kasan_save_track+0x18/0x40
[   26.904638]  kasan_save_alloc_info+0x3b/0x50
[   26.904817]  __kasan_kmalloc+0xb7/0xc0
[   26.905052]  __kmalloc_cache_noprof+0x189/0x420
[   26.905276]  kasan_atomics+0x95/0x310
[   26.905462]  kunit_try_run_case+0x1a5/0x480
[   26.905748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.906091]  kthread+0x337/0x6f0
[   26.906252]  ret_from_fork+0x116/0x1d0
[   26.906458]  ret_from_fork_asm+0x1a/0x30
[   26.906694] 
[   26.906789] The buggy address belongs to the object at ffff88810623b200
[   26.906789]  which belongs to the cache kmalloc-64 of size 64
[   26.907186] The buggy address is located 0 bytes to the right of
[   26.907186]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.907683] 
[   26.907781] The buggy address belongs to the physical page:
[   26.908037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.908475] flags: 0x200000000000000(node=0|zone=2)
[   26.908843] page_type: f5(slab)
[   26.909077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.909399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.909651] page dumped because: kasan: bad access detected
[   26.909819] 
[   26.909884] Memory state around the buggy address:
[   26.910096]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.910476]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.910830] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.911133]                                      ^
[   26.911422]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.911721]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.912013] ==================================================================
[   26.274725] ==================================================================
[   26.275111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   26.275744] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.276175] 
[   26.276427] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.276484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.276499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.276521] Call Trace:
[   26.276540]  <TASK>
[   26.276564]  dump_stack_lvl+0x73/0xb0
[   26.276609]  print_report+0xd1/0x610
[   26.276633]  ? __virt_addr_valid+0x1db/0x2d0
[   26.276658]  ? kasan_atomics_helper+0xf10/0x5450
[   26.276681]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.276708]  ? kasan_atomics_helper+0xf10/0x5450
[   26.276730]  kasan_report+0x141/0x180
[   26.276753]  ? kasan_atomics_helper+0xf10/0x5450
[   26.276780]  kasan_check_range+0x10c/0x1c0
[   26.276805]  __kasan_check_write+0x18/0x20
[   26.276829]  kasan_atomics_helper+0xf10/0x5450
[   26.276853]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.276876]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.276903]  ? kasan_atomics+0x152/0x310
[   26.276930]  kasan_atomics+0x1dc/0x310
[   26.276954]  ? __pfx_kasan_atomics+0x10/0x10
[   26.276979]  ? __pfx_read_tsc+0x10/0x10
[   26.277003]  ? ktime_get_ts64+0x86/0x230
[   26.277031]  kunit_try_run_case+0x1a5/0x480
[   26.277056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.277079]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.277104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.277129]  ? __kthread_parkme+0x82/0x180
[   26.277150]  ? preempt_count_sub+0x50/0x80
[   26.277175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.277199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.277228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.277257]  kthread+0x337/0x6f0
[   26.277278]  ? trace_preempt_on+0x20/0xc0
[   26.277301]  ? __pfx_kthread+0x10/0x10
[   26.277331]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.277353]  ? calculate_sigpending+0x7b/0xa0
[   26.277377]  ? __pfx_kthread+0x10/0x10
[   26.277400]  ret_from_fork+0x116/0x1d0
[   26.277420]  ? __pfx_kthread+0x10/0x10
[   26.277441]  ret_from_fork_asm+0x1a/0x30
[   26.277473]  </TASK>
[   26.277486] 
[   26.284435] Allocated by task 314:
[   26.284571]  kasan_save_stack+0x45/0x70
[   26.284782]  kasan_save_track+0x18/0x40
[   26.284971]  kasan_save_alloc_info+0x3b/0x50
[   26.285179]  __kasan_kmalloc+0xb7/0xc0
[   26.285370]  __kmalloc_cache_noprof+0x189/0x420
[   26.285584]  kasan_atomics+0x95/0x310
[   26.285759]  kunit_try_run_case+0x1a5/0x480
[   26.285948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.286161]  kthread+0x337/0x6f0
[   26.286328]  ret_from_fork+0x116/0x1d0
[   26.286484]  ret_from_fork_asm+0x1a/0x30
[   26.286684] 
[   26.286770] The buggy address belongs to the object at ffff88810623b200
[   26.286770]  which belongs to the cache kmalloc-64 of size 64
[   26.287224] The buggy address is located 0 bytes to the right of
[   26.287224]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.287785] 
[   26.287872] The buggy address belongs to the physical page:
[   26.288043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.288280] flags: 0x200000000000000(node=0|zone=2)
[   26.288449] page_type: f5(slab)
[   26.288566] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.288852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.289508] page dumped because: kasan: bad access detected
[   26.289734] 
[   26.289800] Memory state around the buggy address:
[   26.289953]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.290164]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.290503] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.291125]                                      ^
[   26.291357]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.291740]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.291997] ==================================================================
[   26.018492] ==================================================================
[   26.019186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   26.019831] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.020441] 
[   26.020631] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.020685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.020699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.020721] Call Trace:
[   26.020740]  <TASK>
[   26.020756]  dump_stack_lvl+0x73/0xb0
[   26.020787]  print_report+0xd1/0x610
[   26.020810]  ? __virt_addr_valid+0x1db/0x2d0
[   26.020835]  ? kasan_atomics_helper+0x72f/0x5450
[   26.020857]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.020884]  ? kasan_atomics_helper+0x72f/0x5450
[   26.020906]  kasan_report+0x141/0x180
[   26.020929]  ? kasan_atomics_helper+0x72f/0x5450
[   26.020955]  kasan_check_range+0x10c/0x1c0
[   26.020980]  __kasan_check_write+0x18/0x20
[   26.021003]  kasan_atomics_helper+0x72f/0x5450
[   26.021027]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.021050]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.021074]  ? kasan_atomics+0x152/0x310
[   26.021102]  kasan_atomics+0x1dc/0x310
[   26.021125]  ? __pfx_kasan_atomics+0x10/0x10
[   26.021151]  ? __pfx_read_tsc+0x10/0x10
[   26.021175]  ? ktime_get_ts64+0x86/0x230
[   26.021200]  kunit_try_run_case+0x1a5/0x480
[   26.021226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.021250]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.021274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.021297]  ? __kthread_parkme+0x82/0x180
[   26.021331]  ? preempt_count_sub+0x50/0x80
[   26.021355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.021380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.021407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.021435]  kthread+0x337/0x6f0
[   26.021458]  ? trace_preempt_on+0x20/0xc0
[   26.021482]  ? __pfx_kthread+0x10/0x10
[   26.021503]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.021526]  ? calculate_sigpending+0x7b/0xa0
[   26.021551]  ? __pfx_kthread+0x10/0x10
[   26.021592]  ret_from_fork+0x116/0x1d0
[   26.021619]  ? __pfx_kthread+0x10/0x10
[   26.021640]  ret_from_fork_asm+0x1a/0x30
[   26.021673]  </TASK>
[   26.021684] 
[   26.031088] Allocated by task 314:
[   26.031275]  kasan_save_stack+0x45/0x70
[   26.031485]  kasan_save_track+0x18/0x40
[   26.031706]  kasan_save_alloc_info+0x3b/0x50
[   26.031921]  __kasan_kmalloc+0xb7/0xc0
[   26.032105]  __kmalloc_cache_noprof+0x189/0x420
[   26.032261]  kasan_atomics+0x95/0x310
[   26.032400]  kunit_try_run_case+0x1a5/0x480
[   26.032543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.032819]  kthread+0x337/0x6f0
[   26.032984]  ret_from_fork+0x116/0x1d0
[   26.033168]  ret_from_fork_asm+0x1a/0x30
[   26.033340] 
[   26.033431] The buggy address belongs to the object at ffff88810623b200
[   26.033431]  which belongs to the cache kmalloc-64 of size 64
[   26.033824] The buggy address is located 0 bytes to the right of
[   26.033824]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.034339] 
[   26.034435] The buggy address belongs to the physical page:
[   26.034711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.035054] flags: 0x200000000000000(node=0|zone=2)
[   26.035264] page_type: f5(slab)
[   26.035435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.035757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.036033] page dumped because: kasan: bad access detected
[   26.036207] 
[   26.036298] Memory state around the buggy address:
[   26.036535]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.036829]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.037043] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.037351]                                      ^
[   26.037588]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.037909]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.038182] ==================================================================
[   25.909522] ==================================================================
[   25.910262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   25.910736] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.911210] 
[   25.911328] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.911384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.911398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.911421] Call Trace:
[   25.911444]  <TASK>
[   25.911464]  dump_stack_lvl+0x73/0xb0
[   25.911497]  print_report+0xd1/0x610
[   25.911520]  ? __virt_addr_valid+0x1db/0x2d0
[   25.911545]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.911567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.911761]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.911786]  kasan_report+0x141/0x180
[   25.911809]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.911837]  __asan_report_store4_noabort+0x1b/0x30
[   25.911888]  kasan_atomics_helper+0x4b3a/0x5450
[   25.911911]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.911934]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.911960]  ? kasan_atomics+0x152/0x310
[   25.911988]  kasan_atomics+0x1dc/0x310
[   25.912011]  ? __pfx_kasan_atomics+0x10/0x10
[   25.912036]  ? __pfx_read_tsc+0x10/0x10
[   25.912061]  ? ktime_get_ts64+0x86/0x230
[   25.912089]  kunit_try_run_case+0x1a5/0x480
[   25.912114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.912138]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.912163]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.912188]  ? __kthread_parkme+0x82/0x180
[   25.912210]  ? preempt_count_sub+0x50/0x80
[   25.912235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.912259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.912287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.912325]  kthread+0x337/0x6f0
[   25.912346]  ? trace_preempt_on+0x20/0xc0
[   25.912372]  ? __pfx_kthread+0x10/0x10
[   25.912395]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.912417]  ? calculate_sigpending+0x7b/0xa0
[   25.912442]  ? __pfx_kthread+0x10/0x10
[   25.912465]  ret_from_fork+0x116/0x1d0
[   25.912485]  ? __pfx_kthread+0x10/0x10
[   25.912506]  ret_from_fork_asm+0x1a/0x30
[   25.912539]  </TASK>
[   25.912552] 
[   25.923285] Allocated by task 314:
[   25.923727]  kasan_save_stack+0x45/0x70
[   25.923936]  kasan_save_track+0x18/0x40
[   25.924293]  kasan_save_alloc_info+0x3b/0x50
[   25.924507]  __kasan_kmalloc+0xb7/0xc0
[   25.924776]  __kmalloc_cache_noprof+0x189/0x420
[   25.925002]  kasan_atomics+0x95/0x310
[   25.925167]  kunit_try_run_case+0x1a5/0x480
[   25.925374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.925609]  kthread+0x337/0x6f0
[   25.925757]  ret_from_fork+0x116/0x1d0
[   25.925928]  ret_from_fork_asm+0x1a/0x30
[   25.926101] 
[   25.926179] The buggy address belongs to the object at ffff88810623b200
[   25.926179]  which belongs to the cache kmalloc-64 of size 64
[   25.927266] The buggy address is located 0 bytes to the right of
[   25.927266]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.928179] 
[   25.928277] The buggy address belongs to the physical page:
[   25.928701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.929253] flags: 0x200000000000000(node=0|zone=2)
[   25.929634] page_type: f5(slab)
[   25.929779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.930327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.930779] page dumped because: kasan: bad access detected
[   25.931186] 
[   25.931287] Memory state around the buggy address:
[   25.931673]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.932140]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.932475] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.933009]                                      ^
[   25.933289]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.933722]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.934192] ==================================================================
[   26.106602] ==================================================================
[   26.106876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   26.107194] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.107532] 
[   26.107664] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.107713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.107728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.107749] Call Trace:
[   26.107766]  <TASK>
[   26.107782]  dump_stack_lvl+0x73/0xb0
[   26.107810]  print_report+0xd1/0x610
[   26.107835]  ? __virt_addr_valid+0x1db/0x2d0
[   26.107881]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.107903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.107932]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.107954]  kasan_report+0x141/0x180
[   26.107977]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.108005]  kasan_check_range+0x10c/0x1c0
[   26.108029]  __kasan_check_write+0x18/0x20
[   26.108054]  kasan_atomics_helper+0xa2b/0x5450
[   26.108077]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.108100]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.108127]  ? kasan_atomics+0x152/0x310
[   26.108154]  kasan_atomics+0x1dc/0x310
[   26.108177]  ? __pfx_kasan_atomics+0x10/0x10
[   26.108202]  ? __pfx_read_tsc+0x10/0x10
[   26.108226]  ? ktime_get_ts64+0x86/0x230
[   26.108251]  kunit_try_run_case+0x1a5/0x480
[   26.108275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.108299]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.108331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.108356]  ? __kthread_parkme+0x82/0x180
[   26.108377]  ? preempt_count_sub+0x50/0x80
[   26.108402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.108426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.108454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.108482]  kthread+0x337/0x6f0
[   26.108502]  ? trace_preempt_on+0x20/0xc0
[   26.108527]  ? __pfx_kthread+0x10/0x10
[   26.108548]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.108570]  ? calculate_sigpending+0x7b/0xa0
[   26.108613]  ? __pfx_kthread+0x10/0x10
[   26.108636]  ret_from_fork+0x116/0x1d0
[   26.108656]  ? __pfx_kthread+0x10/0x10
[   26.108678]  ret_from_fork_asm+0x1a/0x30
[   26.108709]  </TASK>
[   26.108720] 
[   26.118670] Allocated by task 314:
[   26.118904]  kasan_save_stack+0x45/0x70
[   26.119222]  kasan_save_track+0x18/0x40
[   26.119569]  kasan_save_alloc_info+0x3b/0x50
[   26.119797]  __kasan_kmalloc+0xb7/0xc0
[   26.119972]  __kmalloc_cache_noprof+0x189/0x420
[   26.120169]  kasan_atomics+0x95/0x310
[   26.120592]  kunit_try_run_case+0x1a5/0x480
[   26.120912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.121324]  kthread+0x337/0x6f0
[   26.121635]  ret_from_fork+0x116/0x1d0
[   26.122012]  ret_from_fork_asm+0x1a/0x30
[   26.122207] 
[   26.122296] The buggy address belongs to the object at ffff88810623b200
[   26.122296]  which belongs to the cache kmalloc-64 of size 64
[   26.123138] The buggy address is located 0 bytes to the right of
[   26.123138]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.124021] 
[   26.124246] The buggy address belongs to the physical page:
[   26.124798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.125338] flags: 0x200000000000000(node=0|zone=2)
[   26.125516] page_type: f5(slab)
[   26.125791] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.126467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.127077] page dumped because: kasan: bad access detected
[   26.127248] 
[   26.127326] Memory state around the buggy address:
[   26.127482]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.127992]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.128605] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.129350]                                      ^
[   26.129803]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.130546]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.131114] ==================================================================
[   26.131766] ==================================================================
[   26.132160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   26.132802] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.133263] 
[   26.133362] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.133417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.133431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.133454] Call Trace:
[   26.133477]  <TASK>
[   26.133497]  dump_stack_lvl+0x73/0xb0
[   26.133528]  print_report+0xd1/0x610
[   26.133551]  ? __virt_addr_valid+0x1db/0x2d0
[   26.133576]  ? kasan_atomics_helper+0xac7/0x5450
[   26.133624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.133651]  ? kasan_atomics_helper+0xac7/0x5450
[   26.133674]  kasan_report+0x141/0x180
[   26.133719]  ? kasan_atomics_helper+0xac7/0x5450
[   26.133747]  kasan_check_range+0x10c/0x1c0
[   26.133771]  __kasan_check_write+0x18/0x20
[   26.133795]  kasan_atomics_helper+0xac7/0x5450
[   26.133818]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.133841]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.133882]  ? kasan_atomics+0x152/0x310
[   26.133909]  kasan_atomics+0x1dc/0x310
[   26.133933]  ? __pfx_kasan_atomics+0x10/0x10
[   26.133958]  ? __pfx_read_tsc+0x10/0x10
[   26.133981]  ? ktime_get_ts64+0x86/0x230
[   26.134007]  kunit_try_run_case+0x1a5/0x480
[   26.134033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.134057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.134082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.134106]  ? __kthread_parkme+0x82/0x180
[   26.134128]  ? preempt_count_sub+0x50/0x80
[   26.134153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.134177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.134207]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.134234]  kthread+0x337/0x6f0
[   26.134255]  ? trace_preempt_on+0x20/0xc0
[   26.134280]  ? __pfx_kthread+0x10/0x10
[   26.134302]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.134335]  ? calculate_sigpending+0x7b/0xa0
[   26.134360]  ? __pfx_kthread+0x10/0x10
[   26.134382]  ret_from_fork+0x116/0x1d0
[   26.134403]  ? __pfx_kthread+0x10/0x10
[   26.134425]  ret_from_fork_asm+0x1a/0x30
[   26.134458]  </TASK>
[   26.134470] 
[   26.143213] Allocated by task 314:
[   26.143413]  kasan_save_stack+0x45/0x70
[   26.143672]  kasan_save_track+0x18/0x40
[   26.143849]  kasan_save_alloc_info+0x3b/0x50
[   26.144056]  __kasan_kmalloc+0xb7/0xc0
[   26.144226]  __kmalloc_cache_noprof+0x189/0x420
[   26.144444]  kasan_atomics+0x95/0x310
[   26.144662]  kunit_try_run_case+0x1a5/0x480
[   26.144849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.145083]  kthread+0x337/0x6f0
[   26.145263]  ret_from_fork+0x116/0x1d0
[   26.145419]  ret_from_fork_asm+0x1a/0x30
[   26.145658] 
[   26.145750] The buggy address belongs to the object at ffff88810623b200
[   26.145750]  which belongs to the cache kmalloc-64 of size 64
[   26.146247] The buggy address is located 0 bytes to the right of
[   26.146247]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.146799] 
[   26.146895] The buggy address belongs to the physical page:
[   26.147105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.147473] flags: 0x200000000000000(node=0|zone=2)
[   26.147718] page_type: f5(slab)
[   26.147871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.148194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.148575] page dumped because: kasan: bad access detected
[   26.148779] 
[   26.148872] Memory state around the buggy address:
[   26.149094]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.149409]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.149728] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.149999]                                      ^
[   26.150145]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.150376]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.150578] ==================================================================
[   26.309456] ==================================================================
[   26.309749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   26.310082] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.310406] 
[   26.310486] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.310534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.310549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.310570] Call Trace:
[   26.310585]  <TASK>
[   26.310601]  dump_stack_lvl+0x73/0xb0
[   26.310628]  print_report+0xd1/0x610
[   26.310651]  ? __virt_addr_valid+0x1db/0x2d0
[   26.310675]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.310697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.310723]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.310746]  kasan_report+0x141/0x180
[   26.310768]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.310795]  __asan_report_load4_noabort+0x18/0x20
[   26.310819]  kasan_atomics_helper+0x4a36/0x5450
[   26.310842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.310865]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.310890]  ? kasan_atomics+0x152/0x310
[   26.310916]  kasan_atomics+0x1dc/0x310
[   26.310939]  ? __pfx_kasan_atomics+0x10/0x10
[   26.310964]  ? __pfx_read_tsc+0x10/0x10
[   26.310986]  ? ktime_get_ts64+0x86/0x230
[   26.311011]  kunit_try_run_case+0x1a5/0x480
[   26.311035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.311058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.311082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.311105]  ? __kthread_parkme+0x82/0x180
[   26.311125]  ? preempt_count_sub+0x50/0x80
[   26.311150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.311174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.311201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.311229]  kthread+0x337/0x6f0
[   26.311249]  ? trace_preempt_on+0x20/0xc0
[   26.311273]  ? __pfx_kthread+0x10/0x10
[   26.311294]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.311328]  ? calculate_sigpending+0x7b/0xa0
[   26.311353]  ? __pfx_kthread+0x10/0x10
[   26.311375]  ret_from_fork+0x116/0x1d0
[   26.311395]  ? __pfx_kthread+0x10/0x10
[   26.311416]  ret_from_fork_asm+0x1a/0x30
[   26.311447]  </TASK>
[   26.311458] 
[   26.318168] Allocated by task 314:
[   26.318296]  kasan_save_stack+0x45/0x70
[   26.318441]  kasan_save_track+0x18/0x40
[   26.318570]  kasan_save_alloc_info+0x3b/0x50
[   26.318734]  __kasan_kmalloc+0xb7/0xc0
[   26.318861]  __kmalloc_cache_noprof+0x189/0x420
[   26.319080]  kasan_atomics+0x95/0x310
[   26.319263]  kunit_try_run_case+0x1a5/0x480
[   26.319479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.319754]  kthread+0x337/0x6f0
[   26.319924]  ret_from_fork+0x116/0x1d0
[   26.320113]  ret_from_fork_asm+0x1a/0x30
[   26.320318] 
[   26.320409] The buggy address belongs to the object at ffff88810623b200
[   26.320409]  which belongs to the cache kmalloc-64 of size 64
[   26.320953] The buggy address is located 0 bytes to the right of
[   26.320953]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.321490] 
[   26.321561] The buggy address belongs to the physical page:
[   26.321815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.322126] flags: 0x200000000000000(node=0|zone=2)
[   26.322335] page_type: f5(slab)
[   26.322501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.322829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.323130] page dumped because: kasan: bad access detected
[   26.323365] 
[   26.323447] Memory state around the buggy address:
[   26.323668]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.323947]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.324230] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.324509]                                      ^
[   26.324731]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.325020]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.325262] ==================================================================
[   26.421679] ==================================================================
[   26.421966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   26.422201] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.422433] 
[   26.422521] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.422570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.422604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.422627] Call Trace:
[   26.422648]  <TASK>
[   26.422665]  dump_stack_lvl+0x73/0xb0
[   26.422694]  print_report+0xd1/0x610
[   26.422717]  ? __virt_addr_valid+0x1db/0x2d0
[   26.422741]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.422763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.422791]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.422812]  kasan_report+0x141/0x180
[   26.422836]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.422862]  __asan_report_load4_noabort+0x18/0x20
[   26.422887]  kasan_atomics_helper+0x49e8/0x5450
[   26.422910]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.422933]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.422958]  ? kasan_atomics+0x152/0x310
[   26.422985]  kasan_atomics+0x1dc/0x310
[   26.423008]  ? __pfx_kasan_atomics+0x10/0x10
[   26.423033]  ? __pfx_read_tsc+0x10/0x10
[   26.423057]  ? ktime_get_ts64+0x86/0x230
[   26.423083]  kunit_try_run_case+0x1a5/0x480
[   26.423107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.423130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.423154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.423178]  ? __kthread_parkme+0x82/0x180
[   26.423199]  ? preempt_count_sub+0x50/0x80
[   26.423224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.423249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.423277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.423305]  kthread+0x337/0x6f0
[   26.423336]  ? trace_preempt_on+0x20/0xc0
[   26.423361]  ? __pfx_kthread+0x10/0x10
[   26.423383]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.423405]  ? calculate_sigpending+0x7b/0xa0
[   26.423430]  ? __pfx_kthread+0x10/0x10
[   26.423452]  ret_from_fork+0x116/0x1d0
[   26.423473]  ? __pfx_kthread+0x10/0x10
[   26.423495]  ret_from_fork_asm+0x1a/0x30
[   26.423527]  </TASK>
[   26.423538] 
[   26.430663] Allocated by task 314:
[   26.430819]  kasan_save_stack+0x45/0x70
[   26.430979]  kasan_save_track+0x18/0x40
[   26.431152]  kasan_save_alloc_info+0x3b/0x50
[   26.431349]  __kasan_kmalloc+0xb7/0xc0
[   26.431520]  __kmalloc_cache_noprof+0x189/0x420
[   26.431728]  kasan_atomics+0x95/0x310
[   26.431907]  kunit_try_run_case+0x1a5/0x480
[   26.432086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.432271]  kthread+0x337/0x6f0
[   26.432438]  ret_from_fork+0x116/0x1d0
[   26.432648]  ret_from_fork_asm+0x1a/0x30
[   26.432804] 
[   26.432870] The buggy address belongs to the object at ffff88810623b200
[   26.432870]  which belongs to the cache kmalloc-64 of size 64
[   26.433383] The buggy address is located 0 bytes to the right of
[   26.433383]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.433836] 
[   26.433905] The buggy address belongs to the physical page:
[   26.434075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.434388] flags: 0x200000000000000(node=0|zone=2)
[   26.434642] page_type: f5(slab)
[   26.434807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.435142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.435484] page dumped because: kasan: bad access detected
[   26.435738] 
[   26.435809] Memory state around the buggy address:
[   26.435961]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.436180]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.436509] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.436846]                                      ^
[   26.437070]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.437366]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.437664] ==================================================================
[   27.049565] ==================================================================
[   27.049967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   27.050333] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   27.050625] 
[   27.050750] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.050802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.050817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.050839] Call Trace:
[   27.050872]  <TASK>
[   27.050890]  dump_stack_lvl+0x73/0xb0
[   27.050920]  print_report+0xd1/0x610
[   27.050956]  ? __virt_addr_valid+0x1db/0x2d0
[   27.050981]  ? kasan_atomics_helper+0x218a/0x5450
[   27.051005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.051032]  ? kasan_atomics_helper+0x218a/0x5450
[   27.051055]  kasan_report+0x141/0x180
[   27.051078]  ? kasan_atomics_helper+0x218a/0x5450
[   27.051105]  kasan_check_range+0x10c/0x1c0
[   27.051130]  __kasan_check_write+0x18/0x20
[   27.051163]  kasan_atomics_helper+0x218a/0x5450
[   27.051187]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.051210]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.051245]  ? kasan_atomics+0x152/0x310
[   27.051273]  kasan_atomics+0x1dc/0x310
[   27.051296]  ? __pfx_kasan_atomics+0x10/0x10
[   27.051339]  ? __pfx_read_tsc+0x10/0x10
[   27.051362]  ? ktime_get_ts64+0x86/0x230
[   27.051399]  kunit_try_run_case+0x1a5/0x480
[   27.051424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.051448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.051473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.051497]  ? __kthread_parkme+0x82/0x180
[   27.051529]  ? preempt_count_sub+0x50/0x80
[   27.051554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.051584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.051631]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.051660]  kthread+0x337/0x6f0
[   27.051681]  ? trace_preempt_on+0x20/0xc0
[   27.051706]  ? __pfx_kthread+0x10/0x10
[   27.051727]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.051749]  ? calculate_sigpending+0x7b/0xa0
[   27.051775]  ? __pfx_kthread+0x10/0x10
[   27.051798]  ret_from_fork+0x116/0x1d0
[   27.051817]  ? __pfx_kthread+0x10/0x10
[   27.051838]  ret_from_fork_asm+0x1a/0x30
[   27.051870]  </TASK>
[   27.051882] 
[   27.059255] Allocated by task 314:
[   27.059437]  kasan_save_stack+0x45/0x70
[   27.059629]  kasan_save_track+0x18/0x40
[   27.059815]  kasan_save_alloc_info+0x3b/0x50
[   27.060032]  __kasan_kmalloc+0xb7/0xc0
[   27.060206]  __kmalloc_cache_noprof+0x189/0x420
[   27.060411]  kasan_atomics+0x95/0x310
[   27.060598]  kunit_try_run_case+0x1a5/0x480
[   27.060793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.061049]  kthread+0x337/0x6f0
[   27.061223]  ret_from_fork+0x116/0x1d0
[   27.061430]  ret_from_fork_asm+0x1a/0x30
[   27.061607] 
[   27.061737] The buggy address belongs to the object at ffff88810623b200
[   27.061737]  which belongs to the cache kmalloc-64 of size 64
[   27.062165] The buggy address is located 0 bytes to the right of
[   27.062165]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   27.062742] 
[   27.062841] The buggy address belongs to the physical page:
[   27.063087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   27.063436] flags: 0x200000000000000(node=0|zone=2)
[   27.063626] page_type: f5(slab)
[   27.063818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.064128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.064475] page dumped because: kasan: bad access detected
[   27.064676] 
[   27.064779] Memory state around the buggy address:
[   27.065078]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.065289]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.065509] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.065722]                                      ^
[   27.065873]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.066378]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.066964] ==================================================================
[   25.829329] ==================================================================
[   25.829674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   25.829929] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.830162] 
[   25.830275] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.830337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.830351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.830374] Call Trace:
[   25.830395]  <TASK>
[   25.830413]  dump_stack_lvl+0x73/0xb0
[   25.830442]  print_report+0xd1/0x610
[   25.830465]  ? __virt_addr_valid+0x1db/0x2d0
[   25.830490]  ? kasan_atomics_helper+0x3df/0x5450
[   25.830511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.830537]  ? kasan_atomics_helper+0x3df/0x5450
[   25.830559]  kasan_report+0x141/0x180
[   25.830582]  ? kasan_atomics_helper+0x3df/0x5450
[   25.830623]  kasan_check_range+0x10c/0x1c0
[   25.830649]  __kasan_check_read+0x15/0x20
[   25.830673]  kasan_atomics_helper+0x3df/0x5450
[   25.830697]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.830720]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.830746]  ? kasan_atomics+0x152/0x310
[   25.830773]  kasan_atomics+0x1dc/0x310
[   25.830796]  ? __pfx_kasan_atomics+0x10/0x10
[   25.830821]  ? __pfx_read_tsc+0x10/0x10
[   25.830844]  ? ktime_get_ts64+0x86/0x230
[   25.830870]  kunit_try_run_case+0x1a5/0x480
[   25.830896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.830920]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.830945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.830969]  ? __kthread_parkme+0x82/0x180
[   25.830991]  ? preempt_count_sub+0x50/0x80
[   25.831016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.831040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.831068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.831096]  kthread+0x337/0x6f0
[   25.831117]  ? trace_preempt_on+0x20/0xc0
[   25.831141]  ? __pfx_kthread+0x10/0x10
[   25.831163]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.831185]  ? calculate_sigpending+0x7b/0xa0
[   25.831210]  ? __pfx_kthread+0x10/0x10
[   25.831233]  ret_from_fork+0x116/0x1d0
[   25.831253]  ? __pfx_kthread+0x10/0x10
[   25.831275]  ret_from_fork_asm+0x1a/0x30
[   25.831317]  </TASK>
[   25.831329] 
[   25.838762] Allocated by task 314:
[   25.839229]  kasan_save_stack+0x45/0x70
[   25.839444]  kasan_save_track+0x18/0x40
[   25.839684]  kasan_save_alloc_info+0x3b/0x50
[   25.839976]  __kasan_kmalloc+0xb7/0xc0
[   25.840175]  __kmalloc_cache_noprof+0x189/0x420
[   25.840404]  kasan_atomics+0x95/0x310
[   25.840569]  kunit_try_run_case+0x1a5/0x480
[   25.840769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.841094]  kthread+0x337/0x6f0
[   25.841261]  ret_from_fork+0x116/0x1d0
[   25.841403]  ret_from_fork_asm+0x1a/0x30
[   25.841540] 
[   25.841663] The buggy address belongs to the object at ffff88810623b200
[   25.841663]  which belongs to the cache kmalloc-64 of size 64
[   25.842547] The buggy address is located 0 bytes to the right of
[   25.842547]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.843243] 
[   25.843337] The buggy address belongs to the physical page:
[   25.843510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.843991] flags: 0x200000000000000(node=0|zone=2)
[   25.844243] page_type: f5(slab)
[   25.844429] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.844734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.846000] page dumped because: kasan: bad access detected
[   25.846261] 
[   25.846368] Memory state around the buggy address:
[   25.846580]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.847262]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.847567] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.847842]                                      ^
[   25.848378]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.848780]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.849216] ==================================================================
[   25.877423] ==================================================================
[   25.878872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   25.879546] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.880367] 
[   25.880602] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.880674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.880688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.880713] Call Trace:
[   25.880735]  <TASK>
[   25.880757]  dump_stack_lvl+0x73/0xb0
[   25.880788]  print_report+0xd1/0x610
[   25.880812]  ? __virt_addr_valid+0x1db/0x2d0
[   25.880837]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.880867]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.880894]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.880917]  kasan_report+0x141/0x180
[   25.880939]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.880966]  kasan_check_range+0x10c/0x1c0
[   25.880990]  __kasan_check_write+0x18/0x20
[   25.881014]  kasan_atomics_helper+0x4a0/0x5450
[   25.881037]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.881059]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.881085]  ? kasan_atomics+0x152/0x310
[   25.881112]  kasan_atomics+0x1dc/0x310
[   25.881134]  ? __pfx_kasan_atomics+0x10/0x10
[   25.881160]  ? __pfx_read_tsc+0x10/0x10
[   25.881182]  ? ktime_get_ts64+0x86/0x230
[   25.881208]  kunit_try_run_case+0x1a5/0x480
[   25.881233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.881257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.881282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.881315]  ? __kthread_parkme+0x82/0x180
[   25.881337]  ? preempt_count_sub+0x50/0x80
[   25.881362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.881386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.881414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.881443]  kthread+0x337/0x6f0
[   25.881463]  ? trace_preempt_on+0x20/0xc0
[   25.881488]  ? __pfx_kthread+0x10/0x10
[   25.881510]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.881532]  ? calculate_sigpending+0x7b/0xa0
[   25.881557]  ? __pfx_kthread+0x10/0x10
[   25.881579]  ret_from_fork+0x116/0x1d0
[   25.881603]  ? __pfx_kthread+0x10/0x10
[   25.881628]  ret_from_fork_asm+0x1a/0x30
[   25.881662]  </TASK>
[   25.881675] 
[   25.896591] Allocated by task 314:
[   25.897443]  kasan_save_stack+0x45/0x70
[   25.897778]  kasan_save_track+0x18/0x40
[   25.898135]  kasan_save_alloc_info+0x3b/0x50
[   25.898458]  __kasan_kmalloc+0xb7/0xc0
[   25.898736]  __kmalloc_cache_noprof+0x189/0x420
[   25.899129]  kasan_atomics+0x95/0x310
[   25.899358]  kunit_try_run_case+0x1a5/0x480
[   25.899761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.900165]  kthread+0x337/0x6f0
[   25.900324]  ret_from_fork+0x116/0x1d0
[   25.900531]  ret_from_fork_asm+0x1a/0x30
[   25.900967] 
[   25.901063] The buggy address belongs to the object at ffff88810623b200
[   25.901063]  which belongs to the cache kmalloc-64 of size 64
[   25.901726] The buggy address is located 0 bytes to the right of
[   25.901726]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.902477] 
[   25.902698] The buggy address belongs to the physical page:
[   25.902918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.903758] flags: 0x200000000000000(node=0|zone=2)
[   25.904157] page_type: f5(slab)
[   25.904294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.904836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.905356] page dumped because: kasan: bad access detected
[   25.905712] 
[   25.905798] Memory state around the buggy address:
[   25.906125]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.906749]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.907181] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.907482]                                      ^
[   25.907808]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.908148]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.908706] ==================================================================
[   26.455138] ==================================================================
[   26.455505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   26.455886] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.456195] 
[   26.456287] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.456346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.456360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.456383] Call Trace:
[   26.456401]  <TASK>
[   26.456418]  dump_stack_lvl+0x73/0xb0
[   26.456447]  print_report+0xd1/0x610
[   26.456470]  ? __virt_addr_valid+0x1db/0x2d0
[   26.456494]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.456516]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.456543]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.456565]  kasan_report+0x141/0x180
[   26.456609]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.456635]  __asan_report_load4_noabort+0x18/0x20
[   26.456660]  kasan_atomics_helper+0x49ce/0x5450
[   26.456684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.456707]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.456732]  ? kasan_atomics+0x152/0x310
[   26.456759]  kasan_atomics+0x1dc/0x310
[   26.456781]  ? __pfx_kasan_atomics+0x10/0x10
[   26.456806]  ? __pfx_read_tsc+0x10/0x10
[   26.456829]  ? ktime_get_ts64+0x86/0x230
[   26.456855]  kunit_try_run_case+0x1a5/0x480
[   26.456879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.456902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.456926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.456950]  ? __kthread_parkme+0x82/0x180
[   26.456972]  ? preempt_count_sub+0x50/0x80
[   26.456997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.457021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.457049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.457077]  kthread+0x337/0x6f0
[   26.457098]  ? trace_preempt_on+0x20/0xc0
[   26.457122]  ? __pfx_kthread+0x10/0x10
[   26.457144]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.457166]  ? calculate_sigpending+0x7b/0xa0
[   26.457190]  ? __pfx_kthread+0x10/0x10
[   26.457213]  ret_from_fork+0x116/0x1d0
[   26.457233]  ? __pfx_kthread+0x10/0x10
[   26.457255]  ret_from_fork_asm+0x1a/0x30
[   26.457286]  </TASK>
[   26.457298] 
[   26.464080] Allocated by task 314:
[   26.464258]  kasan_save_stack+0x45/0x70
[   26.464457]  kasan_save_track+0x18/0x40
[   26.464647]  kasan_save_alloc_info+0x3b/0x50
[   26.464836]  __kasan_kmalloc+0xb7/0xc0
[   26.464992]  __kmalloc_cache_noprof+0x189/0x420
[   26.465176]  kasan_atomics+0x95/0x310
[   26.465361]  kunit_try_run_case+0x1a5/0x480
[   26.465540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.465768]  kthread+0x337/0x6f0
[   26.465889]  ret_from_fork+0x116/0x1d0
[   26.466019]  ret_from_fork_asm+0x1a/0x30
[   26.466154] 
[   26.466219] The buggy address belongs to the object at ffff88810623b200
[   26.466219]  which belongs to the cache kmalloc-64 of size 64
[   26.466741] The buggy address is located 0 bytes to the right of
[   26.466741]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.467276] 
[   26.467378] The buggy address belongs to the physical page:
[   26.467655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.467998] flags: 0x200000000000000(node=0|zone=2)
[   26.468158] page_type: f5(slab)
[   26.468273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.468541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.468900] page dumped because: kasan: bad access detected
[   26.469153] 
[   26.469242] Memory state around the buggy address:
[   26.469415]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.469658]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.469879] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.470185]                                      ^
[   26.470417]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.470758]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.471071] ==================================================================
[   26.292482] ==================================================================
[   26.293247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   26.293609] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.293898] 
[   26.294007] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.294059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.294073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.294097] Call Trace:
[   26.294116]  <TASK>
[   26.294134]  dump_stack_lvl+0x73/0xb0
[   26.294164]  print_report+0xd1/0x610
[   26.294187]  ? __virt_addr_valid+0x1db/0x2d0
[   26.294212]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.294235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.294262]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.294284]  kasan_report+0x141/0x180
[   26.294307]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.294344]  kasan_check_range+0x10c/0x1c0
[   26.294369]  __kasan_check_write+0x18/0x20
[   26.294393]  kasan_atomics_helper+0xfa9/0x5450
[   26.294418]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.294441]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.294467]  ? kasan_atomics+0x152/0x310
[   26.294493]  kasan_atomics+0x1dc/0x310
[   26.294517]  ? __pfx_kasan_atomics+0x10/0x10
[   26.294542]  ? __pfx_read_tsc+0x10/0x10
[   26.294566]  ? ktime_get_ts64+0x86/0x230
[   26.294592]  kunit_try_run_case+0x1a5/0x480
[   26.294633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.294657]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.294682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.294706]  ? __kthread_parkme+0x82/0x180
[   26.294729]  ? preempt_count_sub+0x50/0x80
[   26.294754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.294778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.294806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.294835]  kthread+0x337/0x6f0
[   26.294856]  ? trace_preempt_on+0x20/0xc0
[   26.294881]  ? __pfx_kthread+0x10/0x10
[   26.294903]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.294925]  ? calculate_sigpending+0x7b/0xa0
[   26.294950]  ? __pfx_kthread+0x10/0x10
[   26.294973]  ret_from_fork+0x116/0x1d0
[   26.294994]  ? __pfx_kthread+0x10/0x10
[   26.295016]  ret_from_fork_asm+0x1a/0x30
[   26.295048]  </TASK>
[   26.295060] 
[   26.302181] Allocated by task 314:
[   26.302326]  kasan_save_stack+0x45/0x70
[   26.302460]  kasan_save_track+0x18/0x40
[   26.302586]  kasan_save_alloc_info+0x3b/0x50
[   26.302805]  __kasan_kmalloc+0xb7/0xc0
[   26.302983]  __kmalloc_cache_noprof+0x189/0x420
[   26.303169]  kasan_atomics+0x95/0x310
[   26.303304]  kunit_try_run_case+0x1a5/0x480
[   26.303493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.303784]  kthread+0x337/0x6f0
[   26.303922]  ret_from_fork+0x116/0x1d0
[   26.304083]  ret_from_fork_asm+0x1a/0x30
[   26.304238] 
[   26.304329] The buggy address belongs to the object at ffff88810623b200
[   26.304329]  which belongs to the cache kmalloc-64 of size 64
[   26.304816] The buggy address is located 0 bytes to the right of
[   26.304816]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.305285] 
[   26.305374] The buggy address belongs to the physical page:
[   26.305573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.305894] flags: 0x200000000000000(node=0|zone=2)
[   26.306110] page_type: f5(slab)
[   26.306245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.306478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.306756] page dumped because: kasan: bad access detected
[   26.306996] 
[   26.307094] Memory state around the buggy address:
[   26.307299]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.307516]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.307895] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.308202]                                      ^
[   26.308431]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.308731]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.309027] ==================================================================
[   26.694085] ==================================================================
[   26.694451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   26.694784] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.695146] 
[   26.695340] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.695396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.695410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.695433] Call Trace:
[   26.695456]  <TASK>
[   26.695474]  dump_stack_lvl+0x73/0xb0
[   26.695505]  print_report+0xd1/0x610
[   26.695529]  ? __virt_addr_valid+0x1db/0x2d0
[   26.695555]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.695578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.695604]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.695627]  kasan_report+0x141/0x180
[   26.695650]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.695676]  kasan_check_range+0x10c/0x1c0
[   26.695701]  __kasan_check_write+0x18/0x20
[   26.695724]  kasan_atomics_helper+0x18b1/0x5450
[   26.695748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.695771]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.695797]  ? kasan_atomics+0x152/0x310
[   26.695823]  kasan_atomics+0x1dc/0x310
[   26.695846]  ? __pfx_kasan_atomics+0x10/0x10
[   26.695871]  ? __pfx_read_tsc+0x10/0x10
[   26.695928]  ? ktime_get_ts64+0x86/0x230
[   26.695954]  kunit_try_run_case+0x1a5/0x480
[   26.695980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.696015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.696041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.696066]  ? __kthread_parkme+0x82/0x180
[   26.696088]  ? preempt_count_sub+0x50/0x80
[   26.696113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.696139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.696167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.696195]  kthread+0x337/0x6f0
[   26.696216]  ? trace_preempt_on+0x20/0xc0
[   26.696241]  ? __pfx_kthread+0x10/0x10
[   26.696263]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.696285]  ? calculate_sigpending+0x7b/0xa0
[   26.696309]  ? __pfx_kthread+0x10/0x10
[   26.696340]  ret_from_fork+0x116/0x1d0
[   26.696361]  ? __pfx_kthread+0x10/0x10
[   26.696384]  ret_from_fork_asm+0x1a/0x30
[   26.696416]  </TASK>
[   26.696428] 
[   26.704596] Allocated by task 314:
[   26.704769]  kasan_save_stack+0x45/0x70
[   26.704911]  kasan_save_track+0x18/0x40
[   26.705152]  kasan_save_alloc_info+0x3b/0x50
[   26.705368]  __kasan_kmalloc+0xb7/0xc0
[   26.705553]  __kmalloc_cache_noprof+0x189/0x420
[   26.705844]  kasan_atomics+0x95/0x310
[   26.706084]  kunit_try_run_case+0x1a5/0x480
[   26.706286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.706501]  kthread+0x337/0x6f0
[   26.706737]  ret_from_fork+0x116/0x1d0
[   26.706966]  ret_from_fork_asm+0x1a/0x30
[   26.707216] 
[   26.707321] The buggy address belongs to the object at ffff88810623b200
[   26.707321]  which belongs to the cache kmalloc-64 of size 64
[   26.707853] The buggy address is located 0 bytes to the right of
[   26.707853]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.708380] 
[   26.708515] The buggy address belongs to the physical page:
[   26.708821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.709060] flags: 0x200000000000000(node=0|zone=2)
[   26.709346] page_type: f5(slab)
[   26.709514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.709904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.710130] page dumped because: kasan: bad access detected
[   26.710356] 
[   26.710472] Memory state around the buggy address:
[   26.710733]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.711126]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.711501] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.711806]                                      ^
[   26.711963]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.712231]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.712594] ==================================================================
[   26.055486] ==================================================================
[   26.055869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   26.056214] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.056526] 
[   26.056632] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.056685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.056699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.056722] Call Trace:
[   26.056742]  <TASK>
[   26.056759]  dump_stack_lvl+0x73/0xb0
[   26.056789]  print_report+0xd1/0x610
[   26.056813]  ? __virt_addr_valid+0x1db/0x2d0
[   26.056838]  ? kasan_atomics_helper+0x860/0x5450
[   26.056861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.056889]  ? kasan_atomics_helper+0x860/0x5450
[   26.056911]  kasan_report+0x141/0x180
[   26.056934]  ? kasan_atomics_helper+0x860/0x5450
[   26.056961]  kasan_check_range+0x10c/0x1c0
[   26.056985]  __kasan_check_write+0x18/0x20
[   26.057010]  kasan_atomics_helper+0x860/0x5450
[   26.057033]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.057055]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.057081]  ? kasan_atomics+0x152/0x310
[   26.057108]  kasan_atomics+0x1dc/0x310
[   26.057131]  ? __pfx_kasan_atomics+0x10/0x10
[   26.057157]  ? __pfx_read_tsc+0x10/0x10
[   26.057181]  ? ktime_get_ts64+0x86/0x230
[   26.057208]  kunit_try_run_case+0x1a5/0x480
[   26.057233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.057257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.057282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.057316]  ? __kthread_parkme+0x82/0x180
[   26.057338]  ? preempt_count_sub+0x50/0x80
[   26.057362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.057387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.057416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.057444]  kthread+0x337/0x6f0
[   26.057464]  ? trace_preempt_on+0x20/0xc0
[   26.057488]  ? __pfx_kthread+0x10/0x10
[   26.057509]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.057531]  ? calculate_sigpending+0x7b/0xa0
[   26.057557]  ? __pfx_kthread+0x10/0x10
[   26.057598]  ret_from_fork+0x116/0x1d0
[   26.057622]  ? __pfx_kthread+0x10/0x10
[   26.057644]  ret_from_fork_asm+0x1a/0x30
[   26.057676]  </TASK>
[   26.057688] 
[   26.064698] Allocated by task 314:
[   26.064878]  kasan_save_stack+0x45/0x70
[   26.065068]  kasan_save_track+0x18/0x40
[   26.065251]  kasan_save_alloc_info+0x3b/0x50
[   26.065468]  __kasan_kmalloc+0xb7/0xc0
[   26.065680]  __kmalloc_cache_noprof+0x189/0x420
[   26.065893]  kasan_atomics+0x95/0x310
[   26.066076]  kunit_try_run_case+0x1a5/0x480
[   26.066257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.066440]  kthread+0x337/0x6f0
[   26.066558]  ret_from_fork+0x116/0x1d0
[   26.066742]  ret_from_fork_asm+0x1a/0x30
[   26.066939] 
[   26.067030] The buggy address belongs to the object at ffff88810623b200
[   26.067030]  which belongs to the cache kmalloc-64 of size 64
[   26.067564] The buggy address is located 0 bytes to the right of
[   26.067564]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.068093] 
[   26.068177] The buggy address belongs to the physical page:
[   26.068378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.068733] flags: 0x200000000000000(node=0|zone=2)
[   26.068947] page_type: f5(slab)
[   26.069090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.069404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.069725] page dumped because: kasan: bad access detected
[   26.069926] 
[   26.069990] Memory state around the buggy address:
[   26.070141]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.070362]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.070592] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.070829]                                      ^
[   26.071051]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.071382]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.071723] ==================================================================
[   26.564379] ==================================================================
[   26.564840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   26.565251] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.565692] 
[   26.565803] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.565880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.565896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.565917] Call Trace:
[   26.565937]  <TASK>
[   26.565955]  dump_stack_lvl+0x73/0xb0
[   26.565985]  print_report+0xd1/0x610
[   26.566008]  ? __virt_addr_valid+0x1db/0x2d0
[   26.566034]  ? kasan_atomics_helper+0x151d/0x5450
[   26.566056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.566082]  ? kasan_atomics_helper+0x151d/0x5450
[   26.566105]  kasan_report+0x141/0x180
[   26.566128]  ? kasan_atomics_helper+0x151d/0x5450
[   26.566155]  kasan_check_range+0x10c/0x1c0
[   26.566180]  __kasan_check_write+0x18/0x20
[   26.566205]  kasan_atomics_helper+0x151d/0x5450
[   26.566229]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.566252]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.566278]  ? kasan_atomics+0x152/0x310
[   26.566305]  kasan_atomics+0x1dc/0x310
[   26.566341]  ? __pfx_kasan_atomics+0x10/0x10
[   26.566366]  ? __pfx_read_tsc+0x10/0x10
[   26.566391]  ? ktime_get_ts64+0x86/0x230
[   26.566418]  kunit_try_run_case+0x1a5/0x480
[   26.566444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.566467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.566490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.566513]  ? __kthread_parkme+0x82/0x180
[   26.566535]  ? preempt_count_sub+0x50/0x80
[   26.566560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.566601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.566629]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.566659]  kthread+0x337/0x6f0
[   26.566680]  ? trace_preempt_on+0x20/0xc0
[   26.566707]  ? __pfx_kthread+0x10/0x10
[   26.566729]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.566752]  ? calculate_sigpending+0x7b/0xa0
[   26.566778]  ? __pfx_kthread+0x10/0x10
[   26.566800]  ret_from_fork+0x116/0x1d0
[   26.566821]  ? __pfx_kthread+0x10/0x10
[   26.566842]  ret_from_fork_asm+0x1a/0x30
[   26.566889]  </TASK>
[   26.566900] 
[   26.574485] Allocated by task 314:
[   26.574732]  kasan_save_stack+0x45/0x70
[   26.574981]  kasan_save_track+0x18/0x40
[   26.575187]  kasan_save_alloc_info+0x3b/0x50
[   26.575440]  __kasan_kmalloc+0xb7/0xc0
[   26.575621]  __kmalloc_cache_noprof+0x189/0x420
[   26.575869]  kasan_atomics+0x95/0x310
[   26.576060]  kunit_try_run_case+0x1a5/0x480
[   26.576249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.576436]  kthread+0x337/0x6f0
[   26.576555]  ret_from_fork+0x116/0x1d0
[   26.576700]  ret_from_fork_asm+0x1a/0x30
[   26.576839] 
[   26.576934] The buggy address belongs to the object at ffff88810623b200
[   26.576934]  which belongs to the cache kmalloc-64 of size 64
[   26.577527] The buggy address is located 0 bytes to the right of
[   26.577527]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.578030] 
[   26.578128] The buggy address belongs to the physical page:
[   26.578310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.578626] flags: 0x200000000000000(node=0|zone=2)
[   26.578857] page_type: f5(slab)
[   26.579005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.579302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.579648] page dumped because: kasan: bad access detected
[   26.579835] 
[   26.579924] Memory state around the buggy address:
[   26.580142]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.580521]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.580877] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.581138]                                      ^
[   26.581376]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.581689]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.581893] ==================================================================
[   26.343495] ==================================================================
[   26.346020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   26.347056] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.347387] 
[   26.347477] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.347528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.347543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.347566] Call Trace:
[   26.347587]  <TASK>
[   26.347607]  dump_stack_lvl+0x73/0xb0
[   26.347639]  print_report+0xd1/0x610
[   26.347663]  ? __virt_addr_valid+0x1db/0x2d0
[   26.347688]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.347711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.347738]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.347760]  kasan_report+0x141/0x180
[   26.347784]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.347810]  __asan_report_load4_noabort+0x18/0x20
[   26.347835]  kasan_atomics_helper+0x4a1c/0x5450
[   26.347859]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.347882]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.347907]  ? kasan_atomics+0x152/0x310
[   26.347934]  kasan_atomics+0x1dc/0x310
[   26.347957]  ? __pfx_kasan_atomics+0x10/0x10
[   26.347982]  ? __pfx_read_tsc+0x10/0x10
[   26.348008]  ? ktime_get_ts64+0x86/0x230
[   26.348035]  kunit_try_run_case+0x1a5/0x480
[   26.348060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.348085]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.348109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.348133]  ? __kthread_parkme+0x82/0x180
[   26.348155]  ? preempt_count_sub+0x50/0x80
[   26.348179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.348203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.348232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.348259]  kthread+0x337/0x6f0
[   26.348280]  ? trace_preempt_on+0x20/0xc0
[   26.348304]  ? __pfx_kthread+0x10/0x10
[   26.348336]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.348359]  ? calculate_sigpending+0x7b/0xa0
[   26.348384]  ? __pfx_kthread+0x10/0x10
[   26.348406]  ret_from_fork+0x116/0x1d0
[   26.348427]  ? __pfx_kthread+0x10/0x10
[   26.348448]  ret_from_fork_asm+0x1a/0x30
[   26.348481]  </TASK>
[   26.348493] 
[   26.358365] Allocated by task 314:
[   26.358505]  kasan_save_stack+0x45/0x70
[   26.358650]  kasan_save_track+0x18/0x40
[   26.359054]  kasan_save_alloc_info+0x3b/0x50
[   26.359443]  __kasan_kmalloc+0xb7/0xc0
[   26.359799]  __kmalloc_cache_noprof+0x189/0x420
[   26.360013]  kasan_atomics+0x95/0x310
[   26.360185]  kunit_try_run_case+0x1a5/0x480
[   26.360380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.360845]  kthread+0x337/0x6f0
[   26.361174]  ret_from_fork+0x116/0x1d0
[   26.361543]  ret_from_fork_asm+0x1a/0x30
[   26.361907] 
[   26.361993] The buggy address belongs to the object at ffff88810623b200
[   26.361993]  which belongs to the cache kmalloc-64 of size 64
[   26.362486] The buggy address is located 0 bytes to the right of
[   26.362486]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.363630] 
[   26.363773] The buggy address belongs to the physical page:
[   26.364464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.364898] flags: 0x200000000000000(node=0|zone=2)
[   26.365129] page_type: f5(slab)
[   26.365287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.365893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.366456] page dumped because: kasan: bad access detected
[   26.366925] 
[   26.367022] Memory state around the buggy address:
[   26.367232]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.367535]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.368341] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.368593]                                      ^
[   26.368759]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.369140]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.369440] ==================================================================
[   26.072241] ==================================================================
[   26.072558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   26.072897] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.073190] 
[   26.073282] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.073341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.073355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.073377] Call Trace:
[   26.073396]  <TASK>
[   26.073413]  dump_stack_lvl+0x73/0xb0
[   26.073441]  print_report+0xd1/0x610
[   26.073464]  ? __virt_addr_valid+0x1db/0x2d0
[   26.073489]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.073511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.073539]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.073561]  kasan_report+0x141/0x180
[   26.073608]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.073635]  kasan_check_range+0x10c/0x1c0
[   26.073660]  __kasan_check_write+0x18/0x20
[   26.073684]  kasan_atomics_helper+0x8f9/0x5450
[   26.073708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.073731]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.073757]  ? kasan_atomics+0x152/0x310
[   26.073784]  kasan_atomics+0x1dc/0x310
[   26.073808]  ? __pfx_kasan_atomics+0x10/0x10
[   26.073832]  ? __pfx_read_tsc+0x10/0x10
[   26.073856]  ? ktime_get_ts64+0x86/0x230
[   26.073882]  kunit_try_run_case+0x1a5/0x480
[   26.073906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.073929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.073953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.073977]  ? __kthread_parkme+0x82/0x180
[   26.073997]  ? preempt_count_sub+0x50/0x80
[   26.074022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.074046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.074074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.074102]  kthread+0x337/0x6f0
[   26.074122]  ? trace_preempt_on+0x20/0xc0
[   26.074147]  ? __pfx_kthread+0x10/0x10
[   26.074168]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.074190]  ? calculate_sigpending+0x7b/0xa0
[   26.074216]  ? __pfx_kthread+0x10/0x10
[   26.074238]  ret_from_fork+0x116/0x1d0
[   26.074260]  ? __pfx_kthread+0x10/0x10
[   26.074281]  ret_from_fork_asm+0x1a/0x30
[   26.074324]  </TASK>
[   26.074336] 
[   26.082408] Allocated by task 314:
[   26.082569]  kasan_save_stack+0x45/0x70
[   26.082748]  kasan_save_track+0x18/0x40
[   26.082917]  kasan_save_alloc_info+0x3b/0x50
[   26.083106]  __kasan_kmalloc+0xb7/0xc0
[   26.083275]  __kmalloc_cache_noprof+0x189/0x420
[   26.083458]  kasan_atomics+0x95/0x310
[   26.083668]  kunit_try_run_case+0x1a5/0x480
[   26.083856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.084086]  kthread+0x337/0x6f0
[   26.084201]  ret_from_fork+0x116/0x1d0
[   26.084339]  ret_from_fork_asm+0x1a/0x30
[   26.084474] 
[   26.084540] The buggy address belongs to the object at ffff88810623b200
[   26.084540]  which belongs to the cache kmalloc-64 of size 64
[   26.085085] The buggy address is located 0 bytes to the right of
[   26.085085]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.085670] 
[   26.085765] The buggy address belongs to the physical page:
[   26.085995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.086338] flags: 0x200000000000000(node=0|zone=2)
[   26.086532] page_type: f5(slab)
[   26.086709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.086937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.087157] page dumped because: kasan: bad access detected
[   26.087394] 
[   26.087483] Memory state around the buggy address:
[   26.087733]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.088058]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.088386] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.088730]                                      ^
[   26.088923]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.089168]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.089468] ==================================================================
[   26.733815] ==================================================================
[   26.734313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   26.734839] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.735160] 
[   26.735275] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.735337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.735352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.735374] Call Trace:
[   26.735394]  <TASK>
[   26.735661]  dump_stack_lvl+0x73/0xb0
[   26.735697]  print_report+0xd1/0x610
[   26.735720]  ? __virt_addr_valid+0x1db/0x2d0
[   26.735745]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.735767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.735794]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.735817]  kasan_report+0x141/0x180
[   26.735840]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.735866]  kasan_check_range+0x10c/0x1c0
[   26.735891]  __kasan_check_write+0x18/0x20
[   26.735915]  kasan_atomics_helper+0x19e3/0x5450
[   26.735938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.735961]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.735987]  ? kasan_atomics+0x152/0x310
[   26.736013]  kasan_atomics+0x1dc/0x310
[   26.736036]  ? __pfx_kasan_atomics+0x10/0x10
[   26.736061]  ? __pfx_read_tsc+0x10/0x10
[   26.736084]  ? ktime_get_ts64+0x86/0x230
[   26.736110]  kunit_try_run_case+0x1a5/0x480
[   26.736136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.736159]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.736183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.736207]  ? __kthread_parkme+0x82/0x180
[   26.736228]  ? preempt_count_sub+0x50/0x80
[   26.736253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.736278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.736306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.736346]  kthread+0x337/0x6f0
[   26.736368]  ? trace_preempt_on+0x20/0xc0
[   26.736393]  ? __pfx_kthread+0x10/0x10
[   26.736414]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.736436]  ? calculate_sigpending+0x7b/0xa0
[   26.736462]  ? __pfx_kthread+0x10/0x10
[   26.736484]  ret_from_fork+0x116/0x1d0
[   26.736505]  ? __pfx_kthread+0x10/0x10
[   26.736526]  ret_from_fork_asm+0x1a/0x30
[   26.736559]  </TASK>
[   26.736570] 
[   26.746647] Allocated by task 314:
[   26.746833]  kasan_save_stack+0x45/0x70
[   26.747018]  kasan_save_track+0x18/0x40
[   26.747200]  kasan_save_alloc_info+0x3b/0x50
[   26.747406]  __kasan_kmalloc+0xb7/0xc0
[   26.747590]  __kmalloc_cache_noprof+0x189/0x420
[   26.748297]  kasan_atomics+0x95/0x310
[   26.748452]  kunit_try_run_case+0x1a5/0x480
[   26.748745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.749051]  kthread+0x337/0x6f0
[   26.749176]  ret_from_fork+0x116/0x1d0
[   26.749439]  ret_from_fork_asm+0x1a/0x30
[   26.749757] 
[   26.749842] The buggy address belongs to the object at ffff88810623b200
[   26.749842]  which belongs to the cache kmalloc-64 of size 64
[   26.750421] The buggy address is located 0 bytes to the right of
[   26.750421]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.751054] 
[   26.751227] The buggy address belongs to the physical page:
[   26.751550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.752142] flags: 0x200000000000000(node=0|zone=2)
[   26.752454] page_type: f5(slab)
[   26.752616] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.753020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.753336] page dumped because: kasan: bad access detected
[   26.753565] 
[   26.753653] Memory state around the buggy address:
[   26.754046]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.754444]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.754834] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.755172]                                      ^
[   26.755408]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.755867]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.756165] ==================================================================
[   26.948405] ==================================================================
[   26.948801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   26.949182] Read of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.949530] 
[   26.949677] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.949731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.949746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.949769] Call Trace:
[   26.949792]  <TASK>
[   26.949811]  dump_stack_lvl+0x73/0xb0
[   26.949842]  print_report+0xd1/0x610
[   26.949866]  ? __virt_addr_valid+0x1db/0x2d0
[   26.949891]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.949914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.949941]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.949965]  kasan_report+0x141/0x180
[   26.949990]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.950019]  __asan_report_load8_noabort+0x18/0x20
[   26.950045]  kasan_atomics_helper+0x4f71/0x5450
[   26.950069]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.950093]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.950119]  ? kasan_atomics+0x152/0x310
[   26.950146]  kasan_atomics+0x1dc/0x310
[   26.950170]  ? __pfx_kasan_atomics+0x10/0x10
[   26.950196]  ? __pfx_read_tsc+0x10/0x10
[   26.950219]  ? ktime_get_ts64+0x86/0x230
[   26.950245]  kunit_try_run_case+0x1a5/0x480
[   26.950270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.950302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.950347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.950372]  ? __kthread_parkme+0x82/0x180
[   26.950394]  ? preempt_count_sub+0x50/0x80
[   26.950419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.950444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.950472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.950500]  kthread+0x337/0x6f0
[   26.950521]  ? trace_preempt_on+0x20/0xc0
[   26.950547]  ? __pfx_kthread+0x10/0x10
[   26.950571]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.950613]  ? calculate_sigpending+0x7b/0xa0
[   26.950641]  ? __pfx_kthread+0x10/0x10
[   26.950663]  ret_from_fork+0x116/0x1d0
[   26.950684]  ? __pfx_kthread+0x10/0x10
[   26.950707]  ret_from_fork_asm+0x1a/0x30
[   26.950740]  </TASK>
[   26.950751] 
[   26.957897] Allocated by task 314:
[   26.958031]  kasan_save_stack+0x45/0x70
[   26.958175]  kasan_save_track+0x18/0x40
[   26.958354]  kasan_save_alloc_info+0x3b/0x50
[   26.958560]  __kasan_kmalloc+0xb7/0xc0
[   26.958784]  __kmalloc_cache_noprof+0x189/0x420
[   26.959001]  kasan_atomics+0x95/0x310
[   26.959184]  kunit_try_run_case+0x1a5/0x480
[   26.959397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.959672]  kthread+0x337/0x6f0
[   26.959837]  ret_from_fork+0x116/0x1d0
[   26.959981]  ret_from_fork_asm+0x1a/0x30
[   26.960115] 
[   26.960181] The buggy address belongs to the object at ffff88810623b200
[   26.960181]  which belongs to the cache kmalloc-64 of size 64
[   26.960539] The buggy address is located 0 bytes to the right of
[   26.960539]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.961060] 
[   26.961156] The buggy address belongs to the physical page:
[   26.961440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.961852] flags: 0x200000000000000(node=0|zone=2)
[   26.962089] page_type: f5(slab)
[   26.962286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.962668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.963012] page dumped because: kasan: bad access detected
[   26.963261] 
[   26.963358] Memory state around the buggy address:
[   26.963610]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.963892]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.964159] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.964439]                                      ^
[   26.964692]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.965005]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.965257] ==================================================================
[   26.205597] ==================================================================
[   26.206195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   26.206591] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.206907] 
[   26.206991] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.207042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.207056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.207079] Call Trace:
[   26.207096]  <TASK>
[   26.207115]  dump_stack_lvl+0x73/0xb0
[   26.207144]  print_report+0xd1/0x610
[   26.207168]  ? __virt_addr_valid+0x1db/0x2d0
[   26.207215]  ? kasan_atomics_helper+0xd47/0x5450
[   26.207237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.207265]  ? kasan_atomics_helper+0xd47/0x5450
[   26.207306]  kasan_report+0x141/0x180
[   26.207340]  ? kasan_atomics_helper+0xd47/0x5450
[   26.207384]  kasan_check_range+0x10c/0x1c0
[   26.207409]  __kasan_check_write+0x18/0x20
[   26.207434]  kasan_atomics_helper+0xd47/0x5450
[   26.207457]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.207479]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.207505]  ? kasan_atomics+0x152/0x310
[   26.207531]  kasan_atomics+0x1dc/0x310
[   26.207572]  ? __pfx_kasan_atomics+0x10/0x10
[   26.207597]  ? __pfx_read_tsc+0x10/0x10
[   26.207621]  ? ktime_get_ts64+0x86/0x230
[   26.207646]  kunit_try_run_case+0x1a5/0x480
[   26.207671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.207694]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.207736]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.207761]  ? __kthread_parkme+0x82/0x180
[   26.207782]  ? preempt_count_sub+0x50/0x80
[   26.207808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.207832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.207860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.207906]  kthread+0x337/0x6f0
[   26.207927]  ? trace_preempt_on+0x20/0xc0
[   26.207951]  ? __pfx_kthread+0x10/0x10
[   26.207973]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.207994]  ? calculate_sigpending+0x7b/0xa0
[   26.208020]  ? __pfx_kthread+0x10/0x10
[   26.208058]  ret_from_fork+0x116/0x1d0
[   26.208079]  ? __pfx_kthread+0x10/0x10
[   26.208100]  ret_from_fork_asm+0x1a/0x30
[   26.208132]  </TASK>
[   26.208144] 
[   26.215768] Allocated by task 314:
[   26.215974]  kasan_save_stack+0x45/0x70
[   26.216180]  kasan_save_track+0x18/0x40
[   26.216380]  kasan_save_alloc_info+0x3b/0x50
[   26.216647]  __kasan_kmalloc+0xb7/0xc0
[   26.216823]  __kmalloc_cache_noprof+0x189/0x420
[   26.217035]  kasan_atomics+0x95/0x310
[   26.217213]  kunit_try_run_case+0x1a5/0x480
[   26.217484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.217940]  kthread+0x337/0x6f0
[   26.218300]  ret_from_fork+0x116/0x1d0
[   26.218494]  ret_from_fork_asm+0x1a/0x30
[   26.218804] 
[   26.220250] The buggy address belongs to the object at ffff88810623b200
[   26.220250]  which belongs to the cache kmalloc-64 of size 64
[   26.220880] The buggy address is located 0 bytes to the right of
[   26.220880]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.221260] 
[   26.221348] The buggy address belongs to the physical page:
[   26.221593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.221944] flags: 0x200000000000000(node=0|zone=2)
[   26.222175] page_type: f5(slab)
[   26.222749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.223225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.223882] page dumped because: kasan: bad access detected
[   26.224244] 
[   26.224483] Memory state around the buggy address:
[   26.224920]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.225371]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.225931] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.226245]                                      ^
[   26.226463]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.227060]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.227510] ==================================================================
[   25.750446] ==================================================================
[   25.751120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   25.751439] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.751758] 
[   25.751892] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.751948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.751962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.751986] Call Trace:
[   25.752022]  <TASK>
[   25.752044]  dump_stack_lvl+0x73/0xb0
[   25.752075]  print_report+0xd1/0x610
[   25.752097]  ? __virt_addr_valid+0x1db/0x2d0
[   25.752121]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.752143]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.752168]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.752190]  kasan_report+0x141/0x180
[   25.752212]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.752237]  __asan_report_load4_noabort+0x18/0x20
[   25.752261]  kasan_atomics_helper+0x4bbc/0x5450
[   25.752314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.752336]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.752361]  ? kasan_atomics+0x152/0x310
[   25.752388]  kasan_atomics+0x1dc/0x310
[   25.752410]  ? __pfx_kasan_atomics+0x10/0x10
[   25.752433]  ? __pfx_read_tsc+0x10/0x10
[   25.752455]  ? ktime_get_ts64+0x86/0x230
[   25.752481]  kunit_try_run_case+0x1a5/0x480
[   25.752506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.752528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.752552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.752592]  ? __kthread_parkme+0x82/0x180
[   25.752614]  ? preempt_count_sub+0x50/0x80
[   25.752656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.752680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.752706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.752734]  kthread+0x337/0x6f0
[   25.752753]  ? trace_preempt_on+0x20/0xc0
[   25.752778]  ? __pfx_kthread+0x10/0x10
[   25.752799]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.752820]  ? calculate_sigpending+0x7b/0xa0
[   25.752845]  ? __pfx_kthread+0x10/0x10
[   25.752883]  ret_from_fork+0x116/0x1d0
[   25.752902]  ? __pfx_kthread+0x10/0x10
[   25.752923]  ret_from_fork_asm+0x1a/0x30
[   25.752955]  </TASK>
[   25.752967] 
[   25.761052] Allocated by task 314:
[   25.761226]  kasan_save_stack+0x45/0x70
[   25.761434]  kasan_save_track+0x18/0x40
[   25.761654]  kasan_save_alloc_info+0x3b/0x50
[   25.761809]  __kasan_kmalloc+0xb7/0xc0
[   25.762009]  __kmalloc_cache_noprof+0x189/0x420
[   25.762217]  kasan_atomics+0x95/0x310
[   25.762404]  kunit_try_run_case+0x1a5/0x480
[   25.762612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.762941]  kthread+0x337/0x6f0
[   25.763112]  ret_from_fork+0x116/0x1d0
[   25.763294]  ret_from_fork_asm+0x1a/0x30
[   25.763498] 
[   25.763620] The buggy address belongs to the object at ffff88810623b200
[   25.763620]  which belongs to the cache kmalloc-64 of size 64
[   25.764033] The buggy address is located 0 bytes to the right of
[   25.764033]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.764627] 
[   25.764750] The buggy address belongs to the physical page:
[   25.765224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.765520] flags: 0x200000000000000(node=0|zone=2)
[   25.765785] page_type: f5(slab)
[   25.765991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.766261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.766633] page dumped because: kasan: bad access detected
[   25.767008] 
[   25.767104] Memory state around the buggy address:
[   25.767359]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.767708]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.768082] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.768388]                                      ^
[   25.768595]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.768978]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.769274] ==================================================================
[   26.151465] ==================================================================
[   26.152114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   26.152497] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.152828] 
[   26.152959] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.153012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.153026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.153048] Call Trace:
[   26.153070]  <TASK>
[   26.153088]  dump_stack_lvl+0x73/0xb0
[   26.153119]  print_report+0xd1/0x610
[   26.153142]  ? __virt_addr_valid+0x1db/0x2d0
[   26.153167]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.153188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.153238]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.153260]  kasan_report+0x141/0x180
[   26.153283]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.153341]  kasan_check_range+0x10c/0x1c0
[   26.153366]  __kasan_check_write+0x18/0x20
[   26.153390]  kasan_atomics_helper+0xb6a/0x5450
[   26.153415]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.153437]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.153482]  ? kasan_atomics+0x152/0x310
[   26.153510]  kasan_atomics+0x1dc/0x310
[   26.153533]  ? __pfx_kasan_atomics+0x10/0x10
[   26.153557]  ? __pfx_read_tsc+0x10/0x10
[   26.153585]  ? ktime_get_ts64+0x86/0x230
[   26.153632]  kunit_try_run_case+0x1a5/0x480
[   26.153658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.153700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.153725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.153750]  ? __kthread_parkme+0x82/0x180
[   26.153772]  ? preempt_count_sub+0x50/0x80
[   26.153797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.153822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.153867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.153896]  kthread+0x337/0x6f0
[   26.153917]  ? trace_preempt_on+0x20/0xc0
[   26.153942]  ? __pfx_kthread+0x10/0x10
[   26.153964]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.153986]  ? calculate_sigpending+0x7b/0xa0
[   26.154013]  ? __pfx_kthread+0x10/0x10
[   26.154036]  ret_from_fork+0x116/0x1d0
[   26.154056]  ? __pfx_kthread+0x10/0x10
[   26.154078]  ret_from_fork_asm+0x1a/0x30
[   26.154110]  </TASK>
[   26.154122] 
[   26.161948] Allocated by task 314:
[   26.162203]  kasan_save_stack+0x45/0x70
[   26.162374]  kasan_save_track+0x18/0x40
[   26.162560]  kasan_save_alloc_info+0x3b/0x50
[   26.162747]  __kasan_kmalloc+0xb7/0xc0
[   26.162927]  __kmalloc_cache_noprof+0x189/0x420
[   26.163121]  kasan_atomics+0x95/0x310
[   26.163277]  kunit_try_run_case+0x1a5/0x480
[   26.163438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.163856]  kthread+0x337/0x6f0
[   26.164038]  ret_from_fork+0x116/0x1d0
[   26.164196]  ret_from_fork_asm+0x1a/0x30
[   26.164408] 
[   26.164500] The buggy address belongs to the object at ffff88810623b200
[   26.164500]  which belongs to the cache kmalloc-64 of size 64
[   26.165007] The buggy address is located 0 bytes to the right of
[   26.165007]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.165502] 
[   26.165590] The buggy address belongs to the physical page:
[   26.165820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.166148] flags: 0x200000000000000(node=0|zone=2)
[   26.166361] page_type: f5(slab)
[   26.166542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.166857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.167173] page dumped because: kasan: bad access detected
[   26.167388] 
[   26.167477] Memory state around the buggy address:
[   26.167746]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.168041]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.168340] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.168691]                                      ^
[   26.168906]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.169206]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.169566] ==================================================================
[   26.857579] ==================================================================
[   26.857905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   26.858220] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.858601] 
[   26.858707] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.858758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.858772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.858795] Call Trace:
[   26.858826]  <TASK>
[   26.858843]  dump_stack_lvl+0x73/0xb0
[   26.858876]  print_report+0xd1/0x610
[   26.858911]  ? __virt_addr_valid+0x1db/0x2d0
[   26.858936]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.858959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.858986]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.859009]  kasan_report+0x141/0x180
[   26.859031]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.859059]  kasan_check_range+0x10c/0x1c0
[   26.859083]  __kasan_check_write+0x18/0x20
[   26.859107]  kasan_atomics_helper+0x1ce1/0x5450
[   26.859130]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.859162]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.859190]  ? kasan_atomics+0x152/0x310
[   26.859218]  kasan_atomics+0x1dc/0x310
[   26.859252]  ? __pfx_kasan_atomics+0x10/0x10
[   26.859277]  ? __pfx_read_tsc+0x10/0x10
[   26.859300]  ? ktime_get_ts64+0x86/0x230
[   26.859334]  kunit_try_run_case+0x1a5/0x480
[   26.859359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.859383]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.859408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.859432]  ? __kthread_parkme+0x82/0x180
[   26.859453]  ? preempt_count_sub+0x50/0x80
[   26.859477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.859501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.859528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.859556]  kthread+0x337/0x6f0
[   26.859576]  ? trace_preempt_on+0x20/0xc0
[   26.859621]  ? __pfx_kthread+0x10/0x10
[   26.859643]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.859665]  ? calculate_sigpending+0x7b/0xa0
[   26.859690]  ? __pfx_kthread+0x10/0x10
[   26.859712]  ret_from_fork+0x116/0x1d0
[   26.859733]  ? __pfx_kthread+0x10/0x10
[   26.859755]  ret_from_fork_asm+0x1a/0x30
[   26.859795]  </TASK>
[   26.859807] 
[   26.867236] Allocated by task 314:
[   26.867448]  kasan_save_stack+0x45/0x70
[   26.867624]  kasan_save_track+0x18/0x40
[   26.867756]  kasan_save_alloc_info+0x3b/0x50
[   26.867900]  __kasan_kmalloc+0xb7/0xc0
[   26.868115]  __kmalloc_cache_noprof+0x189/0x420
[   26.868342]  kasan_atomics+0x95/0x310
[   26.868524]  kunit_try_run_case+0x1a5/0x480
[   26.868751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.869003]  kthread+0x337/0x6f0
[   26.869167]  ret_from_fork+0x116/0x1d0
[   26.869355]  ret_from_fork_asm+0x1a/0x30
[   26.869544] 
[   26.869661] The buggy address belongs to the object at ffff88810623b200
[   26.869661]  which belongs to the cache kmalloc-64 of size 64
[   26.870159] The buggy address is located 0 bytes to the right of
[   26.870159]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.870639] 
[   26.870784] The buggy address belongs to the physical page:
[   26.871041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.871283] flags: 0x200000000000000(node=0|zone=2)
[   26.871454] page_type: f5(slab)
[   26.871574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.871972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.872306] page dumped because: kasan: bad access detected
[   26.872561] 
[   26.872677] Memory state around the buggy address:
[   26.872889]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.873167]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.873390] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.873626]                                      ^
[   26.873851]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.874226]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.874552] ==================================================================
[   26.090027] ==================================================================
[   26.090271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   26.090613] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.090962] 
[   26.091066] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.091114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.091128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.091149] Call Trace:
[   26.091166]  <TASK>
[   26.091183]  dump_stack_lvl+0x73/0xb0
[   26.091211]  print_report+0xd1/0x610
[   26.091234]  ? __virt_addr_valid+0x1db/0x2d0
[   26.091258]  ? kasan_atomics_helper+0x992/0x5450
[   26.091280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.091318]  ? kasan_atomics_helper+0x992/0x5450
[   26.091341]  kasan_report+0x141/0x180
[   26.091364]  ? kasan_atomics_helper+0x992/0x5450
[   26.091392]  kasan_check_range+0x10c/0x1c0
[   26.091417]  __kasan_check_write+0x18/0x20
[   26.091441]  kasan_atomics_helper+0x992/0x5450
[   26.091464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.091488]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.091513]  ? kasan_atomics+0x152/0x310
[   26.091540]  kasan_atomics+0x1dc/0x310
[   26.091564]  ? __pfx_kasan_atomics+0x10/0x10
[   26.091609]  ? __pfx_read_tsc+0x10/0x10
[   26.091635]  ? ktime_get_ts64+0x86/0x230
[   26.091662]  kunit_try_run_case+0x1a5/0x480
[   26.091687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.091711]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.091735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.091759]  ? __kthread_parkme+0x82/0x180
[   26.091781]  ? preempt_count_sub+0x50/0x80
[   26.091805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.091830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.091859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.091887]  kthread+0x337/0x6f0
[   26.091908]  ? trace_preempt_on+0x20/0xc0
[   26.091932]  ? __pfx_kthread+0x10/0x10
[   26.091954]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.091976]  ? calculate_sigpending+0x7b/0xa0
[   26.092001]  ? __pfx_kthread+0x10/0x10
[   26.092024]  ret_from_fork+0x116/0x1d0
[   26.092044]  ? __pfx_kthread+0x10/0x10
[   26.092066]  ret_from_fork_asm+0x1a/0x30
[   26.092098]  </TASK>
[   26.092109] 
[   26.098950] Allocated by task 314:
[   26.099114]  kasan_save_stack+0x45/0x70
[   26.099285]  kasan_save_track+0x18/0x40
[   26.099458]  kasan_save_alloc_info+0x3b/0x50
[   26.099671]  __kasan_kmalloc+0xb7/0xc0
[   26.099846]  __kmalloc_cache_noprof+0x189/0x420
[   26.100057]  kasan_atomics+0x95/0x310
[   26.100203]  kunit_try_run_case+0x1a5/0x480
[   26.100420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.100678]  kthread+0x337/0x6f0
[   26.100819]  ret_from_fork+0x116/0x1d0
[   26.100976]  ret_from_fork_asm+0x1a/0x30
[   26.101166] 
[   26.101233] The buggy address belongs to the object at ffff88810623b200
[   26.101233]  which belongs to the cache kmalloc-64 of size 64
[   26.101699] The buggy address is located 0 bytes to the right of
[   26.101699]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.102061] 
[   26.102128] The buggy address belongs to the physical page:
[   26.102295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.102679] flags: 0x200000000000000(node=0|zone=2)
[   26.102905] page_type: f5(slab)
[   26.103067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.103416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.103771] page dumped because: kasan: bad access detected
[   26.104006] 
[   26.104071] Memory state around the buggy address:
[   26.104222]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.104444]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.104748] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.105069]                                      ^
[   26.105292]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.105657]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.105965] ==================================================================
[   26.875315] ==================================================================
[   26.875644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   26.875964] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.876366] 
[   26.876549] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.876636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.876651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.876674] Call Trace:
[   26.876695]  <TASK>
[   26.876713]  dump_stack_lvl+0x73/0xb0
[   26.876744]  print_report+0xd1/0x610
[   26.876798]  ? __virt_addr_valid+0x1db/0x2d0
[   26.876834]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.876868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.876894]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.876917]  kasan_report+0x141/0x180
[   26.876940]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.876967]  kasan_check_range+0x10c/0x1c0
[   26.876992]  __kasan_check_write+0x18/0x20
[   26.877019]  kasan_atomics_helper+0x1d7a/0x5450
[   26.877042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.877066]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.877092]  ? kasan_atomics+0x152/0x310
[   26.877119]  kasan_atomics+0x1dc/0x310
[   26.877143]  ? __pfx_kasan_atomics+0x10/0x10
[   26.877167]  ? __pfx_read_tsc+0x10/0x10
[   26.877220]  ? ktime_get_ts64+0x86/0x230
[   26.877258]  kunit_try_run_case+0x1a5/0x480
[   26.877294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.877326]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.877350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.877374]  ? __kthread_parkme+0x82/0x180
[   26.877396]  ? preempt_count_sub+0x50/0x80
[   26.877420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.877444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.877472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.877499]  kthread+0x337/0x6f0
[   26.877520]  ? trace_preempt_on+0x20/0xc0
[   26.877573]  ? __pfx_kthread+0x10/0x10
[   26.877608]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.877633]  ? calculate_sigpending+0x7b/0xa0
[   26.877659]  ? __pfx_kthread+0x10/0x10
[   26.877681]  ret_from_fork+0x116/0x1d0
[   26.877701]  ? __pfx_kthread+0x10/0x10
[   26.877723]  ret_from_fork_asm+0x1a/0x30
[   26.877754]  </TASK>
[   26.877765] 
[   26.885326] Allocated by task 314:
[   26.885468]  kasan_save_stack+0x45/0x70
[   26.885732]  kasan_save_track+0x18/0x40
[   26.885927]  kasan_save_alloc_info+0x3b/0x50
[   26.886135]  __kasan_kmalloc+0xb7/0xc0
[   26.886417]  __kmalloc_cache_noprof+0x189/0x420
[   26.886679]  kasan_atomics+0x95/0x310
[   26.886877]  kunit_try_run_case+0x1a5/0x480
[   26.887090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.887471]  kthread+0x337/0x6f0
[   26.887670]  ret_from_fork+0x116/0x1d0
[   26.887885]  ret_from_fork_asm+0x1a/0x30
[   26.888036] 
[   26.888129] The buggy address belongs to the object at ffff88810623b200
[   26.888129]  which belongs to the cache kmalloc-64 of size 64
[   26.888790] The buggy address is located 0 bytes to the right of
[   26.888790]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.889266] 
[   26.889401] The buggy address belongs to the physical page:
[   26.889697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.890051] flags: 0x200000000000000(node=0|zone=2)
[   26.890216] page_type: f5(slab)
[   26.890391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.890838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.891147] page dumped because: kasan: bad access detected
[   26.891441] 
[   26.891562] Memory state around the buggy address:
[   26.891822]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.892038]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.892297] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.892676]                                      ^
[   26.892944]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.893263]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.893600] ==================================================================
[   27.005701] ==================================================================
[   27.006425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   27.006745] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   27.007050] 
[   27.007155] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.007207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.007221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.007243] Call Trace:
[   27.007264]  <TASK>
[   27.007282]  dump_stack_lvl+0x73/0xb0
[   27.007311]  print_report+0xd1/0x610
[   27.007348]  ? __virt_addr_valid+0x1db/0x2d0
[   27.007373]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.007395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.007422]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.007445]  kasan_report+0x141/0x180
[   27.007468]  ? kasan_atomics_helper+0x20c8/0x5450
[   27.007494]  kasan_check_range+0x10c/0x1c0
[   27.007519]  __kasan_check_write+0x18/0x20
[   27.007543]  kasan_atomics_helper+0x20c8/0x5450
[   27.007567]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.007590]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.007630]  ? kasan_atomics+0x152/0x310
[   27.007657]  kasan_atomics+0x1dc/0x310
[   27.007681]  ? __pfx_kasan_atomics+0x10/0x10
[   27.007705]  ? __pfx_read_tsc+0x10/0x10
[   27.007729]  ? ktime_get_ts64+0x86/0x230
[   27.007754]  kunit_try_run_case+0x1a5/0x480
[   27.007779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.007803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.007828]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.007852]  ? __kthread_parkme+0x82/0x180
[   27.007873]  ? preempt_count_sub+0x50/0x80
[   27.007898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.007922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.007951]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.007979]  kthread+0x337/0x6f0
[   27.007999]  ? trace_preempt_on+0x20/0xc0
[   27.008023]  ? __pfx_kthread+0x10/0x10
[   27.008044]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.008066]  ? calculate_sigpending+0x7b/0xa0
[   27.008091]  ? __pfx_kthread+0x10/0x10
[   27.008113]  ret_from_fork+0x116/0x1d0
[   27.008134]  ? __pfx_kthread+0x10/0x10
[   27.008155]  ret_from_fork_asm+0x1a/0x30
[   27.008186]  </TASK>
[   27.008197] 
[   27.016845] Allocated by task 314:
[   27.017019]  kasan_save_stack+0x45/0x70
[   27.017182]  kasan_save_track+0x18/0x40
[   27.017314]  kasan_save_alloc_info+0x3b/0x50
[   27.017470]  __kasan_kmalloc+0xb7/0xc0
[   27.017600]  __kmalloc_cache_noprof+0x189/0x420
[   27.017819]  kasan_atomics+0x95/0x310
[   27.018166]  kunit_try_run_case+0x1a5/0x480
[   27.018377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.018550]  kthread+0x337/0x6f0
[   27.018799]  ret_from_fork+0x116/0x1d0
[   27.018987]  ret_from_fork_asm+0x1a/0x30
[   27.019141] 
[   27.019207] The buggy address belongs to the object at ffff88810623b200
[   27.019207]  which belongs to the cache kmalloc-64 of size 64
[   27.019805] The buggy address is located 0 bytes to the right of
[   27.019805]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   27.020330] 
[   27.020425] The buggy address belongs to the physical page:
[   27.020670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   27.020960] flags: 0x200000000000000(node=0|zone=2)
[   27.021179] page_type: f5(slab)
[   27.021313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.021677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.021964] page dumped because: kasan: bad access detected
[   27.022180] 
[   27.022269] Memory state around the buggy address:
[   27.022457]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.022753]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.023028] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.023270]                                      ^
[   27.023434]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.023812]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.024147] ==================================================================
[   26.783570] ==================================================================
[   26.784149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   26.784464] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.785676] 
[   26.785787] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.785845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.785860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.785884] Call Trace:
[   26.785906]  <TASK>
[   26.785927]  dump_stack_lvl+0x73/0xb0
[   26.785963]  print_report+0xd1/0x610
[   26.785987]  ? __virt_addr_valid+0x1db/0x2d0
[   26.786012]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.786034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.786062]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.786084]  kasan_report+0x141/0x180
[   26.786107]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.786133]  kasan_check_range+0x10c/0x1c0
[   26.786158]  __kasan_check_write+0x18/0x20
[   26.786183]  kasan_atomics_helper+0x1b22/0x5450
[   26.786207]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.786231]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.786258]  ? kasan_atomics+0x152/0x310
[   26.786284]  kasan_atomics+0x1dc/0x310
[   26.786308]  ? __pfx_kasan_atomics+0x10/0x10
[   26.786344]  ? __pfx_read_tsc+0x10/0x10
[   26.786367]  ? ktime_get_ts64+0x86/0x230
[   26.786393]  kunit_try_run_case+0x1a5/0x480
[   26.786418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.786441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.786466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.786491]  ? __kthread_parkme+0x82/0x180
[   26.786684]  ? preempt_count_sub+0x50/0x80
[   26.786710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.786736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.786765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.786792]  kthread+0x337/0x6f0
[   26.786813]  ? trace_preempt_on+0x20/0xc0
[   26.786839]  ? __pfx_kthread+0x10/0x10
[   26.786861]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.786883]  ? calculate_sigpending+0x7b/0xa0
[   26.786908]  ? __pfx_kthread+0x10/0x10
[   26.786931]  ret_from_fork+0x116/0x1d0
[   26.786951]  ? __pfx_kthread+0x10/0x10
[   26.786973]  ret_from_fork_asm+0x1a/0x30
[   26.787006]  </TASK>
[   26.787018] 
[   26.798279] Allocated by task 314:
[   26.798624]  kasan_save_stack+0x45/0x70
[   26.798833]  kasan_save_track+0x18/0x40
[   26.799092]  kasan_save_alloc_info+0x3b/0x50
[   26.799431]  __kasan_kmalloc+0xb7/0xc0
[   26.799608]  __kmalloc_cache_noprof+0x189/0x420
[   26.799933]  kasan_atomics+0x95/0x310
[   26.800079]  kunit_try_run_case+0x1a5/0x480
[   26.800285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.800530]  kthread+0x337/0x6f0
[   26.800918]  ret_from_fork+0x116/0x1d0
[   26.801184]  ret_from_fork_asm+0x1a/0x30
[   26.801530] 
[   26.801646] The buggy address belongs to the object at ffff88810623b200
[   26.801646]  which belongs to the cache kmalloc-64 of size 64
[   26.802206] The buggy address is located 0 bytes to the right of
[   26.802206]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.803104] 
[   26.803193] The buggy address belongs to the physical page:
[   26.803583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.804039] flags: 0x200000000000000(node=0|zone=2)
[   26.804264] page_type: f5(slab)
[   26.804440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.804936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.805344] page dumped because: kasan: bad access detected
[   26.805701] 
[   26.805783] Memory state around the buggy address:
[   26.806126]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.806413]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.806973] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.807334]                                      ^
[   26.807635]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.808022]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.808380] ==================================================================
[   26.370213] ==================================================================
[   26.370903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   26.371555] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.371860] 
[   26.371953] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.372008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.372022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.372045] Call Trace:
[   26.372070]  <TASK>
[   26.372092]  dump_stack_lvl+0x73/0xb0
[   26.372123]  print_report+0xd1/0x610
[   26.372147]  ? __virt_addr_valid+0x1db/0x2d0
[   26.372172]  ? kasan_atomics_helper+0x1148/0x5450
[   26.372194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.372222]  ? kasan_atomics_helper+0x1148/0x5450
[   26.372244]  kasan_report+0x141/0x180
[   26.372266]  ? kasan_atomics_helper+0x1148/0x5450
[   26.372293]  kasan_check_range+0x10c/0x1c0
[   26.372331]  __kasan_check_write+0x18/0x20
[   26.372355]  kasan_atomics_helper+0x1148/0x5450
[   26.372378]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.372400]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.372427]  ? kasan_atomics+0x152/0x310
[   26.372453]  kasan_atomics+0x1dc/0x310
[   26.372476]  ? __pfx_kasan_atomics+0x10/0x10
[   26.372502]  ? __pfx_read_tsc+0x10/0x10
[   26.372526]  ? ktime_get_ts64+0x86/0x230
[   26.372552]  kunit_try_run_case+0x1a5/0x480
[   26.372598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.372622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.372647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.372671]  ? __kthread_parkme+0x82/0x180
[   26.372693]  ? preempt_count_sub+0x50/0x80
[   26.372718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.372742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.372770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.372799]  kthread+0x337/0x6f0
[   26.372819]  ? trace_preempt_on+0x20/0xc0
[   26.372844]  ? __pfx_kthread+0x10/0x10
[   26.372866]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.372888]  ? calculate_sigpending+0x7b/0xa0
[   26.372913]  ? __pfx_kthread+0x10/0x10
[   26.372936]  ret_from_fork+0x116/0x1d0
[   26.372956]  ? __pfx_kthread+0x10/0x10
[   26.372977]  ret_from_fork_asm+0x1a/0x30
[   26.373010]  </TASK>
[   26.373022] 
[   26.380014] Allocated by task 314:
[   26.380191]  kasan_save_stack+0x45/0x70
[   26.380370]  kasan_save_track+0x18/0x40
[   26.380551]  kasan_save_alloc_info+0x3b/0x50
[   26.380745]  __kasan_kmalloc+0xb7/0xc0
[   26.380930]  __kmalloc_cache_noprof+0x189/0x420
[   26.381116]  kasan_atomics+0x95/0x310
[   26.381279]  kunit_try_run_case+0x1a5/0x480
[   26.381468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.381727]  kthread+0x337/0x6f0
[   26.381846]  ret_from_fork+0x116/0x1d0
[   26.382025]  ret_from_fork_asm+0x1a/0x30
[   26.382215] 
[   26.382306] The buggy address belongs to the object at ffff88810623b200
[   26.382306]  which belongs to the cache kmalloc-64 of size 64
[   26.382759] The buggy address is located 0 bytes to the right of
[   26.382759]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.383258] 
[   26.383365] The buggy address belongs to the physical page:
[   26.383573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.383889] flags: 0x200000000000000(node=0|zone=2)
[   26.384121] page_type: f5(slab)
[   26.384259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.384595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.384903] page dumped because: kasan: bad access detected
[   26.385123] 
[   26.385215] Memory state around the buggy address:
[   26.385404]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.385730]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.386026] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.386289]                                      ^
[   26.386483]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.386720]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.386927] ==================================================================
[   27.085365] ==================================================================
[   27.085732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   27.086059] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   27.086384] 
[   27.086466] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.086513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.086527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.086548] Call Trace:
[   27.086566]  <TASK>
[   27.086582]  dump_stack_lvl+0x73/0xb0
[   27.086610]  print_report+0xd1/0x610
[   27.086644]  ? __virt_addr_valid+0x1db/0x2d0
[   27.086669]  ? kasan_atomics_helper+0x224c/0x5450
[   27.086703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.086730]  ? kasan_atomics_helper+0x224c/0x5450
[   27.086752]  kasan_report+0x141/0x180
[   27.086786]  ? kasan_atomics_helper+0x224c/0x5450
[   27.086813]  kasan_check_range+0x10c/0x1c0
[   27.086838]  __kasan_check_write+0x18/0x20
[   27.086862]  kasan_atomics_helper+0x224c/0x5450
[   27.086885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.086909]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.086944]  ? kasan_atomics+0x152/0x310
[   27.086971]  kasan_atomics+0x1dc/0x310
[   27.087005]  ? __pfx_kasan_atomics+0x10/0x10
[   27.087030]  ? __pfx_read_tsc+0x10/0x10
[   27.087053]  ? ktime_get_ts64+0x86/0x230
[   27.087078]  kunit_try_run_case+0x1a5/0x480
[   27.087103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.087127]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.087150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.087175]  ? __kthread_parkme+0x82/0x180
[   27.087196]  ? preempt_count_sub+0x50/0x80
[   27.087221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.087246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.087273]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.087301]  kthread+0x337/0x6f0
[   27.087333]  ? trace_preempt_on+0x20/0xc0
[   27.087356]  ? __pfx_kthread+0x10/0x10
[   27.087378]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.087400]  ? calculate_sigpending+0x7b/0xa0
[   27.087437]  ? __pfx_kthread+0x10/0x10
[   27.087459]  ret_from_fork+0x116/0x1d0
[   27.087479]  ? __pfx_kthread+0x10/0x10
[   27.087510]  ret_from_fork_asm+0x1a/0x30
[   27.087543]  </TASK>
[   27.087554] 
[   27.094864] Allocated by task 314:
[   27.095037]  kasan_save_stack+0x45/0x70
[   27.095264]  kasan_save_track+0x18/0x40
[   27.095457]  kasan_save_alloc_info+0x3b/0x50
[   27.095603]  __kasan_kmalloc+0xb7/0xc0
[   27.095793]  __kmalloc_cache_noprof+0x189/0x420
[   27.096036]  kasan_atomics+0x95/0x310
[   27.096182]  kunit_try_run_case+0x1a5/0x480
[   27.096387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.096632]  kthread+0x337/0x6f0
[   27.096800]  ret_from_fork+0x116/0x1d0
[   27.096938]  ret_from_fork_asm+0x1a/0x30
[   27.097141] 
[   27.097215] The buggy address belongs to the object at ffff88810623b200
[   27.097215]  which belongs to the cache kmalloc-64 of size 64
[   27.097715] The buggy address is located 0 bytes to the right of
[   27.097715]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   27.098223] 
[   27.098310] The buggy address belongs to the physical page:
[   27.098549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   27.098933] flags: 0x200000000000000(node=0|zone=2)
[   27.099174] page_type: f5(slab)
[   27.099347] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.099573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.099916] page dumped because: kasan: bad access detected
[   27.100170] 
[   27.100236] Memory state around the buggy address:
[   27.100397]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.100790]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.101125] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.101420]                                      ^
[   27.101680]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.101981]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.102283] ==================================================================
[   26.487924] ==================================================================
[   26.488281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   26.488782] Read of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.489147] 
[   26.489261] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.489324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.489338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.489361] Call Trace:
[   26.489383]  <TASK>
[   26.489400]  dump_stack_lvl+0x73/0xb0
[   26.489431]  print_report+0xd1/0x610
[   26.489456]  ? __virt_addr_valid+0x1db/0x2d0
[   26.489480]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.489501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.489529]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.489551]  kasan_report+0x141/0x180
[   26.489574]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.489629]  __asan_report_load8_noabort+0x18/0x20
[   26.489654]  kasan_atomics_helper+0x4eae/0x5450
[   26.489678]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.489701]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.489727]  ? kasan_atomics+0x152/0x310
[   26.489753]  kasan_atomics+0x1dc/0x310
[   26.489776]  ? __pfx_kasan_atomics+0x10/0x10
[   26.489801]  ? __pfx_read_tsc+0x10/0x10
[   26.489826]  ? ktime_get_ts64+0x86/0x230
[   26.489852]  kunit_try_run_case+0x1a5/0x480
[   26.489878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.489901]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.489925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.489949]  ? __kthread_parkme+0x82/0x180
[   26.489971]  ? preempt_count_sub+0x50/0x80
[   26.489996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.490021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.490048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.490076]  kthread+0x337/0x6f0
[   26.490097]  ? trace_preempt_on+0x20/0xc0
[   26.490122]  ? __pfx_kthread+0x10/0x10
[   26.490144]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.490165]  ? calculate_sigpending+0x7b/0xa0
[   26.490190]  ? __pfx_kthread+0x10/0x10
[   26.490213]  ret_from_fork+0x116/0x1d0
[   26.490233]  ? __pfx_kthread+0x10/0x10
[   26.490255]  ret_from_fork_asm+0x1a/0x30
[   26.490287]  </TASK>
[   26.490299] 
[   26.500455] Allocated by task 314:
[   26.501018]  kasan_save_stack+0x45/0x70
[   26.501410]  kasan_save_track+0x18/0x40
[   26.502031]  kasan_save_alloc_info+0x3b/0x50
[   26.502192]  __kasan_kmalloc+0xb7/0xc0
[   26.502332]  __kmalloc_cache_noprof+0x189/0x420
[   26.502483]  kasan_atomics+0x95/0x310
[   26.502711]  kunit_try_run_case+0x1a5/0x480
[   26.503070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.503524]  kthread+0x337/0x6f0
[   26.503809]  ret_from_fork+0x116/0x1d0
[   26.504134]  ret_from_fork_asm+0x1a/0x30
[   26.505140] 
[   26.505327] The buggy address belongs to the object at ffff88810623b200
[   26.505327]  which belongs to the cache kmalloc-64 of size 64
[   26.506758] The buggy address is located 0 bytes to the right of
[   26.506758]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.507130] 
[   26.507199] The buggy address belongs to the physical page:
[   26.507863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.508717] flags: 0x200000000000000(node=0|zone=2)
[   26.509501] page_type: f5(slab)
[   26.510163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.510707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.511568] page dumped because: kasan: bad access detected
[   26.512030] 
[   26.512134] Memory state around the buggy address:
[   26.512500]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.513058]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.513789] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.514039]                                      ^
[   26.514191]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.514585]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.515565] ==================================================================
[   26.038741] ==================================================================
[   26.039075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   26.039419] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.039805] 
[   26.039933] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.039987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.040001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.040025] Call Trace:
[   26.040047]  <TASK>
[   26.040064]  dump_stack_lvl+0x73/0xb0
[   26.040094]  print_report+0xd1/0x610
[   26.040116]  ? __virt_addr_valid+0x1db/0x2d0
[   26.040142]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.040164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.040191]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.040214]  kasan_report+0x141/0x180
[   26.040236]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.040262]  kasan_check_range+0x10c/0x1c0
[   26.040286]  __kasan_check_write+0x18/0x20
[   26.040322]  kasan_atomics_helper+0x7c7/0x5450
[   26.040345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.040368]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.040394]  ? kasan_atomics+0x152/0x310
[   26.040420]  kasan_atomics+0x1dc/0x310
[   26.040444]  ? __pfx_kasan_atomics+0x10/0x10
[   26.040469]  ? __pfx_read_tsc+0x10/0x10
[   26.040493]  ? ktime_get_ts64+0x86/0x230
[   26.040518]  kunit_try_run_case+0x1a5/0x480
[   26.040543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.040565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.040610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.040635]  ? __kthread_parkme+0x82/0x180
[   26.040657]  ? preempt_count_sub+0x50/0x80
[   26.040681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.040705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.040733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.040761]  kthread+0x337/0x6f0
[   26.040782]  ? trace_preempt_on+0x20/0xc0
[   26.040806]  ? __pfx_kthread+0x10/0x10
[   26.040827]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.040850]  ? calculate_sigpending+0x7b/0xa0
[   26.040875]  ? __pfx_kthread+0x10/0x10
[   26.040897]  ret_from_fork+0x116/0x1d0
[   26.040917]  ? __pfx_kthread+0x10/0x10
[   26.040938]  ret_from_fork_asm+0x1a/0x30
[   26.040971]  </TASK>
[   26.040982] 
[   26.047968] Allocated by task 314:
[   26.048144]  kasan_save_stack+0x45/0x70
[   26.048347]  kasan_save_track+0x18/0x40
[   26.048533]  kasan_save_alloc_info+0x3b/0x50
[   26.048762]  __kasan_kmalloc+0xb7/0xc0
[   26.048937]  __kmalloc_cache_noprof+0x189/0x420
[   26.049145]  kasan_atomics+0x95/0x310
[   26.049290]  kunit_try_run_case+0x1a5/0x480
[   26.049440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.049643]  kthread+0x337/0x6f0
[   26.049761]  ret_from_fork+0x116/0x1d0
[   26.049933]  ret_from_fork_asm+0x1a/0x30
[   26.050126] 
[   26.050214] The buggy address belongs to the object at ffff88810623b200
[   26.050214]  which belongs to the cache kmalloc-64 of size 64
[   26.050785] The buggy address is located 0 bytes to the right of
[   26.050785]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.051303] 
[   26.051398] The buggy address belongs to the physical page:
[   26.051589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.051923] flags: 0x200000000000000(node=0|zone=2)
[   26.052084] page_type: f5(slab)
[   26.052200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.052434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.052774] page dumped because: kasan: bad access detected
[   26.053020] 
[   26.053110] Memory state around the buggy address:
[   26.053338]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.053593]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.053809] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.054016]                                      ^
[   26.054212]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.054540]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.054876] ==================================================================
[   26.930454] ==================================================================
[   26.931055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   26.931655] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.931991] 
[   26.932078] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.932130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.932144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.932167] Call Trace:
[   26.932188]  <TASK>
[   26.932205]  dump_stack_lvl+0x73/0xb0
[   26.932235]  print_report+0xd1/0x610
[   26.932260]  ? __virt_addr_valid+0x1db/0x2d0
[   26.932285]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.932334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.932362]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.932386]  kasan_report+0x141/0x180
[   26.932409]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.932437]  kasan_check_range+0x10c/0x1c0
[   26.932461]  __kasan_check_write+0x18/0x20
[   26.932486]  kasan_atomics_helper+0x1f43/0x5450
[   26.932510]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.932534]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.932559]  ? kasan_atomics+0x152/0x310
[   26.932604]  kasan_atomics+0x1dc/0x310
[   26.932628]  ? __pfx_kasan_atomics+0x10/0x10
[   26.932653]  ? __pfx_read_tsc+0x10/0x10
[   26.932675]  ? ktime_get_ts64+0x86/0x230
[   26.932711]  kunit_try_run_case+0x1a5/0x480
[   26.932736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.932759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.932794]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.932818]  ? __kthread_parkme+0x82/0x180
[   26.932840]  ? preempt_count_sub+0x50/0x80
[   26.932873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.932898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.932925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.932963]  kthread+0x337/0x6f0
[   26.932983]  ? trace_preempt_on+0x20/0xc0
[   26.933008]  ? __pfx_kthread+0x10/0x10
[   26.933038]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.933060]  ? calculate_sigpending+0x7b/0xa0
[   26.933085]  ? __pfx_kthread+0x10/0x10
[   26.933117]  ret_from_fork+0x116/0x1d0
[   26.933137]  ? __pfx_kthread+0x10/0x10
[   26.933160]  ret_from_fork_asm+0x1a/0x30
[   26.933200]  </TASK>
[   26.933212] 
[   26.940651] Allocated by task 314:
[   26.940806]  kasan_save_stack+0x45/0x70
[   26.941019]  kasan_save_track+0x18/0x40
[   26.941196]  kasan_save_alloc_info+0x3b/0x50
[   26.941386]  __kasan_kmalloc+0xb7/0xc0
[   26.941568]  __kmalloc_cache_noprof+0x189/0x420
[   26.941816]  kasan_atomics+0x95/0x310
[   26.941994]  kunit_try_run_case+0x1a5/0x480
[   26.942138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.942311]  kthread+0x337/0x6f0
[   26.942490]  ret_from_fork+0x116/0x1d0
[   26.942732]  ret_from_fork_asm+0x1a/0x30
[   26.942967] 
[   26.943068] The buggy address belongs to the object at ffff88810623b200
[   26.943068]  which belongs to the cache kmalloc-64 of size 64
[   26.943574] The buggy address is located 0 bytes to the right of
[   26.943574]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.944099] 
[   26.944226] The buggy address belongs to the physical page:
[   26.944456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.944819] flags: 0x200000000000000(node=0|zone=2)
[   26.945026] page_type: f5(slab)
[   26.945204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.945473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.945727] page dumped because: kasan: bad access detected
[   26.945895] 
[   26.945960] Memory state around the buggy address:
[   26.946194]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.946456]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.946732] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.947039]                                      ^
[   26.947259]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.947580]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.947913] ==================================================================
[   26.170350] ==================================================================
[   26.170732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   26.171111] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.171489] 
[   26.171615] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.171698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.171713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.171736] Call Trace:
[   26.171759]  <TASK>
[   26.171777]  dump_stack_lvl+0x73/0xb0
[   26.171837]  print_report+0xd1/0x610
[   26.171860]  ? __virt_addr_valid+0x1db/0x2d0
[   26.171885]  ? kasan_atomics_helper+0xc70/0x5450
[   26.171907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.171935]  ? kasan_atomics_helper+0xc70/0x5450
[   26.171985]  kasan_report+0x141/0x180
[   26.172009]  ? kasan_atomics_helper+0xc70/0x5450
[   26.172035]  kasan_check_range+0x10c/0x1c0
[   26.172060]  __kasan_check_write+0x18/0x20
[   26.172084]  kasan_atomics_helper+0xc70/0x5450
[   26.172136]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.172183]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.172209]  ? kasan_atomics+0x152/0x310
[   26.172236]  kasan_atomics+0x1dc/0x310
[   26.172259]  ? __pfx_kasan_atomics+0x10/0x10
[   26.172284]  ? __pfx_read_tsc+0x10/0x10
[   26.172319]  ? ktime_get_ts64+0x86/0x230
[   26.172377]  kunit_try_run_case+0x1a5/0x480
[   26.172427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.172449]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.172474]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.172498]  ? __kthread_parkme+0x82/0x180
[   26.172519]  ? preempt_count_sub+0x50/0x80
[   26.172544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.172590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.172638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.172665]  kthread+0x337/0x6f0
[   26.172686]  ? trace_preempt_on+0x20/0xc0
[   26.172712]  ? __pfx_kthread+0x10/0x10
[   26.172757]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.172780]  ? calculate_sigpending+0x7b/0xa0
[   26.172806]  ? __pfx_kthread+0x10/0x10
[   26.172829]  ret_from_fork+0x116/0x1d0
[   26.172849]  ? __pfx_kthread+0x10/0x10
[   26.172871]  ret_from_fork_asm+0x1a/0x30
[   26.172904]  </TASK>
[   26.172916] 
[   26.180130] Allocated by task 314:
[   26.180305]  kasan_save_stack+0x45/0x70
[   26.180513]  kasan_save_track+0x18/0x40
[   26.180697]  kasan_save_alloc_info+0x3b/0x50
[   26.180926]  __kasan_kmalloc+0xb7/0xc0
[   26.181124]  __kmalloc_cache_noprof+0x189/0x420
[   26.181285]  kasan_atomics+0x95/0x310
[   26.181420]  kunit_try_run_case+0x1a5/0x480
[   26.181558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.181729]  kthread+0x337/0x6f0
[   26.181842]  ret_from_fork+0x116/0x1d0
[   26.181966]  ret_from_fork_asm+0x1a/0x30
[   26.182094] 
[   26.182158] The buggy address belongs to the object at ffff88810623b200
[   26.182158]  which belongs to the cache kmalloc-64 of size 64
[   26.183085] The buggy address is located 0 bytes to the right of
[   26.183085]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.183698] 
[   26.183791] The buggy address belongs to the physical page:
[   26.184042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.184396] flags: 0x200000000000000(node=0|zone=2)
[   26.184573] page_type: f5(slab)
[   26.184741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.184983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.185196] page dumped because: kasan: bad access detected
[   26.185367] 
[   26.185430] Memory state around the buggy address:
[   26.185578]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.185897]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.186220] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.186571]                                      ^
[   26.186792]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.187097]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.187325] ==================================================================
[   26.228298] ==================================================================
[   26.228740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   26.228996] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.229325] 
[   26.229408] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.229459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.229474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.229497] Call Trace:
[   26.229513]  <TASK>
[   26.229529]  dump_stack_lvl+0x73/0xb0
[   26.229558]  print_report+0xd1/0x610
[   26.229581]  ? __virt_addr_valid+0x1db/0x2d0
[   26.229613]  ? kasan_atomics_helper+0xde0/0x5450
[   26.229635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.229661]  ? kasan_atomics_helper+0xde0/0x5450
[   26.229684]  kasan_report+0x141/0x180
[   26.229718]  ? kasan_atomics_helper+0xde0/0x5450
[   26.229745]  kasan_check_range+0x10c/0x1c0
[   26.229770]  __kasan_check_write+0x18/0x20
[   26.229794]  kasan_atomics_helper+0xde0/0x5450
[   26.229818]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.229842]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.229867]  ? kasan_atomics+0x152/0x310
[   26.229894]  kasan_atomics+0x1dc/0x310
[   26.229918]  ? __pfx_kasan_atomics+0x10/0x10
[   26.229943]  ? __pfx_read_tsc+0x10/0x10
[   26.229967]  ? ktime_get_ts64+0x86/0x230
[   26.229994]  kunit_try_run_case+0x1a5/0x480
[   26.230019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.230043]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.230068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.230092]  ? __kthread_parkme+0x82/0x180
[   26.230114]  ? preempt_count_sub+0x50/0x80
[   26.230139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.230163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.230192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.230219]  kthread+0x337/0x6f0
[   26.230240]  ? trace_preempt_on+0x20/0xc0
[   26.230264]  ? __pfx_kthread+0x10/0x10
[   26.230286]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.230317]  ? calculate_sigpending+0x7b/0xa0
[   26.230343]  ? __pfx_kthread+0x10/0x10
[   26.230366]  ret_from_fork+0x116/0x1d0
[   26.230386]  ? __pfx_kthread+0x10/0x10
[   26.230407]  ret_from_fork_asm+0x1a/0x30
[   26.230439]  </TASK>
[   26.230451] 
[   26.237764] Allocated by task 314:
[   26.237914]  kasan_save_stack+0x45/0x70
[   26.238088]  kasan_save_track+0x18/0x40
[   26.238253]  kasan_save_alloc_info+0x3b/0x50
[   26.238452]  __kasan_kmalloc+0xb7/0xc0
[   26.238658]  __kmalloc_cache_noprof+0x189/0x420
[   26.238842]  kasan_atomics+0x95/0x310
[   26.239010]  kunit_try_run_case+0x1a5/0x480
[   26.239172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.239415]  kthread+0x337/0x6f0
[   26.239569]  ret_from_fork+0x116/0x1d0
[   26.239753]  ret_from_fork_asm+0x1a/0x30
[   26.239903] 
[   26.239968] The buggy address belongs to the object at ffff88810623b200
[   26.239968]  which belongs to the cache kmalloc-64 of size 64
[   26.240418] The buggy address is located 0 bytes to the right of
[   26.240418]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.241006] 
[   26.241075] The buggy address belongs to the physical page:
[   26.241244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.241611] flags: 0x200000000000000(node=0|zone=2)
[   26.241859] page_type: f5(slab)
[   26.242025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.242306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.242585] page dumped because: kasan: bad access detected
[   26.242791] 
[   26.242896] Memory state around the buggy address:
[   26.244868]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.245093]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.245306] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.245532]                                      ^
[   26.245696]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.245909]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.246115] ==================================================================
[   26.965962] ==================================================================
[   26.966208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   26.966743] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.967110] 
[   26.967223] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.967277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.967292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.967315] Call Trace:
[   26.967347]  <TASK>
[   26.967364]  dump_stack_lvl+0x73/0xb0
[   26.967396]  print_report+0xd1/0x610
[   26.967420]  ? __virt_addr_valid+0x1db/0x2d0
[   26.967445]  ? kasan_atomics_helper+0x2006/0x5450
[   26.967468]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.967495]  ? kasan_atomics_helper+0x2006/0x5450
[   26.967518]  kasan_report+0x141/0x180
[   26.967541]  ? kasan_atomics_helper+0x2006/0x5450
[   26.967569]  kasan_check_range+0x10c/0x1c0
[   26.967614]  __kasan_check_write+0x18/0x20
[   26.967639]  kasan_atomics_helper+0x2006/0x5450
[   26.967663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.967686]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.967713]  ? kasan_atomics+0x152/0x310
[   26.967740]  kasan_atomics+0x1dc/0x310
[   26.967763]  ? __pfx_kasan_atomics+0x10/0x10
[   26.967788]  ? __pfx_read_tsc+0x10/0x10
[   26.967811]  ? ktime_get_ts64+0x86/0x230
[   26.967837]  kunit_try_run_case+0x1a5/0x480
[   26.967862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.967886]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.967911]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.967934]  ? __kthread_parkme+0x82/0x180
[   26.967956]  ? preempt_count_sub+0x50/0x80
[   26.967980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.968006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.968033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.968061]  kthread+0x337/0x6f0
[   26.968083]  ? trace_preempt_on+0x20/0xc0
[   26.968107]  ? __pfx_kthread+0x10/0x10
[   26.968129]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.968151]  ? calculate_sigpending+0x7b/0xa0
[   26.968176]  ? __pfx_kthread+0x10/0x10
[   26.968198]  ret_from_fork+0x116/0x1d0
[   26.968219]  ? __pfx_kthread+0x10/0x10
[   26.968240]  ret_from_fork_asm+0x1a/0x30
[   26.968273]  </TASK>
[   26.968285] 
[   26.975724] Allocated by task 314:
[   26.975935]  kasan_save_stack+0x45/0x70
[   26.976156]  kasan_save_track+0x18/0x40
[   26.976356]  kasan_save_alloc_info+0x3b/0x50
[   26.976536]  __kasan_kmalloc+0xb7/0xc0
[   26.976728]  __kmalloc_cache_noprof+0x189/0x420
[   26.976884]  kasan_atomics+0x95/0x310
[   26.977063]  kunit_try_run_case+0x1a5/0x480
[   26.977297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.977602]  kthread+0x337/0x6f0
[   26.977741]  ret_from_fork+0x116/0x1d0
[   26.977936]  ret_from_fork_asm+0x1a/0x30
[   26.978114] 
[   26.978214] The buggy address belongs to the object at ffff88810623b200
[   26.978214]  which belongs to the cache kmalloc-64 of size 64
[   26.978751] The buggy address is located 0 bytes to the right of
[   26.978751]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.979264] 
[   26.979357] The buggy address belongs to the physical page:
[   26.979621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.979963] flags: 0x200000000000000(node=0|zone=2)
[   26.980129] page_type: f5(slab)
[   26.980272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.980621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.980885] page dumped because: kasan: bad access detected
[   26.981053] 
[   26.981117] Memory state around the buggy address:
[   26.981269]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.982911]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.983785] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.984539]                                      ^
[   26.985058]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.985282]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.985504] ==================================================================
[   25.809604] ==================================================================
[   25.810033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   25.810393] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.810713] 
[   25.810797] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.810850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.810864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.810887] Call Trace:
[   25.810972]  <TASK>
[   25.810995]  dump_stack_lvl+0x73/0xb0
[   25.811027]  print_report+0xd1/0x610
[   25.811051]  ? __virt_addr_valid+0x1db/0x2d0
[   25.811076]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.811098]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.811126]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.811148]  kasan_report+0x141/0x180
[   25.811172]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.811199]  __asan_report_store4_noabort+0x1b/0x30
[   25.811224]  kasan_atomics_helper+0x4b6e/0x5450
[   25.811248]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.811271]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.811298]  ? kasan_atomics+0x152/0x310
[   25.811357]  kasan_atomics+0x1dc/0x310
[   25.811382]  ? __pfx_kasan_atomics+0x10/0x10
[   25.811407]  ? __pfx_read_tsc+0x10/0x10
[   25.811431]  ? ktime_get_ts64+0x86/0x230
[   25.811456]  kunit_try_run_case+0x1a5/0x480
[   25.811482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.811525]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.811551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.811575]  ? __kthread_parkme+0x82/0x180
[   25.811597]  ? preempt_count_sub+0x50/0x80
[   25.811633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.811658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.811687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.811719]  kthread+0x337/0x6f0
[   25.811741]  ? trace_preempt_on+0x20/0xc0
[   25.811768]  ? __pfx_kthread+0x10/0x10
[   25.811791]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.811814]  ? calculate_sigpending+0x7b/0xa0
[   25.811840]  ? __pfx_kthread+0x10/0x10
[   25.811901]  ret_from_fork+0x116/0x1d0
[   25.811926]  ? __pfx_kthread+0x10/0x10
[   25.811970]  ret_from_fork_asm+0x1a/0x30
[   25.812005]  </TASK>
[   25.812019] 
[   25.820809] Allocated by task 314:
[   25.821050]  kasan_save_stack+0x45/0x70
[   25.821206]  kasan_save_track+0x18/0x40
[   25.821371]  kasan_save_alloc_info+0x3b/0x50
[   25.821578]  __kasan_kmalloc+0xb7/0xc0
[   25.821844]  __kmalloc_cache_noprof+0x189/0x420
[   25.822012]  kasan_atomics+0x95/0x310
[   25.822142]  kunit_try_run_case+0x1a5/0x480
[   25.822335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.822591]  kthread+0x337/0x6f0
[   25.822767]  ret_from_fork+0x116/0x1d0
[   25.823021]  ret_from_fork_asm+0x1a/0x30
[   25.823369] 
[   25.823466] The buggy address belongs to the object at ffff88810623b200
[   25.823466]  which belongs to the cache kmalloc-64 of size 64
[   25.823890] The buggy address is located 0 bytes to the right of
[   25.823890]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.824378] 
[   25.824472] The buggy address belongs to the physical page:
[   25.824776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.825064] flags: 0x200000000000000(node=0|zone=2)
[   25.825229] page_type: f5(slab)
[   25.825361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.826015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.826350] page dumped because: kasan: bad access detected
[   25.826520] 
[   25.826585] Memory state around the buggy address:
[   25.826770]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.827082]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.827498] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.827786]                                      ^
[   25.828168]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.828469]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.828777] ==================================================================
[   26.404133] ==================================================================
[   26.404479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   26.404816] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.405109] 
[   26.405200] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.405254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.405268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.405291] Call Trace:
[   26.405324]  <TASK>
[   26.405344]  dump_stack_lvl+0x73/0xb0
[   26.405375]  print_report+0xd1/0x610
[   26.405398]  ? __virt_addr_valid+0x1db/0x2d0
[   26.405423]  ? kasan_atomics_helper+0x1217/0x5450
[   26.405445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.405471]  ? kasan_atomics_helper+0x1217/0x5450
[   26.405494]  kasan_report+0x141/0x180
[   26.405517]  ? kasan_atomics_helper+0x1217/0x5450
[   26.405544]  kasan_check_range+0x10c/0x1c0
[   26.405567]  __kasan_check_write+0x18/0x20
[   26.405619]  kasan_atomics_helper+0x1217/0x5450
[   26.405643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.405665]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.405691]  ? kasan_atomics+0x152/0x310
[   26.405718]  kasan_atomics+0x1dc/0x310
[   26.405741]  ? __pfx_kasan_atomics+0x10/0x10
[   26.405765]  ? __pfx_read_tsc+0x10/0x10
[   26.405791]  ? ktime_get_ts64+0x86/0x230
[   26.405817]  kunit_try_run_case+0x1a5/0x480
[   26.405844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.405866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.405891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.405915]  ? __kthread_parkme+0x82/0x180
[   26.405938]  ? preempt_count_sub+0x50/0x80
[   26.405962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.405987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.406015]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.406043]  kthread+0x337/0x6f0
[   26.406064]  ? trace_preempt_on+0x20/0xc0
[   26.406089]  ? __pfx_kthread+0x10/0x10
[   26.406111]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.406132]  ? calculate_sigpending+0x7b/0xa0
[   26.406157]  ? __pfx_kthread+0x10/0x10
[   26.406180]  ret_from_fork+0x116/0x1d0
[   26.406201]  ? __pfx_kthread+0x10/0x10
[   26.406222]  ret_from_fork_asm+0x1a/0x30
[   26.406254]  </TASK>
[   26.406267] 
[   26.413516] Allocated by task 314:
[   26.413731]  kasan_save_stack+0x45/0x70
[   26.413894]  kasan_save_track+0x18/0x40
[   26.414070]  kasan_save_alloc_info+0x3b/0x50
[   26.414266]  __kasan_kmalloc+0xb7/0xc0
[   26.414421]  __kmalloc_cache_noprof+0x189/0x420
[   26.414661]  kasan_atomics+0x95/0x310
[   26.414816]  kunit_try_run_case+0x1a5/0x480
[   26.414958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.415130]  kthread+0x337/0x6f0
[   26.415246]  ret_from_fork+0x116/0x1d0
[   26.415418]  ret_from_fork_asm+0x1a/0x30
[   26.415640] 
[   26.415729] The buggy address belongs to the object at ffff88810623b200
[   26.415729]  which belongs to the cache kmalloc-64 of size 64
[   26.416255] The buggy address is located 0 bytes to the right of
[   26.416255]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.416791] 
[   26.416862] The buggy address belongs to the physical page:
[   26.417114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.417436] flags: 0x200000000000000(node=0|zone=2)
[   26.417678] page_type: f5(slab)
[   26.417827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.418134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.418427] page dumped because: kasan: bad access detected
[   26.418672] 
[   26.418761] Memory state around the buggy address:
[   26.418952]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.419232]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.419508] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.419807]                                      ^
[   26.420001]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.420280]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.420557] ==================================================================
[   26.187760] ==================================================================
[   26.188297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   26.188683] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.188987] 
[   26.189073] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.189124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.189137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.189159] Call Trace:
[   26.189176]  <TASK>
[   26.189192]  dump_stack_lvl+0x73/0xb0
[   26.189222]  print_report+0xd1/0x610
[   26.189246]  ? __virt_addr_valid+0x1db/0x2d0
[   26.189271]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.189293]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.189333]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.189356]  kasan_report+0x141/0x180
[   26.189378]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.189405]  __asan_report_load4_noabort+0x18/0x20
[   26.189430]  kasan_atomics_helper+0x4a84/0x5450
[   26.189453]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.189476]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.189503]  ? kasan_atomics+0x152/0x310
[   26.189530]  kasan_atomics+0x1dc/0x310
[   26.189553]  ? __pfx_kasan_atomics+0x10/0x10
[   26.189578]  ? __pfx_read_tsc+0x10/0x10
[   26.189632]  ? ktime_get_ts64+0x86/0x230
[   26.189658]  kunit_try_run_case+0x1a5/0x480
[   26.189682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.189706]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.189729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.189753]  ? __kthread_parkme+0x82/0x180
[   26.189775]  ? preempt_count_sub+0x50/0x80
[   26.189798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.189826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.189852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.189899]  kthread+0x337/0x6f0
[   26.189921]  ? trace_preempt_on+0x20/0xc0
[   26.189945]  ? __pfx_kthread+0x10/0x10
[   26.189984]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.190007]  ? calculate_sigpending+0x7b/0xa0
[   26.190032]  ? __pfx_kthread+0x10/0x10
[   26.190054]  ret_from_fork+0x116/0x1d0
[   26.190075]  ? __pfx_kthread+0x10/0x10
[   26.190097]  ret_from_fork_asm+0x1a/0x30
[   26.190146]  </TASK>
[   26.190158] 
[   26.197780] Allocated by task 314:
[   26.197973]  kasan_save_stack+0x45/0x70
[   26.198150]  kasan_save_track+0x18/0x40
[   26.198277]  kasan_save_alloc_info+0x3b/0x50
[   26.198487]  __kasan_kmalloc+0xb7/0xc0
[   26.198661]  __kmalloc_cache_noprof+0x189/0x420
[   26.198870]  kasan_atomics+0x95/0x310
[   26.199041]  kunit_try_run_case+0x1a5/0x480
[   26.199240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.199516]  kthread+0x337/0x6f0
[   26.199677]  ret_from_fork+0x116/0x1d0
[   26.199855]  ret_from_fork_asm+0x1a/0x30
[   26.200171] 
[   26.200239] The buggy address belongs to the object at ffff88810623b200
[   26.200239]  which belongs to the cache kmalloc-64 of size 64
[   26.200586] The buggy address is located 0 bytes to the right of
[   26.200586]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.201140] 
[   26.201232] The buggy address belongs to the physical page:
[   26.201511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.201796] flags: 0x200000000000000(node=0|zone=2)
[   26.201953] page_type: f5(slab)
[   26.202066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.202285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.202624] page dumped because: kasan: bad access detected
[   26.202977] 
[   26.203098] Memory state around the buggy address:
[   26.203346]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.203705]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.204036] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.204381]                                      ^
[   26.204581]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.204830]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.205032] ==================================================================
[   26.611553] ==================================================================
[   26.611929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   26.612227] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.612999] 
[   26.613685] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.613762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.613777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.613801] Call Trace:
[   26.613824]  <TASK>
[   26.613846]  dump_stack_lvl+0x73/0xb0
[   26.613880]  print_report+0xd1/0x610
[   26.613904]  ? __virt_addr_valid+0x1db/0x2d0
[   26.613929]  ? kasan_atomics_helper+0x164f/0x5450
[   26.613951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.613978]  ? kasan_atomics_helper+0x164f/0x5450
[   26.614001]  kasan_report+0x141/0x180
[   26.614024]  ? kasan_atomics_helper+0x164f/0x5450
[   26.614056]  kasan_check_range+0x10c/0x1c0
[   26.614080]  __kasan_check_write+0x18/0x20
[   26.614105]  kasan_atomics_helper+0x164f/0x5450
[   26.614128]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.614151]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.614177]  ? kasan_atomics+0x152/0x310
[   26.614203]  kasan_atomics+0x1dc/0x310
[   26.614227]  ? __pfx_kasan_atomics+0x10/0x10
[   26.614252]  ? __pfx_read_tsc+0x10/0x10
[   26.614275]  ? ktime_get_ts64+0x86/0x230
[   26.614301]  kunit_try_run_case+0x1a5/0x480
[   26.614336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.614360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.614384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.614408]  ? __kthread_parkme+0x82/0x180
[   26.614430]  ? preempt_count_sub+0x50/0x80
[   26.614456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.614483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.614511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.614539]  kthread+0x337/0x6f0
[   26.614564]  ? trace_preempt_on+0x20/0xc0
[   26.614589]  ? __pfx_kthread+0x10/0x10
[   26.614631]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.614653]  ? calculate_sigpending+0x7b/0xa0
[   26.614678]  ? __pfx_kthread+0x10/0x10
[   26.614701]  ret_from_fork+0x116/0x1d0
[   26.614722]  ? __pfx_kthread+0x10/0x10
[   26.614744]  ret_from_fork_asm+0x1a/0x30
[   26.614777]  </TASK>
[   26.614788] 
[   26.623363] Allocated by task 314:
[   26.623568]  kasan_save_stack+0x45/0x70
[   26.623771]  kasan_save_track+0x18/0x40
[   26.623955]  kasan_save_alloc_info+0x3b/0x50
[   26.624094]  __kasan_kmalloc+0xb7/0xc0
[   26.624336]  __kmalloc_cache_noprof+0x189/0x420
[   26.624557]  kasan_atomics+0x95/0x310
[   26.624784]  kunit_try_run_case+0x1a5/0x480
[   26.625080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.625342]  kthread+0x337/0x6f0
[   26.625499]  ret_from_fork+0x116/0x1d0
[   26.625711]  ret_from_fork_asm+0x1a/0x30
[   26.625899] 
[   26.626138] The buggy address belongs to the object at ffff88810623b200
[   26.626138]  which belongs to the cache kmalloc-64 of size 64
[   26.626700] The buggy address is located 0 bytes to the right of
[   26.626700]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.627137] 
[   26.627276] The buggy address belongs to the physical page:
[   26.627791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.628029] flags: 0x200000000000000(node=0|zone=2)
[   26.628247] page_type: f5(slab)
[   26.628426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.628993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.629392] page dumped because: kasan: bad access detected
[   26.629588] 
[   26.629695] Memory state around the buggy address:
[   26.629941]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.630287]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.630757] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.631083]                                      ^
[   26.631244]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.631596]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.631941] ==================================================================
[   26.543947] ==================================================================
[   26.544686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   26.545413] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.546090] 
[   26.547233] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.547304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.547328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.547350] Call Trace:
[   26.547371]  <TASK>
[   26.547389]  dump_stack_lvl+0x73/0xb0
[   26.547420]  print_report+0xd1/0x610
[   26.547444]  ? __virt_addr_valid+0x1db/0x2d0
[   26.547469]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.547491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.547518]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.547540]  kasan_report+0x141/0x180
[   26.547563]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.547609]  __asan_report_store8_noabort+0x1b/0x30
[   26.547635]  kasan_atomics_helper+0x50d4/0x5450
[   26.547658]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.547682]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.547707]  ? kasan_atomics+0x152/0x310
[   26.547734]  kasan_atomics+0x1dc/0x310
[   26.547758]  ? __pfx_kasan_atomics+0x10/0x10
[   26.547783]  ? __pfx_read_tsc+0x10/0x10
[   26.547807]  ? ktime_get_ts64+0x86/0x230
[   26.547833]  kunit_try_run_case+0x1a5/0x480
[   26.547858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.547882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.547906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.547931]  ? __kthread_parkme+0x82/0x180
[   26.547953]  ? preempt_count_sub+0x50/0x80
[   26.547977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.548001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.548029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.548056]  kthread+0x337/0x6f0
[   26.548077]  ? trace_preempt_on+0x20/0xc0
[   26.548101]  ? __pfx_kthread+0x10/0x10
[   26.548123]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.548145]  ? calculate_sigpending+0x7b/0xa0
[   26.548170]  ? __pfx_kthread+0x10/0x10
[   26.548193]  ret_from_fork+0x116/0x1d0
[   26.548213]  ? __pfx_kthread+0x10/0x10
[   26.548234]  ret_from_fork_asm+0x1a/0x30
[   26.548267]  </TASK>
[   26.548278] 
[   26.556123] Allocated by task 314:
[   26.556307]  kasan_save_stack+0x45/0x70
[   26.556559]  kasan_save_track+0x18/0x40
[   26.556768]  kasan_save_alloc_info+0x3b/0x50
[   26.556952]  __kasan_kmalloc+0xb7/0xc0
[   26.557136]  __kmalloc_cache_noprof+0x189/0x420
[   26.557399]  kasan_atomics+0x95/0x310
[   26.557559]  kunit_try_run_case+0x1a5/0x480
[   26.557848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.558088]  kthread+0x337/0x6f0
[   26.558292]  ret_from_fork+0x116/0x1d0
[   26.558483]  ret_from_fork_asm+0x1a/0x30
[   26.558742] 
[   26.558830] The buggy address belongs to the object at ffff88810623b200
[   26.558830]  which belongs to the cache kmalloc-64 of size 64
[   26.559269] The buggy address is located 0 bytes to the right of
[   26.559269]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.559656] 
[   26.559725] The buggy address belongs to the physical page:
[   26.559888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.560179] flags: 0x200000000000000(node=0|zone=2)
[   26.560385] page_type: f5(slab)
[   26.560550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.560892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.561261] page dumped because: kasan: bad access detected
[   26.561517] 
[   26.561668] Memory state around the buggy address:
[   26.561919]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.562125]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.562338] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.562538]                                      ^
[   26.562709]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.562978]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.563326] ==================================================================
[   26.809128] ==================================================================
[   26.809386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   26.809804] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.810260] 
[   26.810895] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.810952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.810967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.810991] Call Trace:
[   26.811012]  <TASK>
[   26.811030]  dump_stack_lvl+0x73/0xb0
[   26.811156]  print_report+0xd1/0x610
[   26.811186]  ? __virt_addr_valid+0x1db/0x2d0
[   26.811211]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.811233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.811260]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.811283]  kasan_report+0x141/0x180
[   26.811307]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.811347]  kasan_check_range+0x10c/0x1c0
[   26.811371]  __kasan_check_write+0x18/0x20
[   26.811397]  kasan_atomics_helper+0x1c18/0x5450
[   26.811420]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.811444]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.811469]  ? kasan_atomics+0x152/0x310
[   26.811496]  kasan_atomics+0x1dc/0x310
[   26.811520]  ? __pfx_kasan_atomics+0x10/0x10
[   26.811545]  ? __pfx_read_tsc+0x10/0x10
[   26.811568]  ? ktime_get_ts64+0x86/0x230
[   26.811595]  kunit_try_run_case+0x1a5/0x480
[   26.811633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.811656]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.811681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.811705]  ? __kthread_parkme+0x82/0x180
[   26.811726]  ? preempt_count_sub+0x50/0x80
[   26.811751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.811776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.811803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.811830]  kthread+0x337/0x6f0
[   26.811851]  ? trace_preempt_on+0x20/0xc0
[   26.811875]  ? __pfx_kthread+0x10/0x10
[   26.811896]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.811919]  ? calculate_sigpending+0x7b/0xa0
[   26.811944]  ? __pfx_kthread+0x10/0x10
[   26.811966]  ret_from_fork+0x116/0x1d0
[   26.811987]  ? __pfx_kthread+0x10/0x10
[   26.812008]  ret_from_fork_asm+0x1a/0x30
[   26.812041]  </TASK>
[   26.812053] 
[   26.821988] Allocated by task 314:
[   26.822242]  kasan_save_stack+0x45/0x70
[   26.822411]  kasan_save_track+0x18/0x40
[   26.822788]  kasan_save_alloc_info+0x3b/0x50
[   26.823081]  __kasan_kmalloc+0xb7/0xc0
[   26.823221]  __kmalloc_cache_noprof+0x189/0x420
[   26.823562]  kasan_atomics+0x95/0x310
[   26.823853]  kunit_try_run_case+0x1a5/0x480
[   26.824006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.824256]  kthread+0x337/0x6f0
[   26.824416]  ret_from_fork+0x116/0x1d0
[   26.824588]  ret_from_fork_asm+0x1a/0x30
[   26.825042] 
[   26.825122] The buggy address belongs to the object at ffff88810623b200
[   26.825122]  which belongs to the cache kmalloc-64 of size 64
[   26.825707] The buggy address is located 0 bytes to the right of
[   26.825707]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.826092] 
[   26.826168] The buggy address belongs to the physical page:
[   26.826386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.827109] flags: 0x200000000000000(node=0|zone=2)
[   26.827474] page_type: f5(slab)
[   26.827619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.828299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.828531] page dumped because: kasan: bad access detected
[   26.829026] 
[   26.829210] Memory state around the buggy address:
[   26.829698]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.830170]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.830396] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.830674]                                      ^
[   26.831134]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.831788]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.832399] ==================================================================
[   25.960135] ==================================================================
[   25.960809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   25.961438] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.961814] 
[   25.961907] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.962285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.962313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.962337] Call Trace:
[   25.962351]  <TASK>
[   25.962369]  dump_stack_lvl+0x73/0xb0
[   25.962401]  print_report+0xd1/0x610
[   25.962425]  ? __virt_addr_valid+0x1db/0x2d0
[   25.962449]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.962471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.962498]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.962520]  kasan_report+0x141/0x180
[   25.962543]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.962592]  kasan_check_range+0x10c/0x1c0
[   25.962618]  __kasan_check_write+0x18/0x20
[   25.962642]  kasan_atomics_helper+0x5fe/0x5450
[   25.962664]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.962687]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.962713]  ? kasan_atomics+0x152/0x310
[   25.962739]  kasan_atomics+0x1dc/0x310
[   25.962764]  ? __pfx_kasan_atomics+0x10/0x10
[   25.962788]  ? __pfx_read_tsc+0x10/0x10
[   25.962814]  ? ktime_get_ts64+0x86/0x230
[   25.962840]  kunit_try_run_case+0x1a5/0x480
[   25.962865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.962889]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.962913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.962937]  ? __kthread_parkme+0x82/0x180
[   25.962959]  ? preempt_count_sub+0x50/0x80
[   25.962983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.963007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.963035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.963063]  kthread+0x337/0x6f0
[   25.963083]  ? trace_preempt_on+0x20/0xc0
[   25.963107]  ? __pfx_kthread+0x10/0x10
[   25.963128]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.963150]  ? calculate_sigpending+0x7b/0xa0
[   25.963175]  ? __pfx_kthread+0x10/0x10
[   25.963198]  ret_from_fork+0x116/0x1d0
[   25.963218]  ? __pfx_kthread+0x10/0x10
[   25.963240]  ret_from_fork_asm+0x1a/0x30
[   25.963272]  </TASK>
[   25.963285] 
[   25.976267] Allocated by task 314:
[   25.976633]  kasan_save_stack+0x45/0x70
[   25.976885]  kasan_save_track+0x18/0x40
[   25.977018]  kasan_save_alloc_info+0x3b/0x50
[   25.977165]  __kasan_kmalloc+0xb7/0xc0
[   25.977293]  __kmalloc_cache_noprof+0x189/0x420
[   25.977559]  kasan_atomics+0x95/0x310
[   25.978254]  kunit_try_run_case+0x1a5/0x480
[   25.978723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.978916]  kthread+0x337/0x6f0
[   25.979036]  ret_from_fork+0x116/0x1d0
[   25.979165]  ret_from_fork_asm+0x1a/0x30
[   25.979300] 
[   25.979837] The buggy address belongs to the object at ffff88810623b200
[   25.979837]  which belongs to the cache kmalloc-64 of size 64
[   25.981390] The buggy address is located 0 bytes to the right of
[   25.981390]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.982681] 
[   25.982763] The buggy address belongs to the physical page:
[   25.982935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.983164] flags: 0x200000000000000(node=0|zone=2)
[   25.983658] page_type: f5(slab)
[   25.984387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.985209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.985581] page dumped because: kasan: bad access detected
[   25.986413] 
[   25.986508] Memory state around the buggy address:
[   25.986666]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.987598]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.988014] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.988236]                                      ^
[   25.988446]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.989581]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.989955] ==================================================================
[   27.102780] ==================================================================
[   27.103110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   27.103446] Read of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   27.103835] 
[   27.103982] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.104031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.104044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.104065] Call Trace:
[   27.104082]  <TASK>
[   27.104097]  dump_stack_lvl+0x73/0xb0
[   27.104138]  print_report+0xd1/0x610
[   27.104172]  ? __virt_addr_valid+0x1db/0x2d0
[   27.104197]  ? kasan_atomics_helper+0x5115/0x5450
[   27.104219]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.104258]  ? kasan_atomics_helper+0x5115/0x5450
[   27.104281]  kasan_report+0x141/0x180
[   27.104303]  ? kasan_atomics_helper+0x5115/0x5450
[   27.104341]  __asan_report_load8_noabort+0x18/0x20
[   27.104367]  kasan_atomics_helper+0x5115/0x5450
[   27.104390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.104413]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.104438]  ? kasan_atomics+0x152/0x310
[   27.104465]  kasan_atomics+0x1dc/0x310
[   27.104489]  ? __pfx_kasan_atomics+0x10/0x10
[   27.104514]  ? __pfx_read_tsc+0x10/0x10
[   27.104537]  ? ktime_get_ts64+0x86/0x230
[   27.104563]  kunit_try_run_case+0x1a5/0x480
[   27.104597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.104631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.104655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.104690]  ? __kthread_parkme+0x82/0x180
[   27.104711]  ? preempt_count_sub+0x50/0x80
[   27.104736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.104761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.104788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.104817]  kthread+0x337/0x6f0
[   27.104837]  ? trace_preempt_on+0x20/0xc0
[   27.104860]  ? __pfx_kthread+0x10/0x10
[   27.104883]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.104905]  ? calculate_sigpending+0x7b/0xa0
[   27.104930]  ? __pfx_kthread+0x10/0x10
[   27.104952]  ret_from_fork+0x116/0x1d0
[   27.104972]  ? __pfx_kthread+0x10/0x10
[   27.104993]  ret_from_fork_asm+0x1a/0x30
[   27.105025]  </TASK>
[   27.105036] 
[   27.111826] Allocated by task 314:
[   27.111953]  kasan_save_stack+0x45/0x70
[   27.112108]  kasan_save_track+0x18/0x40
[   27.112295]  kasan_save_alloc_info+0x3b/0x50
[   27.112533]  __kasan_kmalloc+0xb7/0xc0
[   27.112758]  __kmalloc_cache_noprof+0x189/0x420
[   27.112997]  kasan_atomics+0x95/0x310
[   27.113145]  kunit_try_run_case+0x1a5/0x480
[   27.113357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.113602]  kthread+0x337/0x6f0
[   27.113789]  ret_from_fork+0x116/0x1d0
[   27.113961]  ret_from_fork_asm+0x1a/0x30
[   27.114141] 
[   27.114244] The buggy address belongs to the object at ffff88810623b200
[   27.114244]  which belongs to the cache kmalloc-64 of size 64
[   27.114774] The buggy address is located 0 bytes to the right of
[   27.114774]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   27.115140] 
[   27.115208] The buggy address belongs to the physical page:
[   27.115420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   27.115850] flags: 0x200000000000000(node=0|zone=2)
[   27.116089] page_type: f5(slab)
[   27.116256] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.116613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.116887] page dumped because: kasan: bad access detected
[   27.117127] 
[   27.117192] Memory state around the buggy address:
[   27.117351]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.117696]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.118029] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.118342]                                      ^
[   27.118528]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.118855]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.119092] ==================================================================
[   25.770228] ==================================================================
[   25.770630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   25.771077] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.771316] 
[   25.771424] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.771497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.771511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.771533] Call Trace:
[   25.771546]  <TASK>
[   25.771560]  dump_stack_lvl+0x73/0xb0
[   25.771611]  print_report+0xd1/0x610
[   25.771634]  ? __virt_addr_valid+0x1db/0x2d0
[   25.771678]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.771699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.771725]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.771746]  kasan_report+0x141/0x180
[   25.771768]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.771812]  __asan_report_store4_noabort+0x1b/0x30
[   25.771837]  kasan_atomics_helper+0x4ba2/0x5450
[   25.771877]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.771900]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.771926]  ? kasan_atomics+0x152/0x310
[   25.771951]  kasan_atomics+0x1dc/0x310
[   25.772032]  ? __pfx_kasan_atomics+0x10/0x10
[   25.772059]  ? __pfx_read_tsc+0x10/0x10
[   25.772084]  ? ktime_get_ts64+0x86/0x230
[   25.772109]  kunit_try_run_case+0x1a5/0x480
[   25.772133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.772155]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.772179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.772202]  ? __kthread_parkme+0x82/0x180
[   25.772222]  ? preempt_count_sub+0x50/0x80
[   25.772263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.772288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.772324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.772351]  kthread+0x337/0x6f0
[   25.772371]  ? trace_preempt_on+0x20/0xc0
[   25.772395]  ? __pfx_kthread+0x10/0x10
[   25.772415]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.772437]  ? calculate_sigpending+0x7b/0xa0
[   25.772461]  ? __pfx_kthread+0x10/0x10
[   25.772483]  ret_from_fork+0x116/0x1d0
[   25.772503]  ? __pfx_kthread+0x10/0x10
[   25.772523]  ret_from_fork_asm+0x1a/0x30
[   25.772555]  </TASK>
[   25.772565] 
[   25.780348] Allocated by task 314:
[   25.780533]  kasan_save_stack+0x45/0x70
[   25.780824]  kasan_save_track+0x18/0x40
[   25.780983]  kasan_save_alloc_info+0x3b/0x50
[   25.781120]  __kasan_kmalloc+0xb7/0xc0
[   25.781349]  __kmalloc_cache_noprof+0x189/0x420
[   25.781559]  kasan_atomics+0x95/0x310
[   25.781832]  kunit_try_run_case+0x1a5/0x480
[   25.782029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.782212]  kthread+0x337/0x6f0
[   25.782394]  ret_from_fork+0x116/0x1d0
[   25.782577]  ret_from_fork_asm+0x1a/0x30
[   25.782797] 
[   25.783043] The buggy address belongs to the object at ffff88810623b200
[   25.783043]  which belongs to the cache kmalloc-64 of size 64
[   25.783556] The buggy address is located 0 bytes to the right of
[   25.783556]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.784075] 
[   25.784142] The buggy address belongs to the physical page:
[   25.784619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.784983] flags: 0x200000000000000(node=0|zone=2)
[   25.785141] page_type: f5(slab)
[   25.785258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.785656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.785984] page dumped because: kasan: bad access detected
[   25.786230] 
[   25.786327] Memory state around the buggy address:
[   25.786551]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.786836]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.787190] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.787488]                                      ^
[   25.787742]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.787953]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.788294] ==================================================================
[   26.247103] ==================================================================
[   26.249881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   26.250131] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.250370] 
[   26.250461] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.250512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.250526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.250549] Call Trace:
[   26.250569]  <TASK>
[   26.250588]  dump_stack_lvl+0x73/0xb0
[   26.250616]  print_report+0xd1/0x610
[   26.250638]  ? __virt_addr_valid+0x1db/0x2d0
[   26.250661]  ? kasan_atomics_helper+0xe78/0x5450
[   26.250683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.250709]  ? kasan_atomics_helper+0xe78/0x5450
[   26.250731]  kasan_report+0x141/0x180
[   26.250753]  ? kasan_atomics_helper+0xe78/0x5450
[   26.250778]  kasan_check_range+0x10c/0x1c0
[   26.250802]  __kasan_check_write+0x18/0x20
[   26.250826]  kasan_atomics_helper+0xe78/0x5450
[   26.250848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.250871]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.250896]  ? kasan_atomics+0x152/0x310
[   26.250922]  kasan_atomics+0x1dc/0x310
[   26.250944]  ? __pfx_kasan_atomics+0x10/0x10
[   26.250969]  ? __pfx_read_tsc+0x10/0x10
[   26.250994]  ? ktime_get_ts64+0x86/0x230
[   26.251021]  kunit_try_run_case+0x1a5/0x480
[   26.251045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.251069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.251093]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.251117]  ? __kthread_parkme+0x82/0x180
[   26.251138]  ? preempt_count_sub+0x50/0x80
[   26.251162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.251186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.251213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.251240]  kthread+0x337/0x6f0
[   26.251260]  ? trace_preempt_on+0x20/0xc0
[   26.251284]  ? __pfx_kthread+0x10/0x10
[   26.251305]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.251954]  ? calculate_sigpending+0x7b/0xa0
[   26.251992]  ? __pfx_kthread+0x10/0x10
[   26.252049]  ret_from_fork+0x116/0x1d0
[   26.252072]  ? __pfx_kthread+0x10/0x10
[   26.252095]  ret_from_fork_asm+0x1a/0x30
[   26.252129]  </TASK>
[   26.252140] 
[   26.264532] Allocated by task 314:
[   26.264690]  kasan_save_stack+0x45/0x70
[   26.264925]  kasan_save_track+0x18/0x40
[   26.265118]  kasan_save_alloc_info+0x3b/0x50
[   26.265291]  __kasan_kmalloc+0xb7/0xc0
[   26.265444]  __kmalloc_cache_noprof+0x189/0x420
[   26.265662]  kasan_atomics+0x95/0x310
[   26.265875]  kunit_try_run_case+0x1a5/0x480
[   26.266060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.266259]  kthread+0x337/0x6f0
[   26.266427]  ret_from_fork+0x116/0x1d0
[   26.266586]  ret_from_fork_asm+0x1a/0x30
[   26.266770] 
[   26.266842] The buggy address belongs to the object at ffff88810623b200
[   26.266842]  which belongs to the cache kmalloc-64 of size 64
[   26.267231] The buggy address is located 0 bytes to the right of
[   26.267231]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.267781] 
[   26.267854] The buggy address belongs to the physical page:
[   26.268020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.268515] flags: 0x200000000000000(node=0|zone=2)
[   26.268897] page_type: f5(slab)
[   26.269045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.269336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.270020] page dumped because: kasan: bad access detected
[   26.270460] 
[   26.270537] Memory state around the buggy address:
[   26.270919]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.271402]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.271920] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.272414]                                      ^
[   26.272812]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.273113]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.273415] ==================================================================
[   26.325844] ==================================================================
[   26.326106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   26.326451] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.326805] 
[   26.326914] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.326962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.326976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.326998] Call Trace:
[   26.327017]  <TASK>
[   26.327034]  dump_stack_lvl+0x73/0xb0
[   26.327062]  print_report+0xd1/0x610
[   26.327086]  ? __virt_addr_valid+0x1db/0x2d0
[   26.327112]  ? kasan_atomics_helper+0x1079/0x5450
[   26.327133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.327162]  ? kasan_atomics_helper+0x1079/0x5450
[   26.327186]  kasan_report+0x141/0x180
[   26.327210]  ? kasan_atomics_helper+0x1079/0x5450
[   26.327237]  kasan_check_range+0x10c/0x1c0
[   26.327261]  __kasan_check_write+0x18/0x20
[   26.327286]  kasan_atomics_helper+0x1079/0x5450
[   26.327321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.327344]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.327370]  ? kasan_atomics+0x152/0x310
[   26.327397]  kasan_atomics+0x1dc/0x310
[   26.327420]  ? __pfx_kasan_atomics+0x10/0x10
[   26.327445]  ? __pfx_read_tsc+0x10/0x10
[   26.327469]  ? ktime_get_ts64+0x86/0x230
[   26.327496]  kunit_try_run_case+0x1a5/0x480
[   26.327520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.327544]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.327568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.327613]  ? __kthread_parkme+0x82/0x180
[   26.327635]  ? preempt_count_sub+0x50/0x80
[   26.327660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.327684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.327712]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.327740]  kthread+0x337/0x6f0
[   26.327760]  ? trace_preempt_on+0x20/0xc0
[   26.327784]  ? __pfx_kthread+0x10/0x10
[   26.327806]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.327828]  ? calculate_sigpending+0x7b/0xa0
[   26.327853]  ? __pfx_kthread+0x10/0x10
[   26.327875]  ret_from_fork+0x116/0x1d0
[   26.327895]  ? __pfx_kthread+0x10/0x10
[   26.327917]  ret_from_fork_asm+0x1a/0x30
[   26.327950]  </TASK>
[   26.327961] 
[   26.335074] Allocated by task 314:
[   26.335246]  kasan_save_stack+0x45/0x70
[   26.335447]  kasan_save_track+0x18/0x40
[   26.335647]  kasan_save_alloc_info+0x3b/0x50
[   26.335814]  __kasan_kmalloc+0xb7/0xc0
[   26.335976]  __kmalloc_cache_noprof+0x189/0x420
[   26.336172]  kasan_atomics+0x95/0x310
[   26.336341]  kunit_try_run_case+0x1a5/0x480
[   26.336509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.336786]  kthread+0x337/0x6f0
[   26.336939]  ret_from_fork+0x116/0x1d0
[   26.337103]  ret_from_fork_asm+0x1a/0x30
[   26.337272] 
[   26.337348] The buggy address belongs to the object at ffff88810623b200
[   26.337348]  which belongs to the cache kmalloc-64 of size 64
[   26.337855] The buggy address is located 0 bytes to the right of
[   26.337855]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.338344] 
[   26.338437] The buggy address belongs to the physical page:
[   26.338663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.338981] flags: 0x200000000000000(node=0|zone=2)
[   26.339184] page_type: f5(slab)
[   26.339323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.339633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.339858] page dumped because: kasan: bad access detected
[   26.340025] 
[   26.340090] Memory state around the buggy address:
[   26.340242]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.340540]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.340879] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.341183]                                      ^
[   26.341434]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.341776]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.342082] ==================================================================
[   26.653753] ==================================================================
[   26.654135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   26.654514] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.654979] 
[   26.655066] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.655119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.655132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.655156] Call Trace:
[   26.655177]  <TASK>
[   26.655195]  dump_stack_lvl+0x73/0xb0
[   26.655369]  print_report+0xd1/0x610
[   26.655395]  ? __virt_addr_valid+0x1db/0x2d0
[   26.655419]  ? kasan_atomics_helper+0x177f/0x5450
[   26.655454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.655483]  ? kasan_atomics_helper+0x177f/0x5450
[   26.655507]  kasan_report+0x141/0x180
[   26.655533]  ? kasan_atomics_helper+0x177f/0x5450
[   26.655561]  kasan_check_range+0x10c/0x1c0
[   26.655618]  __kasan_check_write+0x18/0x20
[   26.655645]  kasan_atomics_helper+0x177f/0x5450
[   26.655668]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.655704]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.655730]  ? kasan_atomics+0x152/0x310
[   26.655758]  kasan_atomics+0x1dc/0x310
[   26.655781]  ? __pfx_kasan_atomics+0x10/0x10
[   26.655807]  ? __pfx_read_tsc+0x10/0x10
[   26.655873]  ? ktime_get_ts64+0x86/0x230
[   26.655900]  kunit_try_run_case+0x1a5/0x480
[   26.655937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.655960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.655984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.656008]  ? __kthread_parkme+0x82/0x180
[   26.656030]  ? preempt_count_sub+0x50/0x80
[   26.656055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.656080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.656108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.656135]  kthread+0x337/0x6f0
[   26.656157]  ? trace_preempt_on+0x20/0xc0
[   26.656182]  ? __pfx_kthread+0x10/0x10
[   26.656203]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.656225]  ? calculate_sigpending+0x7b/0xa0
[   26.656250]  ? __pfx_kthread+0x10/0x10
[   26.656272]  ret_from_fork+0x116/0x1d0
[   26.656293]  ? __pfx_kthread+0x10/0x10
[   26.656323]  ret_from_fork_asm+0x1a/0x30
[   26.656355]  </TASK>
[   26.656368] 
[   26.665164] Allocated by task 314:
[   26.665296]  kasan_save_stack+0x45/0x70
[   26.665489]  kasan_save_track+0x18/0x40
[   26.665788]  kasan_save_alloc_info+0x3b/0x50
[   26.666074]  __kasan_kmalloc+0xb7/0xc0
[   26.666384]  __kmalloc_cache_noprof+0x189/0x420
[   26.666541]  kasan_atomics+0x95/0x310
[   26.666714]  kunit_try_run_case+0x1a5/0x480
[   26.666961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.667127]  kthread+0x337/0x6f0
[   26.667384]  ret_from_fork+0x116/0x1d0
[   26.667765]  ret_from_fork_asm+0x1a/0x30
[   26.667938] 
[   26.668006] The buggy address belongs to the object at ffff88810623b200
[   26.668006]  which belongs to the cache kmalloc-64 of size 64
[   26.668367] The buggy address is located 0 bytes to the right of
[   26.668367]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.669025] 
[   26.669166] The buggy address belongs to the physical page:
[   26.669511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.669936] flags: 0x200000000000000(node=0|zone=2)
[   26.670096] page_type: f5(slab)
[   26.670394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.670865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.671339] page dumped because: kasan: bad access detected
[   26.671615] 
[   26.671756] Memory state around the buggy address:
[   26.672057]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.672324]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.672606] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.673087]                                      ^
[   26.673344]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.673662]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.674040] ==================================================================
[   26.582369] ==================================================================
[   26.582934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   26.583423] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.583767] 
[   26.583855] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.583938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.583952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.583986] Call Trace:
[   26.584007]  <TASK>
[   26.584025]  dump_stack_lvl+0x73/0xb0
[   26.584084]  print_report+0xd1/0x610
[   26.584107]  ? __virt_addr_valid+0x1db/0x2d0
[   26.584144]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.584166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.584193]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.584215]  kasan_report+0x141/0x180
[   26.584239]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.584265]  kasan_check_range+0x10c/0x1c0
[   26.584290]  __kasan_check_write+0x18/0x20
[   26.584323]  kasan_atomics_helper+0x15b6/0x5450
[   26.584347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.584370]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.584395]  ? kasan_atomics+0x152/0x310
[   26.584423]  kasan_atomics+0x1dc/0x310
[   26.584447]  ? __pfx_kasan_atomics+0x10/0x10
[   26.584472]  ? __pfx_read_tsc+0x10/0x10
[   26.584496]  ? ktime_get_ts64+0x86/0x230
[   26.584523]  kunit_try_run_case+0x1a5/0x480
[   26.584549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.584572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.584617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.584642]  ? __kthread_parkme+0x82/0x180
[   26.584664]  ? preempt_count_sub+0x50/0x80
[   26.584717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.584742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.584770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.584809]  kthread+0x337/0x6f0
[   26.584830]  ? trace_preempt_on+0x20/0xc0
[   26.584872]  ? __pfx_kthread+0x10/0x10
[   26.584903]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.584925]  ? calculate_sigpending+0x7b/0xa0
[   26.584979]  ? __pfx_kthread+0x10/0x10
[   26.585002]  ret_from_fork+0x116/0x1d0
[   26.585023]  ? __pfx_kthread+0x10/0x10
[   26.585045]  ret_from_fork_asm+0x1a/0x30
[   26.585078]  </TASK>
[   26.585089] 
[   26.598226] Allocated by task 314:
[   26.598548]  kasan_save_stack+0x45/0x70
[   26.599017]  kasan_save_track+0x18/0x40
[   26.599422]  kasan_save_alloc_info+0x3b/0x50
[   26.599843]  __kasan_kmalloc+0xb7/0xc0
[   26.600206]  __kmalloc_cache_noprof+0x189/0x420
[   26.600664]  kasan_atomics+0x95/0x310
[   26.601013]  kunit_try_run_case+0x1a5/0x480
[   26.601157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.601341]  kthread+0x337/0x6f0
[   26.601456]  ret_from_fork+0x116/0x1d0
[   26.601624]  ret_from_fork_asm+0x1a/0x30
[   26.601963] 
[   26.602145] The buggy address belongs to the object at ffff88810623b200
[   26.602145]  which belongs to the cache kmalloc-64 of size 64
[   26.603286] The buggy address is located 0 bytes to the right of
[   26.603286]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.604451] 
[   26.604664] The buggy address belongs to the physical page:
[   26.605103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.605358] flags: 0x200000000000000(node=0|zone=2)
[   26.605523] page_type: f5(slab)
[   26.606412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.607487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.607771] page dumped because: kasan: bad access detected
[   26.608327] 
[   26.608552] Memory state around the buggy address:
[   26.608997]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.609225]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.609448] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.609701]                                      ^
[   26.609944]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.610309]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.610572] ==================================================================
[   25.789067] ==================================================================
[   25.789429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   25.790316] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.790662] 
[   25.790783] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.790837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.790851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.790948] Call Trace:
[   25.790966]  <TASK>
[   25.790983]  dump_stack_lvl+0x73/0xb0
[   25.791015]  print_report+0xd1/0x610
[   25.791039]  ? __virt_addr_valid+0x1db/0x2d0
[   25.791064]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.791087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.791134]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.791157]  kasan_report+0x141/0x180
[   25.791181]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.791208]  __asan_report_load4_noabort+0x18/0x20
[   25.791233]  kasan_atomics_helper+0x4b88/0x5450
[   25.791258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.791300]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.791338]  ? kasan_atomics+0x152/0x310
[   25.791366]  kasan_atomics+0x1dc/0x310
[   25.791389]  ? __pfx_kasan_atomics+0x10/0x10
[   25.791414]  ? __pfx_read_tsc+0x10/0x10
[   25.791437]  ? ktime_get_ts64+0x86/0x230
[   25.791463]  kunit_try_run_case+0x1a5/0x480
[   25.791489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.791512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.791536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.791561]  ? __kthread_parkme+0x82/0x180
[   25.791583]  ? preempt_count_sub+0x50/0x80
[   25.791608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.791634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.791663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.791692]  kthread+0x337/0x6f0
[   25.791713]  ? trace_preempt_on+0x20/0xc0
[   25.791758]  ? __pfx_kthread+0x10/0x10
[   25.791780]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.791802]  ? calculate_sigpending+0x7b/0xa0
[   25.791828]  ? __pfx_kthread+0x10/0x10
[   25.791850]  ret_from_fork+0x116/0x1d0
[   25.791918]  ? __pfx_kthread+0x10/0x10
[   25.791941]  ret_from_fork_asm+0x1a/0x30
[   25.791974]  </TASK>
[   25.791986] 
[   25.800353] Allocated by task 314:
[   25.800539]  kasan_save_stack+0x45/0x70
[   25.800750]  kasan_save_track+0x18/0x40
[   25.800885]  kasan_save_alloc_info+0x3b/0x50
[   25.801076]  __kasan_kmalloc+0xb7/0xc0
[   25.801281]  __kmalloc_cache_noprof+0x189/0x420
[   25.801554]  kasan_atomics+0x95/0x310
[   25.801778]  kunit_try_run_case+0x1a5/0x480
[   25.802078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.802291]  kthread+0x337/0x6f0
[   25.802420]  ret_from_fork+0x116/0x1d0
[   25.802548]  ret_from_fork_asm+0x1a/0x30
[   25.802764] 
[   25.802861] The buggy address belongs to the object at ffff88810623b200
[   25.802861]  which belongs to the cache kmalloc-64 of size 64
[   25.803405] The buggy address is located 0 bytes to the right of
[   25.803405]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.804312] 
[   25.804400] The buggy address belongs to the physical page:
[   25.804647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.804886] flags: 0x200000000000000(node=0|zone=2)
[   25.805047] page_type: f5(slab)
[   25.805210] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.805736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.806064] page dumped because: kasan: bad access detected
[   25.806232] 
[   25.806298] Memory state around the buggy address:
[   25.806460]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.807249]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.807601] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.807975]                                      ^
[   25.808171]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.808547]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.808798] ==================================================================
[   26.471523] ==================================================================
[   26.471778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   26.472088] Read of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.472419] 
[   26.472523] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.472571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.472605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.472626] Call Trace:
[   26.472644]  <TASK>
[   26.472660]  dump_stack_lvl+0x73/0xb0
[   26.472689]  print_report+0xd1/0x610
[   26.472712]  ? __virt_addr_valid+0x1db/0x2d0
[   26.472737]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.472759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.472785]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.472808]  kasan_report+0x141/0x180
[   26.472830]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.472857]  kasan_check_range+0x10c/0x1c0
[   26.472882]  __kasan_check_read+0x15/0x20
[   26.472905]  kasan_atomics_helper+0x13b5/0x5450
[   26.472928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.472951]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.472976]  ? kasan_atomics+0x152/0x310
[   26.473002]  kasan_atomics+0x1dc/0x310
[   26.473025]  ? __pfx_kasan_atomics+0x10/0x10
[   26.473050]  ? __pfx_read_tsc+0x10/0x10
[   26.473073]  ? ktime_get_ts64+0x86/0x230
[   26.473099]  kunit_try_run_case+0x1a5/0x480
[   26.473124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.473146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.473170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.473194]  ? __kthread_parkme+0x82/0x180
[   26.473215]  ? preempt_count_sub+0x50/0x80
[   26.473241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.473266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.473293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.473331]  kthread+0x337/0x6f0
[   26.473352]  ? trace_preempt_on+0x20/0xc0
[   26.473376]  ? __pfx_kthread+0x10/0x10
[   26.473398]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.473421]  ? calculate_sigpending+0x7b/0xa0
[   26.473445]  ? __pfx_kthread+0x10/0x10
[   26.473467]  ret_from_fork+0x116/0x1d0
[   26.473488]  ? __pfx_kthread+0x10/0x10
[   26.473510]  ret_from_fork_asm+0x1a/0x30
[   26.473542]  </TASK>
[   26.473554] 
[   26.480427] Allocated by task 314:
[   26.480560]  kasan_save_stack+0x45/0x70
[   26.480718]  kasan_save_track+0x18/0x40
[   26.480856]  kasan_save_alloc_info+0x3b/0x50
[   26.481062]  __kasan_kmalloc+0xb7/0xc0
[   26.481248]  __kmalloc_cache_noprof+0x189/0x420
[   26.481474]  kasan_atomics+0x95/0x310
[   26.481690]  kunit_try_run_case+0x1a5/0x480
[   26.481899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.482157]  kthread+0x337/0x6f0
[   26.482331]  ret_from_fork+0x116/0x1d0
[   26.482517]  ret_from_fork_asm+0x1a/0x30
[   26.482742] 
[   26.482835] The buggy address belongs to the object at ffff88810623b200
[   26.482835]  which belongs to the cache kmalloc-64 of size 64
[   26.483310] The buggy address is located 0 bytes to the right of
[   26.483310]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.483703] 
[   26.483773] The buggy address belongs to the physical page:
[   26.483986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.484350] flags: 0x200000000000000(node=0|zone=2)
[   26.484606] page_type: f5(slab)
[   26.484775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.485113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.485453] page dumped because: kasan: bad access detected
[   26.485728] 
[   26.485805] Memory state around the buggy address:
[   26.486000]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.486211]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.486431] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.486663]                                      ^
[   26.486816]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.487025]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.487234] ==================================================================
[   26.438108] ==================================================================
[   26.438459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   26.438802] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.439110] 
[   26.439219] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.439269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.439282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.439303] Call Trace:
[   26.439329]  <TASK>
[   26.439345]  dump_stack_lvl+0x73/0xb0
[   26.439375]  print_report+0xd1/0x610
[   26.439398]  ? __virt_addr_valid+0x1db/0x2d0
[   26.439422]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.439444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.439472]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.439495]  kasan_report+0x141/0x180
[   26.439517]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.439544]  kasan_check_range+0x10c/0x1c0
[   26.439569]  __kasan_check_write+0x18/0x20
[   26.439613]  kasan_atomics_helper+0x12e6/0x5450
[   26.439637]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.439660]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.439687]  ? kasan_atomics+0x152/0x310
[   26.439714]  kasan_atomics+0x1dc/0x310
[   26.439737]  ? __pfx_kasan_atomics+0x10/0x10
[   26.439762]  ? __pfx_read_tsc+0x10/0x10
[   26.439785]  ? ktime_get_ts64+0x86/0x230
[   26.439811]  kunit_try_run_case+0x1a5/0x480
[   26.439835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.439859]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.439882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.439906]  ? __kthread_parkme+0x82/0x180
[   26.439928]  ? preempt_count_sub+0x50/0x80
[   26.439954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.439978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.440006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.440034]  kthread+0x337/0x6f0
[   26.440055]  ? trace_preempt_on+0x20/0xc0
[   26.440080]  ? __pfx_kthread+0x10/0x10
[   26.440101]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.440123]  ? calculate_sigpending+0x7b/0xa0
[   26.440148]  ? __pfx_kthread+0x10/0x10
[   26.440170]  ret_from_fork+0x116/0x1d0
[   26.440191]  ? __pfx_kthread+0x10/0x10
[   26.440213]  ret_from_fork_asm+0x1a/0x30
[   26.440244]  </TASK>
[   26.440255] 
[   26.447168] Allocated by task 314:
[   26.447360]  kasan_save_stack+0x45/0x70
[   26.447525]  kasan_save_track+0x18/0x40
[   26.447731]  kasan_save_alloc_info+0x3b/0x50
[   26.447878]  __kasan_kmalloc+0xb7/0xc0
[   26.448006]  __kmalloc_cache_noprof+0x189/0x420
[   26.448157]  kasan_atomics+0x95/0x310
[   26.448303]  kunit_try_run_case+0x1a5/0x480
[   26.448519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.448781]  kthread+0x337/0x6f0
[   26.448957]  ret_from_fork+0x116/0x1d0
[   26.449145]  ret_from_fork_asm+0x1a/0x30
[   26.449347] 
[   26.449443] The buggy address belongs to the object at ffff88810623b200
[   26.449443]  which belongs to the cache kmalloc-64 of size 64
[   26.449955] The buggy address is located 0 bytes to the right of
[   26.449955]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.450427] 
[   26.450503] The buggy address belongs to the physical page:
[   26.450776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.451073] flags: 0x200000000000000(node=0|zone=2)
[   26.451289] page_type: f5(slab)
[   26.451442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.451754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.452065] page dumped because: kasan: bad access detected
[   26.452268] 
[   26.452367] Memory state around the buggy address:
[   26.452563]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.452863]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.453074] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.453283]                                      ^
[   26.453514]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.453858]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.454167] ==================================================================
[   26.632767] ==================================================================
[   26.633271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   26.633569] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.633913] 
[   26.634086] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.634218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.634234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.634257] Call Trace:
[   26.634278]  <TASK>
[   26.634297]  dump_stack_lvl+0x73/0xb0
[   26.634338]  print_report+0xd1/0x610
[   26.634362]  ? __virt_addr_valid+0x1db/0x2d0
[   26.634388]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.634409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.634476]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.634499]  kasan_report+0x141/0x180
[   26.634533]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.634603]  kasan_check_range+0x10c/0x1c0
[   26.634629]  __kasan_check_write+0x18/0x20
[   26.634664]  kasan_atomics_helper+0x16e7/0x5450
[   26.634687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.634710]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.634737]  ? kasan_atomics+0x152/0x310
[   26.634763]  kasan_atomics+0x1dc/0x310
[   26.634787]  ? __pfx_kasan_atomics+0x10/0x10
[   26.634812]  ? __pfx_read_tsc+0x10/0x10
[   26.634835]  ? ktime_get_ts64+0x86/0x230
[   26.634861]  kunit_try_run_case+0x1a5/0x480
[   26.634886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.634909]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.634934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.634958]  ? __kthread_parkme+0x82/0x180
[   26.634979]  ? preempt_count_sub+0x50/0x80
[   26.635004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.635028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.635056]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.635084]  kthread+0x337/0x6f0
[   26.635104]  ? trace_preempt_on+0x20/0xc0
[   26.635129]  ? __pfx_kthread+0x10/0x10
[   26.635151]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.635173]  ? calculate_sigpending+0x7b/0xa0
[   26.635198]  ? __pfx_kthread+0x10/0x10
[   26.635221]  ret_from_fork+0x116/0x1d0
[   26.635242]  ? __pfx_kthread+0x10/0x10
[   26.635263]  ret_from_fork_asm+0x1a/0x30
[   26.635296]  </TASK>
[   26.635308] 
[   26.644270] Allocated by task 314:
[   26.644445]  kasan_save_stack+0x45/0x70
[   26.644640]  kasan_save_track+0x18/0x40
[   26.644881]  kasan_save_alloc_info+0x3b/0x50
[   26.645133]  __kasan_kmalloc+0xb7/0xc0
[   26.645262]  __kmalloc_cache_noprof+0x189/0x420
[   26.645567]  kasan_atomics+0x95/0x310
[   26.645854]  kunit_try_run_case+0x1a5/0x480
[   26.646066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.646342]  kthread+0x337/0x6f0
[   26.646459]  ret_from_fork+0x116/0x1d0
[   26.646584]  ret_from_fork_asm+0x1a/0x30
[   26.646781] 
[   26.646953] The buggy address belongs to the object at ffff88810623b200
[   26.646953]  which belongs to the cache kmalloc-64 of size 64
[   26.647831] The buggy address is located 0 bytes to the right of
[   26.647831]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.648349] 
[   26.648420] The buggy address belongs to the physical page:
[   26.648670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.649204] flags: 0x200000000000000(node=0|zone=2)
[   26.649447] page_type: f5(slab)
[   26.649614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.650065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.650347] page dumped because: kasan: bad access detected
[   26.650687] 
[   26.650856] Memory state around the buggy address:
[   26.651029]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.651342]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.651886] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.652135]                                      ^
[   26.652367]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.652805]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.653049] ==================================================================
[   26.516411] ==================================================================
[   26.517428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   26.518362] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.518799] 
[   26.518981] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.519037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.519051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.519382] Call Trace:
[   26.519409]  <TASK>
[   26.519432]  dump_stack_lvl+0x73/0xb0
[   26.519468]  print_report+0xd1/0x610
[   26.519493]  ? __virt_addr_valid+0x1db/0x2d0
[   26.519518]  ? kasan_atomics_helper+0x1467/0x5450
[   26.519540]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.519568]  ? kasan_atomics_helper+0x1467/0x5450
[   26.519592]  kasan_report+0x141/0x180
[   26.519629]  ? kasan_atomics_helper+0x1467/0x5450
[   26.519656]  kasan_check_range+0x10c/0x1c0
[   26.519680]  __kasan_check_write+0x18/0x20
[   26.519705]  kasan_atomics_helper+0x1467/0x5450
[   26.519730]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.519753]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.519780]  ? kasan_atomics+0x152/0x310
[   26.519807]  kasan_atomics+0x1dc/0x310
[   26.519830]  ? __pfx_kasan_atomics+0x10/0x10
[   26.519854]  ? __pfx_read_tsc+0x10/0x10
[   26.519881]  ? ktime_get_ts64+0x86/0x230
[   26.519908]  kunit_try_run_case+0x1a5/0x480
[   26.519934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.519958]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.519983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.520007]  ? __kthread_parkme+0x82/0x180
[   26.520029]  ? preempt_count_sub+0x50/0x80
[   26.520053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.520079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.520106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.520135]  kthread+0x337/0x6f0
[   26.520155]  ? trace_preempt_on+0x20/0xc0
[   26.520180]  ? __pfx_kthread+0x10/0x10
[   26.520201]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.520224]  ? calculate_sigpending+0x7b/0xa0
[   26.520249]  ? __pfx_kthread+0x10/0x10
[   26.520272]  ret_from_fork+0x116/0x1d0
[   26.520293]  ? __pfx_kthread+0x10/0x10
[   26.520335]  ret_from_fork_asm+0x1a/0x30
[   26.520369]  </TASK>
[   26.520381] 
[   26.532142] Allocated by task 314:
[   26.532287]  kasan_save_stack+0x45/0x70
[   26.532793]  kasan_save_track+0x18/0x40
[   26.533040]  kasan_save_alloc_info+0x3b/0x50
[   26.533255]  __kasan_kmalloc+0xb7/0xc0
[   26.533403]  __kmalloc_cache_noprof+0x189/0x420
[   26.533551]  kasan_atomics+0x95/0x310
[   26.534004]  kunit_try_run_case+0x1a5/0x480
[   26.534413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.534717]  kthread+0x337/0x6f0
[   26.534843]  ret_from_fork+0x116/0x1d0
[   26.534975]  ret_from_fork_asm+0x1a/0x30
[   26.535111] 
[   26.535180] The buggy address belongs to the object at ffff88810623b200
[   26.535180]  which belongs to the cache kmalloc-64 of size 64
[   26.536122] The buggy address is located 0 bytes to the right of
[   26.536122]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.537265] 
[   26.537432] The buggy address belongs to the physical page:
[   26.537964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.538702] flags: 0x200000000000000(node=0|zone=2)
[   26.539043] page_type: f5(slab)
[   26.539165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.539401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.539790] page dumped because: kasan: bad access detected
[   26.540343] 
[   26.540522] Memory state around the buggy address:
[   26.540988]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.541662]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.542280] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.542753]                                      ^
[   26.542910]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.543119]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.543334] ==================================================================
[   25.850104] ==================================================================
[   25.851015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   25.851262] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.851498] 
[   25.851586] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.851636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.851651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.851674] Call Trace:
[   25.851695]  <TASK>
[   25.851712]  dump_stack_lvl+0x73/0xb0
[   25.851742]  print_report+0xd1/0x610
[   25.851766]  ? __virt_addr_valid+0x1db/0x2d0
[   25.851792]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.851814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.851841]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.851864]  kasan_report+0x141/0x180
[   25.852099]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.852127]  __asan_report_load4_noabort+0x18/0x20
[   25.852154]  kasan_atomics_helper+0x4b54/0x5450
[   25.852177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.852201]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.852227]  ? kasan_atomics+0x152/0x310
[   25.852254]  kasan_atomics+0x1dc/0x310
[   25.852278]  ? __pfx_kasan_atomics+0x10/0x10
[   25.852315]  ? __pfx_read_tsc+0x10/0x10
[   25.852339]  ? ktime_get_ts64+0x86/0x230
[   25.852365]  kunit_try_run_case+0x1a5/0x480
[   25.852391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.852414]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.852440]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.852464]  ? __kthread_parkme+0x82/0x180
[   25.852486]  ? preempt_count_sub+0x50/0x80
[   25.852512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.852537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.852565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.852697]  kthread+0x337/0x6f0
[   25.852721]  ? trace_preempt_on+0x20/0xc0
[   25.852746]  ? __pfx_kthread+0x10/0x10
[   25.852768]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.852791]  ? calculate_sigpending+0x7b/0xa0
[   25.852816]  ? __pfx_kthread+0x10/0x10
[   25.852838]  ret_from_fork+0x116/0x1d0
[   25.852859]  ? __pfx_kthread+0x10/0x10
[   25.852896]  ret_from_fork_asm+0x1a/0x30
[   25.852929]  </TASK>
[   25.852941] 
[   25.863786] Allocated by task 314:
[   25.864126]  kasan_save_stack+0x45/0x70
[   25.864448]  kasan_save_track+0x18/0x40
[   25.864797]  kasan_save_alloc_info+0x3b/0x50
[   25.864946]  __kasan_kmalloc+0xb7/0xc0
[   25.865072]  __kmalloc_cache_noprof+0x189/0x420
[   25.865635]  kasan_atomics+0x95/0x310
[   25.866045]  kunit_try_run_case+0x1a5/0x480
[   25.866478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.867085]  kthread+0x337/0x6f0
[   25.867517]  ret_from_fork+0x116/0x1d0
[   25.867702]  ret_from_fork_asm+0x1a/0x30
[   25.867834] 
[   25.868139] The buggy address belongs to the object at ffff88810623b200
[   25.868139]  which belongs to the cache kmalloc-64 of size 64
[   25.869401] The buggy address is located 0 bytes to the right of
[   25.869401]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.870212] 
[   25.870290] The buggy address belongs to the physical page:
[   25.870477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.870726] flags: 0x200000000000000(node=0|zone=2)
[   25.870888] page_type: f5(slab)
[   25.871007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.871234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.871467] page dumped because: kasan: bad access detected
[   25.871633] 
[   25.871697] Memory state around the buggy address:
[   25.871850]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.872061]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.872273] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.873612]                                      ^
[   25.874200]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.875353]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.876161] ==================================================================
[   26.757125] ==================================================================
[   26.757468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   26.758025] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.758517] 
[   26.758616] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.758668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.758682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.758825] Call Trace:
[   26.758848]  <TASK>
[   26.758866]  dump_stack_lvl+0x73/0xb0
[   26.758898]  print_report+0xd1/0x610
[   26.758921]  ? __virt_addr_valid+0x1db/0x2d0
[   26.758946]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.758968]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.758994]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.759017]  kasan_report+0x141/0x180
[   26.759040]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.759067]  kasan_check_range+0x10c/0x1c0
[   26.759092]  __kasan_check_write+0x18/0x20
[   26.759116]  kasan_atomics_helper+0x1a7f/0x5450
[   26.759141]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.759164]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.759189]  ? kasan_atomics+0x152/0x310
[   26.759216]  kasan_atomics+0x1dc/0x310
[   26.759239]  ? __pfx_kasan_atomics+0x10/0x10
[   26.759264]  ? __pfx_read_tsc+0x10/0x10
[   26.759287]  ? ktime_get_ts64+0x86/0x230
[   26.759312]  kunit_try_run_case+0x1a5/0x480
[   26.759350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.759373]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.759397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.759420]  ? __kthread_parkme+0x82/0x180
[   26.759442]  ? preempt_count_sub+0x50/0x80
[   26.759467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.759492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.759520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.759549]  kthread+0x337/0x6f0
[   26.759569]  ? trace_preempt_on+0x20/0xc0
[   26.759595]  ? __pfx_kthread+0x10/0x10
[   26.759627]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.759649]  ? calculate_sigpending+0x7b/0xa0
[   26.759674]  ? __pfx_kthread+0x10/0x10
[   26.759696]  ret_from_fork+0x116/0x1d0
[   26.759717]  ? __pfx_kthread+0x10/0x10
[   26.759739]  ret_from_fork_asm+0x1a/0x30
[   26.759771]  </TASK>
[   26.759783] 
[   26.768876] Allocated by task 314:
[   26.770985]  kasan_save_stack+0x45/0x70
[   26.771633]  kasan_save_track+0x18/0x40
[   26.771790]  kasan_save_alloc_info+0x3b/0x50
[   26.771933]  __kasan_kmalloc+0xb7/0xc0
[   26.772057]  __kmalloc_cache_noprof+0x189/0x420
[   26.772202]  kasan_atomics+0x95/0x310
[   26.772357]  kunit_try_run_case+0x1a5/0x480
[   26.772494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.772661]  kthread+0x337/0x6f0
[   26.772774]  ret_from_fork+0x116/0x1d0
[   26.773408]  ret_from_fork_asm+0x1a/0x30
[   26.773760] 
[   26.773899] The buggy address belongs to the object at ffff88810623b200
[   26.773899]  which belongs to the cache kmalloc-64 of size 64
[   26.774294] The buggy address is located 0 bytes to the right of
[   26.774294]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.775273] 
[   26.775565] The buggy address belongs to the physical page:
[   26.775873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.776233] flags: 0x200000000000000(node=0|zone=2)
[   26.776784] page_type: f5(slab)
[   26.777102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.777883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.778222] page dumped because: kasan: bad access detected
[   26.778466] 
[   26.778551] Memory state around the buggy address:
[   26.779113]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.779646]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.780138] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.780726]                                      ^
[   26.780959]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.781253]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.781822] ==================================================================
[   26.912525] ==================================================================
[   26.912973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   26.913396] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.913820] 
[   26.913978] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.914031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.914046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.914101] Call Trace:
[   26.914120]  <TASK>
[   26.914140]  dump_stack_lvl+0x73/0xb0
[   26.914183]  print_report+0xd1/0x610
[   26.914206]  ? __virt_addr_valid+0x1db/0x2d0
[   26.914231]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.914254]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.914281]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.914304]  kasan_report+0x141/0x180
[   26.914370]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.914399]  kasan_check_range+0x10c/0x1c0
[   26.914448]  __kasan_check_write+0x18/0x20
[   26.914472]  kasan_atomics_helper+0x1eaa/0x5450
[   26.914495]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.914543]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.914568]  ? kasan_atomics+0x152/0x310
[   26.914621]  kasan_atomics+0x1dc/0x310
[   26.914645]  ? __pfx_kasan_atomics+0x10/0x10
[   26.914669]  ? __pfx_read_tsc+0x10/0x10
[   26.914693]  ? ktime_get_ts64+0x86/0x230
[   26.914718]  kunit_try_run_case+0x1a5/0x480
[   26.914743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.914765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.914819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.914854]  ? __kthread_parkme+0x82/0x180
[   26.914887]  ? preempt_count_sub+0x50/0x80
[   26.914913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.914937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.914964]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.914992]  kthread+0x337/0x6f0
[   26.915013]  ? trace_preempt_on+0x20/0xc0
[   26.915037]  ? __pfx_kthread+0x10/0x10
[   26.915059]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.915081]  ? calculate_sigpending+0x7b/0xa0
[   26.915105]  ? __pfx_kthread+0x10/0x10
[   26.915128]  ret_from_fork+0x116/0x1d0
[   26.915147]  ? __pfx_kthread+0x10/0x10
[   26.915169]  ret_from_fork_asm+0x1a/0x30
[   26.915201]  </TASK>
[   26.915213] 
[   26.922731] Allocated by task 314:
[   26.922898]  kasan_save_stack+0x45/0x70
[   26.923094]  kasan_save_track+0x18/0x40
[   26.923227]  kasan_save_alloc_info+0x3b/0x50
[   26.923380]  __kasan_kmalloc+0xb7/0xc0
[   26.923564]  __kmalloc_cache_noprof+0x189/0x420
[   26.923805]  kasan_atomics+0x95/0x310
[   26.923987]  kunit_try_run_case+0x1a5/0x480
[   26.924158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.924339]  kthread+0x337/0x6f0
[   26.924505]  ret_from_fork+0x116/0x1d0
[   26.924726]  ret_from_fork_asm+0x1a/0x30
[   26.924933] 
[   26.925015] The buggy address belongs to the object at ffff88810623b200
[   26.925015]  which belongs to the cache kmalloc-64 of size 64
[   26.925527] The buggy address is located 0 bytes to the right of
[   26.925527]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.926067] 
[   26.926186] The buggy address belongs to the physical page:
[   26.926413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.926786] flags: 0x200000000000000(node=0|zone=2)
[   26.927002] page_type: f5(slab)
[   26.927121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.927359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.927602] page dumped because: kasan: bad access detected
[   26.927875] 
[   26.927964] Memory state around the buggy address:
[   26.928184]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.928509]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.928871] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.929181]                                      ^
[   26.929411]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.929653]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.929861] ==================================================================
[   27.024762] ==================================================================
[   27.025397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   27.025634] Read of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   27.025897] 
[   27.026110] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   27.026163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.026177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.026199] Call Trace:
[   27.026219]  <TASK>
[   27.026234]  dump_stack_lvl+0x73/0xb0
[   27.026264]  print_report+0xd1/0x610
[   27.026288]  ? __virt_addr_valid+0x1db/0x2d0
[   27.026313]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.026350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.026379]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.026403]  kasan_report+0x141/0x180
[   27.026426]  ? kasan_atomics_helper+0x4fb2/0x5450
[   27.026453]  __asan_report_load8_noabort+0x18/0x20
[   27.026478]  kasan_atomics_helper+0x4fb2/0x5450
[   27.026502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.026525]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.026550]  ? kasan_atomics+0x152/0x310
[   27.026577]  kasan_atomics+0x1dc/0x310
[   27.026601]  ? __pfx_kasan_atomics+0x10/0x10
[   27.026627]  ? __pfx_read_tsc+0x10/0x10
[   27.026651]  ? ktime_get_ts64+0x86/0x230
[   27.026676]  kunit_try_run_case+0x1a5/0x480
[   27.026701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.026725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.026750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.026774]  ? __kthread_parkme+0x82/0x180
[   27.026795]  ? preempt_count_sub+0x50/0x80
[   27.026820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.026845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.026873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.026901]  kthread+0x337/0x6f0
[   27.026921]  ? trace_preempt_on+0x20/0xc0
[   27.026946]  ? __pfx_kthread+0x10/0x10
[   27.026968]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.026991]  ? calculate_sigpending+0x7b/0xa0
[   27.027016]  ? __pfx_kthread+0x10/0x10
[   27.027037]  ret_from_fork+0x116/0x1d0
[   27.027057]  ? __pfx_kthread+0x10/0x10
[   27.027079]  ret_from_fork_asm+0x1a/0x30
[   27.027110]  </TASK>
[   27.027122] 
[   27.041469] Allocated by task 314:
[   27.041716]  kasan_save_stack+0x45/0x70
[   27.041880]  kasan_save_track+0x18/0x40
[   27.042017]  kasan_save_alloc_info+0x3b/0x50
[   27.042241]  __kasan_kmalloc+0xb7/0xc0
[   27.042432]  __kmalloc_cache_noprof+0x189/0x420
[   27.042646]  kasan_atomics+0x95/0x310
[   27.042914]  kunit_try_run_case+0x1a5/0x480
[   27.043072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.043305]  kthread+0x337/0x6f0
[   27.043432]  ret_from_fork+0x116/0x1d0
[   27.043595]  ret_from_fork_asm+0x1a/0x30
[   27.043787] 
[   27.043890] The buggy address belongs to the object at ffff88810623b200
[   27.043890]  which belongs to the cache kmalloc-64 of size 64
[   27.044298] The buggy address is located 0 bytes to the right of
[   27.044298]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   27.045038] 
[   27.045123] The buggy address belongs to the physical page:
[   27.045295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   27.045683] flags: 0x200000000000000(node=0|zone=2)
[   27.045927] page_type: f5(slab)
[   27.046094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.046404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.046711] page dumped because: kasan: bad access detected
[   27.046965] 
[   27.047049] Memory state around the buggy address:
[   27.047290]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.047543]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.047898] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.048162]                                      ^
[   27.048313]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.048625]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.048928] ==================================================================
[   26.675535] ==================================================================
[   26.675912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   26.676346] Write of size 8 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.676718] 
[   26.676824] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.676908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.676922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.676946] Call Trace:
[   26.676979]  <TASK>
[   26.676998]  dump_stack_lvl+0x73/0xb0
[   26.677030]  print_report+0xd1/0x610
[   26.677053]  ? __virt_addr_valid+0x1db/0x2d0
[   26.677078]  ? kasan_atomics_helper+0x1818/0x5450
[   26.677101]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.677128]  ? kasan_atomics_helper+0x1818/0x5450
[   26.677151]  kasan_report+0x141/0x180
[   26.677173]  ? kasan_atomics_helper+0x1818/0x5450
[   26.677200]  kasan_check_range+0x10c/0x1c0
[   26.677256]  __kasan_check_write+0x18/0x20
[   26.677281]  kasan_atomics_helper+0x1818/0x5450
[   26.677324]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.677347]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.677374]  ? kasan_atomics+0x152/0x310
[   26.677401]  kasan_atomics+0x1dc/0x310
[   26.677424]  ? __pfx_kasan_atomics+0x10/0x10
[   26.677449]  ? __pfx_read_tsc+0x10/0x10
[   26.677473]  ? ktime_get_ts64+0x86/0x230
[   26.677500]  kunit_try_run_case+0x1a5/0x480
[   26.677525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.677548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.677573]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.677596]  ? __kthread_parkme+0x82/0x180
[   26.677636]  ? preempt_count_sub+0x50/0x80
[   26.677661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.677686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.677714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.677742]  kthread+0x337/0x6f0
[   26.677763]  ? trace_preempt_on+0x20/0xc0
[   26.677788]  ? __pfx_kthread+0x10/0x10
[   26.677810]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.677833]  ? calculate_sigpending+0x7b/0xa0
[   26.677858]  ? __pfx_kthread+0x10/0x10
[   26.677880]  ret_from_fork+0x116/0x1d0
[   26.677901]  ? __pfx_kthread+0x10/0x10
[   26.677922]  ret_from_fork_asm+0x1a/0x30
[   26.677955]  </TASK>
[   26.677966] 
[   26.685622] Allocated by task 314:
[   26.685836]  kasan_save_stack+0x45/0x70
[   26.686031]  kasan_save_track+0x18/0x40
[   26.686158]  kasan_save_alloc_info+0x3b/0x50
[   26.686297]  __kasan_kmalloc+0xb7/0xc0
[   26.686489]  __kmalloc_cache_noprof+0x189/0x420
[   26.686795]  kasan_atomics+0x95/0x310
[   26.686990]  kunit_try_run_case+0x1a5/0x480
[   26.687256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.687593]  kthread+0x337/0x6f0
[   26.687752]  ret_from_fork+0x116/0x1d0
[   26.687981]  ret_from_fork_asm+0x1a/0x30
[   26.688194] 
[   26.688280] The buggy address belongs to the object at ffff88810623b200
[   26.688280]  which belongs to the cache kmalloc-64 of size 64
[   26.688913] The buggy address is located 0 bytes to the right of
[   26.688913]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.689362] 
[   26.689432] The buggy address belongs to the physical page:
[   26.689596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.689834] flags: 0x200000000000000(node=0|zone=2)
[   26.690066] page_type: f5(slab)
[   26.690286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.690654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.691086] page dumped because: kasan: bad access detected
[   26.691251] 
[   26.691371] Memory state around the buggy address:
[   26.691641]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.691940]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.692211] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.692426]                                      ^
[   26.692580]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.693072]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.693396] ==================================================================
[   26.387354] ==================================================================
[   26.387700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   26.388028] Read of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   26.388530] 
[   26.388673] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   26.388725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.388739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.388760] Call Trace:
[   26.388778]  <TASK>
[   26.388794]  dump_stack_lvl+0x73/0xb0
[   26.388824]  print_report+0xd1/0x610
[   26.388847]  ? __virt_addr_valid+0x1db/0x2d0
[   26.388873]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.388895]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.388921]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.388944]  kasan_report+0x141/0x180
[   26.388967]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.388994]  __asan_report_load4_noabort+0x18/0x20
[   26.389019]  kasan_atomics_helper+0x4a02/0x5450
[   26.389043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.389066]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.389092]  ? kasan_atomics+0x152/0x310
[   26.389119]  kasan_atomics+0x1dc/0x310
[   26.389142]  ? __pfx_kasan_atomics+0x10/0x10
[   26.389167]  ? __pfx_read_tsc+0x10/0x10
[   26.389191]  ? ktime_get_ts64+0x86/0x230
[   26.389217]  kunit_try_run_case+0x1a5/0x480
[   26.389242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.389265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.389290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.389326]  ? __kthread_parkme+0x82/0x180
[   26.389349]  ? preempt_count_sub+0x50/0x80
[   26.389373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.389398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.389426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.389454]  kthread+0x337/0x6f0
[   26.389476]  ? trace_preempt_on+0x20/0xc0
[   26.389500]  ? __pfx_kthread+0x10/0x10
[   26.389522]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.389544]  ? calculate_sigpending+0x7b/0xa0
[   26.389569]  ? __pfx_kthread+0x10/0x10
[   26.389621]  ret_from_fork+0x116/0x1d0
[   26.389643]  ? __pfx_kthread+0x10/0x10
[   26.389664]  ret_from_fork_asm+0x1a/0x30
[   26.389696]  </TASK>
[   26.389709] 
[   26.396427] Allocated by task 314:
[   26.396645]  kasan_save_stack+0x45/0x70
[   26.396843]  kasan_save_track+0x18/0x40
[   26.397029]  kasan_save_alloc_info+0x3b/0x50
[   26.397235]  __kasan_kmalloc+0xb7/0xc0
[   26.397424]  __kmalloc_cache_noprof+0x189/0x420
[   26.397649]  kasan_atomics+0x95/0x310
[   26.397809]  kunit_try_run_case+0x1a5/0x480
[   26.397996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.398200]  kthread+0x337/0x6f0
[   26.398377]  ret_from_fork+0x116/0x1d0
[   26.398533]  ret_from_fork_asm+0x1a/0x30
[   26.398746] 
[   26.398835] The buggy address belongs to the object at ffff88810623b200
[   26.398835]  which belongs to the cache kmalloc-64 of size 64
[   26.399288] The buggy address is located 0 bytes to the right of
[   26.399288]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   26.399764] 
[   26.399862] The buggy address belongs to the physical page:
[   26.400113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   26.400475] flags: 0x200000000000000(node=0|zone=2)
[   26.400687] page_type: f5(slab)
[   26.400837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.401157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.401429] page dumped because: kasan: bad access detected
[   26.401604] 
[   26.401679] Memory state around the buggy address:
[   26.401831]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.402041]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.402294] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.402649]                                      ^
[   26.402869]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.403172]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.403485] ==================================================================
[   25.935012] ==================================================================
[   25.935700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   25.936051] Write of size 4 at addr ffff88810623b230 by task kunit_try_catch/314
[   25.936650] 
[   25.936763] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) 
[   25.936816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.936831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.937053] Call Trace:
[   25.937079]  <TASK>
[   25.937095]  dump_stack_lvl+0x73/0xb0
[   25.937128]  print_report+0xd1/0x610
[   25.937151]  ? __virt_addr_valid+0x1db/0x2d0
[   25.937177]  ? kasan_atomics_helper+0x565/0x5450
[   25.937198]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.937225]  ? kasan_atomics_helper+0x565/0x5450
[   25.937248]  kasan_report+0x141/0x180
[   25.937272]  ? kasan_atomics_helper+0x565/0x5450
[   25.937300]  kasan_check_range+0x10c/0x1c0
[   25.937339]  __kasan_check_write+0x18/0x20
[   25.937364]  kasan_atomics_helper+0x565/0x5450
[   25.937387]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.937411]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.937437]  ? kasan_atomics+0x152/0x310
[   25.937463]  kasan_atomics+0x1dc/0x310
[   25.937487]  ? __pfx_kasan_atomics+0x10/0x10
[   25.937512]  ? __pfx_read_tsc+0x10/0x10
[   25.937538]  ? ktime_get_ts64+0x86/0x230
[   25.937565]  kunit_try_run_case+0x1a5/0x480
[   25.937618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.937642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.937667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.937691]  ? __kthread_parkme+0x82/0x180
[   25.937713]  ? preempt_count_sub+0x50/0x80
[   25.937737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.937762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.937790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.937818]  kthread+0x337/0x6f0
[   25.937839]  ? trace_preempt_on+0x20/0xc0
[   25.937885]  ? __pfx_kthread+0x10/0x10
[   25.937907]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.937929]  ? calculate_sigpending+0x7b/0xa0
[   25.937954]  ? __pfx_kthread+0x10/0x10
[   25.937976]  ret_from_fork+0x116/0x1d0
[   25.937997]  ? __pfx_kthread+0x10/0x10
[   25.938018]  ret_from_fork_asm+0x1a/0x30
[   25.938050]  </TASK>
[   25.938062] 
[   25.949113] Allocated by task 314:
[   25.949272]  kasan_save_stack+0x45/0x70
[   25.949469]  kasan_save_track+0x18/0x40
[   25.949915]  kasan_save_alloc_info+0x3b/0x50
[   25.950276]  __kasan_kmalloc+0xb7/0xc0
[   25.950441]  __kmalloc_cache_noprof+0x189/0x420
[   25.950688]  kasan_atomics+0x95/0x310
[   25.951029]  kunit_try_run_case+0x1a5/0x480
[   25.951351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.951612]  kthread+0x337/0x6f0
[   25.951770]  ret_from_fork+0x116/0x1d0
[   25.951943]  ret_from_fork_asm+0x1a/0x30
[   25.952138] 
[   25.952213] The buggy address belongs to the object at ffff88810623b200
[   25.952213]  which belongs to the cache kmalloc-64 of size 64
[   25.953160] The buggy address is located 0 bytes to the right of
[   25.953160]  allocated 48-byte region [ffff88810623b200, ffff88810623b230)
[   25.953941] 
[   25.954042] The buggy address belongs to the physical page:
[   25.954262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10623b
[   25.954617] flags: 0x200000000000000(node=0|zone=2)
[   25.954841] page_type: f5(slab)
[   25.954992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.955720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.956117] page dumped because: kasan: bad access detected
[   25.956341] 
[   25.956433] Memory state around the buggy address:
[   25.956903]  ffff88810623b100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.957288]  ffff88810623b180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.957760] >ffff88810623b200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.958099]                                      ^
[   25.958296]  ffff88810623b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.958908]  ffff88810623b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.959158] ==================================================================