Hay
Date
July 17, 2025, 10:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.184694] ==================================================================
[   32.184988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   32.185103] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.185203] 
[   32.185260] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.185347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.185377] Hardware name: linux,dummy-virt (DT)
[   32.185410] Call trace:
[   32.185432]  show_stack+0x20/0x38 (C)
[   32.185497]  dump_stack_lvl+0x8c/0xd0
[   32.185703]  print_report+0x118/0x5d0
[   32.185790]  kasan_report+0xdc/0x128
[   32.185839]  __asan_report_load4_noabort+0x20/0x30
[   32.186052]  kasan_atomics_helper+0x3e04/0x4858
[   32.186127]  kasan_atomics+0x198/0x2e0
[   32.186177]  kunit_try_run_case+0x170/0x3f0
[   32.186225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.186279]  kthread+0x328/0x630
[   32.186324]  ret_from_fork+0x10/0x20
[   32.186387] 
[   32.186407] Allocated by task 296:
[   32.186455]  kasan_save_stack+0x3c/0x68
[   32.186502]  kasan_save_track+0x20/0x40
[   32.186541]  kasan_save_alloc_info+0x40/0x58
[   32.186581]  __kasan_kmalloc+0xd4/0xd8
[   32.186634]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.186677]  kasan_atomics+0xb8/0x2e0
[   32.186715]  kunit_try_run_case+0x170/0x3f0
[   32.186827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.186892]  kthread+0x328/0x630
[   32.186926]  ret_from_fork+0x10/0x20
[   32.186964] 
[   32.187240] The buggy address belongs to the object at fff00000c9abb900
[   32.187240]  which belongs to the cache kmalloc-64 of size 64
[   32.187308] The buggy address is located 0 bytes to the right of
[   32.187308]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.187374] 
[   32.187414] The buggy address belongs to the physical page:
[   32.187533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.187627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.187751] page_type: f5(slab)
[   32.187798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.187850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.187892] page dumped because: kasan: bad access detected
[   32.187926] 
[   32.187947] Memory state around the buggy address:
[   32.187979]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.188024]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.188079] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.188119]                                      ^
[   32.188154]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.188199]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.188239] ==================================================================
[   32.325877] ==================================================================
[   32.325927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   32.325997] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.326210] 
[   32.326243] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.326408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.326609] Hardware name: linux,dummy-virt (DT)
[   32.326666] Call trace:
[   32.326799]  show_stack+0x20/0x38 (C)
[   32.326873]  dump_stack_lvl+0x8c/0xd0
[   32.326925]  print_report+0x118/0x5d0
[   32.326988]  kasan_report+0xdc/0x128
[   32.327083]  __asan_report_load8_noabort+0x20/0x30
[   32.327139]  kasan_atomics_helper+0x3e10/0x4858
[   32.327192]  kasan_atomics+0x198/0x2e0
[   32.327250]  kunit_try_run_case+0x170/0x3f0
[   32.327300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.327354]  kthread+0x328/0x630
[   32.327408]  ret_from_fork+0x10/0x20
[   32.327458] 
[   32.327478] Allocated by task 296:
[   32.327516]  kasan_save_stack+0x3c/0x68
[   32.327557]  kasan_save_track+0x20/0x40
[   32.327595]  kasan_save_alloc_info+0x40/0x58
[   32.327644]  __kasan_kmalloc+0xd4/0xd8
[   32.327681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.327724]  kasan_atomics+0xb8/0x2e0
[   32.327780]  kunit_try_run_case+0x170/0x3f0
[   32.327828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.327879]  kthread+0x328/0x630
[   32.327914]  ret_from_fork+0x10/0x20
[   32.327952] 
[   32.327972] The buggy address belongs to the object at fff00000c9abb900
[   32.327972]  which belongs to the cache kmalloc-64 of size 64
[   32.328030] The buggy address is located 0 bytes to the right of
[   32.328030]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.328344] 
[   32.328396] The buggy address belongs to the physical page:
[   32.328446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.328515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.328562] page_type: f5(slab)
[   32.328603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.328653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.328826] page dumped because: kasan: bad access detected
[   32.329013] 
[   32.329112] Memory state around the buggy address:
[   32.329247]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.329311]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.329355] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.329538]                                      ^
[   32.329586]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.329748]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.329931] ==================================================================
[   32.188375] ==================================================================
[   32.188638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   32.188692] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.188743] 
[   32.188811] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.189203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.189233] Hardware name: linux,dummy-virt (DT)
[   32.189266] Call trace:
[   32.189291]  show_stack+0x20/0x38 (C)
[   32.189343]  dump_stack_lvl+0x8c/0xd0
[   32.189391]  print_report+0x118/0x5d0
[   32.189437]  kasan_report+0xdc/0x128
[   32.189482]  kasan_check_range+0x100/0x1a8
[   32.189530]  __kasan_check_read+0x20/0x30
[   32.189578]  kasan_atomics_helper+0xdd4/0x4858
[   32.189630]  kasan_atomics+0x198/0x2e0
[   32.189676]  kunit_try_run_case+0x170/0x3f0
[   32.189725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.189778]  kthread+0x328/0x630
[   32.189823]  ret_from_fork+0x10/0x20
[   32.189872] 
[   32.189893] Allocated by task 296:
[   32.189922]  kasan_save_stack+0x3c/0x68
[   32.189963]  kasan_save_track+0x20/0x40
[   32.190001]  kasan_save_alloc_info+0x40/0x58
[   32.190042]  __kasan_kmalloc+0xd4/0xd8
[   32.190146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.190212]  kasan_atomics+0xb8/0x2e0
[   32.190411]  kunit_try_run_case+0x170/0x3f0
[   32.190495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.190562]  kthread+0x328/0x630
[   32.190598]  ret_from_fork+0x10/0x20
[   32.190636] 
[   32.190667] The buggy address belongs to the object at fff00000c9abb900
[   32.190667]  which belongs to the cache kmalloc-64 of size 64
[   32.190724] The buggy address is located 0 bytes to the right of
[   32.190724]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.191089] 
[   32.191211] The buggy address belongs to the physical page:
[   32.191270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.191368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.191694] page_type: f5(slab)
[   32.191765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.191843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.191997] page dumped because: kasan: bad access detected
[   32.192098] 
[   32.192158] Memory state around the buggy address:
[   32.192286]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.192471]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.192544] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.192706]                                      ^
[   32.192791]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.192847]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.192887] ==================================================================
[   32.247860] ==================================================================
[   32.247929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   32.248010] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.248072] 
[   32.248130] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.248243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.248301] Hardware name: linux,dummy-virt (DT)
[   32.248383] Call trace:
[   32.248593]  show_stack+0x20/0x38 (C)
[   32.248721]  dump_stack_lvl+0x8c/0xd0
[   32.248830]  print_report+0x118/0x5d0
[   32.248976]  kasan_report+0xdc/0x128
[   32.249121]  kasan_check_range+0x100/0x1a8
[   32.249189]  __kasan_check_write+0x20/0x30
[   32.249250]  kasan_atomics_helper+0x12d8/0x4858
[   32.249302]  kasan_atomics+0x198/0x2e0
[   32.249350]  kunit_try_run_case+0x170/0x3f0
[   32.249399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.249452]  kthread+0x328/0x630
[   32.249496]  ret_from_fork+0x10/0x20
[   32.249554] 
[   32.249574] Allocated by task 296:
[   32.249604]  kasan_save_stack+0x3c/0x68
[   32.249645]  kasan_save_track+0x20/0x40
[   32.249723]  kasan_save_alloc_info+0x40/0x58
[   32.249801]  __kasan_kmalloc+0xd4/0xd8
[   32.249890]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.249968]  kasan_atomics+0xb8/0x2e0
[   32.250040]  kunit_try_run_case+0x170/0x3f0
[   32.250145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.250203]  kthread+0x328/0x630
[   32.250238]  ret_from_fork+0x10/0x20
[   32.250274] 
[   32.250296] The buggy address belongs to the object at fff00000c9abb900
[   32.250296]  which belongs to the cache kmalloc-64 of size 64
[   32.250355] The buggy address is located 0 bytes to the right of
[   32.250355]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.250420] 
[   32.250478] The buggy address belongs to the physical page:
[   32.250556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.250615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.250719] page_type: f5(slab)
[   32.250784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.250864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.250907] page dumped because: kasan: bad access detected
[   32.250941] 
[   32.250961] Memory state around the buggy address:
[   32.250995]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.251037]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.251091] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.251131]                                      ^
[   32.251166]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.251210]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.251250] ==================================================================
[   32.173498] ==================================================================
[   32.173551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   32.173603] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.173656] 
[   32.173685] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.173769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.173798] Hardware name: linux,dummy-virt (DT)
[   32.173832] Call trace:
[   32.173855]  show_stack+0x20/0x38 (C)
[   32.173904]  dump_stack_lvl+0x8c/0xd0
[   32.173954]  print_report+0x118/0x5d0
[   32.174001]  kasan_report+0xdc/0x128
[   32.174046]  __asan_report_load4_noabort+0x20/0x30
[   32.174113]  kasan_atomics_helper+0x3dd8/0x4858
[   32.174165]  kasan_atomics+0x198/0x2e0
[   32.174214]  kunit_try_run_case+0x170/0x3f0
[   32.174262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.174317]  kthread+0x328/0x630
[   32.174360]  ret_from_fork+0x10/0x20
[   32.174411] 
[   32.174430] Allocated by task 296:
[   32.174459]  kasan_save_stack+0x3c/0x68
[   32.174498]  kasan_save_track+0x20/0x40
[   32.174536]  kasan_save_alloc_info+0x40/0x58
[   32.174574]  __kasan_kmalloc+0xd4/0xd8
[   32.174609]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.174652]  kasan_atomics+0xb8/0x2e0
[   32.174691]  kunit_try_run_case+0x170/0x3f0
[   32.174729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.174777]  kthread+0x328/0x630
[   32.174810]  ret_from_fork+0x10/0x20
[   32.174848] 
[   32.174868] The buggy address belongs to the object at fff00000c9abb900
[   32.174868]  which belongs to the cache kmalloc-64 of size 64
[   32.174925] The buggy address is located 0 bytes to the right of
[   32.174925]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.174992] 
[   32.175014] The buggy address belongs to the physical page:
[   32.175046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.175174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.175252] page_type: f5(slab)
[   32.175292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.175344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.175386] page dumped because: kasan: bad access detected
[   32.175420] 
[   32.175440] Memory state around the buggy address:
[   32.175473]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.176022]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.176436] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.176491]                                      ^
[   32.176530]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.176736]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.177217] ==================================================================
[   32.238239] ==================================================================
[   32.238277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   32.238323] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.238371] 
[   32.238399] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.238491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.238521] Hardware name: linux,dummy-virt (DT)
[   32.238551] Call trace:
[   32.238574]  show_stack+0x20/0x38 (C)
[   32.238622]  dump_stack_lvl+0x8c/0xd0
[   32.238669]  print_report+0x118/0x5d0
[   32.238716]  kasan_report+0xdc/0x128
[   32.238760]  kasan_check_range+0x100/0x1a8
[   32.238813]  __kasan_check_write+0x20/0x30
[   32.238861]  kasan_atomics_helper+0x1190/0x4858
[   32.238912]  kasan_atomics+0x198/0x2e0
[   32.238961]  kunit_try_run_case+0x170/0x3f0
[   32.239009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.239132]  kthread+0x328/0x630
[   32.239239]  ret_from_fork+0x10/0x20
[   32.239325] 
[   32.239394] Allocated by task 296:
[   32.239435]  kasan_save_stack+0x3c/0x68
[   32.239475]  kasan_save_track+0x20/0x40
[   32.239513]  kasan_save_alloc_info+0x40/0x58
[   32.239553]  __kasan_kmalloc+0xd4/0xd8
[   32.239588]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.239631]  kasan_atomics+0xb8/0x2e0
[   32.239671]  kunit_try_run_case+0x170/0x3f0
[   32.239710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.239755]  kthread+0x328/0x630
[   32.239791]  ret_from_fork+0x10/0x20
[   32.239847] 
[   32.239880] The buggy address belongs to the object at fff00000c9abb900
[   32.239880]  which belongs to the cache kmalloc-64 of size 64
[   32.239939] The buggy address is located 0 bytes to the right of
[   32.239939]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.240004] 
[   32.240084] The buggy address belongs to the physical page:
[   32.240162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.240261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.240405] page_type: f5(slab)
[   32.240480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.240866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.240935] page dumped because: kasan: bad access detected
[   32.240990] 
[   32.241021] Memory state around the buggy address:
[   32.241064]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.241106]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.241149] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.241189]                                      ^
[   32.241223]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.241266]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.241305] ==================================================================
[   32.215953] ==================================================================
[   32.215992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   32.216038] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.216099] 
[   32.216128] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.216211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.216238] Hardware name: linux,dummy-virt (DT)
[   32.216270] Call trace:
[   32.216292]  show_stack+0x20/0x38 (C)
[   32.216339]  dump_stack_lvl+0x8c/0xd0
[   32.216403]  print_report+0x118/0x5d0
[   32.216449]  kasan_report+0xdc/0x128
[   32.216495]  kasan_check_range+0x100/0x1a8
[   32.216614]  __kasan_check_write+0x20/0x30
[   32.216731]  kasan_atomics_helper+0xf88/0x4858
[   32.216884]  kasan_atomics+0x198/0x2e0
[   32.216954]  kunit_try_run_case+0x170/0x3f0
[   32.217003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.217066]  kthread+0x328/0x630
[   32.217111]  ret_from_fork+0x10/0x20
[   32.217172] 
[   32.217241] Allocated by task 296:
[   32.217347]  kasan_save_stack+0x3c/0x68
[   32.217446]  kasan_save_track+0x20/0x40
[   32.217545]  kasan_save_alloc_info+0x40/0x58
[   32.217875]  __kasan_kmalloc+0xd4/0xd8
[   32.217915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.217991]  kasan_atomics+0xb8/0x2e0
[   32.218037]  kunit_try_run_case+0x170/0x3f0
[   32.218086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.218193]  kthread+0x328/0x630
[   32.218280]  ret_from_fork+0x10/0x20
[   32.218402] 
[   32.218462] The buggy address belongs to the object at fff00000c9abb900
[   32.218462]  which belongs to the cache kmalloc-64 of size 64
[   32.218555] The buggy address is located 0 bytes to the right of
[   32.218555]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.218669] 
[   32.218956] The buggy address belongs to the physical page:
[   32.219024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.219152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.219256] page_type: f5(slab)
[   32.219371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.219423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.219464] page dumped because: kasan: bad access detected
[   32.219724] 
[   32.219768] Memory state around the buggy address:
[   32.219892]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.219973]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.220039] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.220135]                                      ^
[   32.220215]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.220415]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.220613] ==================================================================
[   32.244908] ==================================================================
[   32.244954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   32.245003] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.245067] 
[   32.245096] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.245179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.245207] Hardware name: linux,dummy-virt (DT)
[   32.245261] Call trace:
[   32.245291]  show_stack+0x20/0x38 (C)
[   32.245366]  dump_stack_lvl+0x8c/0xd0
[   32.245436]  print_report+0x118/0x5d0
[   32.245481]  kasan_report+0xdc/0x128
[   32.245525]  kasan_check_range+0x100/0x1a8
[   32.245573]  __kasan_check_write+0x20/0x30
[   32.245656]  kasan_atomics_helper+0x126c/0x4858
[   32.245710]  kasan_atomics+0x198/0x2e0
[   32.246074]  kunit_try_run_case+0x170/0x3f0
[   32.246124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.246178]  kthread+0x328/0x630
[   32.246238]  ret_from_fork+0x10/0x20
[   32.246295] 
[   32.246344] Allocated by task 296:
[   32.246392]  kasan_save_stack+0x3c/0x68
[   32.246439]  kasan_save_track+0x20/0x40
[   32.246477]  kasan_save_alloc_info+0x40/0x58
[   32.246519]  __kasan_kmalloc+0xd4/0xd8
[   32.246554]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.246598]  kasan_atomics+0xb8/0x2e0
[   32.246637]  kunit_try_run_case+0x170/0x3f0
[   32.246676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.246721]  kthread+0x328/0x630
[   32.246756]  ret_from_fork+0x10/0x20
[   32.246803] 
[   32.246825] The buggy address belongs to the object at fff00000c9abb900
[   32.246825]  which belongs to the cache kmalloc-64 of size 64
[   32.246883] The buggy address is located 0 bytes to the right of
[   32.246883]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.246982] 
[   32.247032] The buggy address belongs to the physical page:
[   32.247075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.247154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.247220] page_type: f5(slab)
[   32.247297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.247366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.247408] page dumped because: kasan: bad access detected
[   32.247441] 
[   32.247461] Memory state around the buggy address:
[   32.247495]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.247537]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.247581] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.247621]                                      ^
[   32.247655]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.247698]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.247737] ==================================================================
[   32.318384] ==================================================================
[   32.318436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   32.318664] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.318822] 
[   32.318857] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.318945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.319210] Hardware name: linux,dummy-virt (DT)
[   32.319256] Call trace:
[   32.319383]  show_stack+0x20/0x38 (C)
[   32.319458]  dump_stack_lvl+0x8c/0xd0
[   32.319526]  print_report+0x118/0x5d0
[   32.319827]  kasan_report+0xdc/0x128
[   32.319904]  kasan_check_range+0x100/0x1a8
[   32.320185]  __kasan_check_write+0x20/0x30
[   32.320251]  kasan_atomics_helper+0x16d0/0x4858
[   32.320304]  kasan_atomics+0x198/0x2e0
[   32.320385]  kunit_try_run_case+0x170/0x3f0
[   32.320557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.320677]  kthread+0x328/0x630
[   32.320836]  ret_from_fork+0x10/0x20
[   32.321041] 
[   32.321155] Allocated by task 296:
[   32.321286]  kasan_save_stack+0x3c/0x68
[   32.321335]  kasan_save_track+0x20/0x40
[   32.321396]  kasan_save_alloc_info+0x40/0x58
[   32.321443]  __kasan_kmalloc+0xd4/0xd8
[   32.321757]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.321918]  kasan_atomics+0xb8/0x2e0
[   32.322171]  kunit_try_run_case+0x170/0x3f0
[   32.322268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.322415]  kthread+0x328/0x630
[   32.322593]  ret_from_fork+0x10/0x20
[   32.322672] 
[   32.322700] The buggy address belongs to the object at fff00000c9abb900
[   32.322700]  which belongs to the cache kmalloc-64 of size 64
[   32.323000] The buggy address is located 0 bytes to the right of
[   32.323000]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.323181] 
[   32.323278] The buggy address belongs to the physical page:
[   32.323571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.323689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.323740] page_type: f5(slab)
[   32.323790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.324022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.324213] page dumped because: kasan: bad access detected
[   32.324405] 
[   32.324439] Memory state around the buggy address:
[   32.324474]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.324520]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.324805] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.324939]                                      ^
[   32.324986]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.325187]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.325399] ==================================================================
[   32.101897] ==================================================================
[   32.101955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   32.102044] Read of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.102110] 
[   32.102142] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.102226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.102256] Hardware name: linux,dummy-virt (DT)
[   32.102288] Call trace:
[   32.102312]  show_stack+0x20/0x38 (C)
[   32.102369]  dump_stack_lvl+0x8c/0xd0
[   32.102421]  print_report+0x118/0x5d0
[   32.102467]  kasan_report+0xdc/0x128
[   32.102513]  __asan_report_load4_noabort+0x20/0x30
[   32.102574]  kasan_atomics_helper+0x42d8/0x4858
[   32.102637]  kasan_atomics+0x198/0x2e0
[   32.102702]  kunit_try_run_case+0x170/0x3f0
[   32.102751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.103135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.103640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.103689] page_type: f5(slab)
[   32.103729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.106267]  kasan_atomics_helper+0x934/0x4858
[   32.107144]  kasan_save_alloc_info+0x40/0x58
[   32.107230]  __kasan_kmalloc+0xd4/0xd8
[   32.107561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.107700]  kasan_atomics+0xb8/0x2e0
[   32.107744]  kunit_try_run_case+0x170/0x3f0
[   32.107818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.107921]  kthread+0x328/0x630
[   32.107958]  ret_from_fork+0x10/0x20
[   32.107996] 
[   32.108019] The buggy address belongs to the object at fff00000c9abb900
[   32.108019]  which belongs to the cache kmalloc-64 of size 64
[   32.108093] The buggy address is located 0 bytes to the right of
[   32.108093]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.108264] 
[   32.108326] The buggy address belongs to the physical page:
[   32.108485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.108569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.108756] page_type: f5(slab)
[   32.109095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.109207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.109281] page dumped because: kasan: bad access detected
[   32.109316] 
[   32.109383] Memory state around the buggy address:
[   32.109442]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.109490]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.109535] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.109573]                                      ^
[   32.109608]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.112617]  kasan_atomics_helper+0x99c/0x4858
[   32.114952] The buggy address is located 0 bytes to the right of
[   32.114952]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.124347]  ret_from_fork+0x10/0x20
[   32.125255] The buggy address is located 0 bytes to the right of
[   32.125255]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.125341] 
[   32.125364] The buggy address belongs to the physical page:
[   32.125397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.125450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.125536] page_type: f5(slab)
[   32.125959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.126025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.126127] page dumped because: kasan: bad access detected
[   32.126192] 
[   32.126339] Memory state around the buggy address:
[   32.126483]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.126591]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.126637] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.126677]                                      ^
[   32.126712]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.127619] ==================================================================
[   32.274455] ==================================================================
[   32.274506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   32.274557] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.274608] 
[   32.274648] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.274735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.274764] Hardware name: linux,dummy-virt (DT)
[   32.274809] Call trace:
[   32.274833]  show_stack+0x20/0x38 (C)
[   32.274885]  dump_stack_lvl+0x8c/0xd0
[   32.274934]  print_report+0x118/0x5d0
[   32.274985]  kasan_report+0xdc/0x128
[   32.275033]  kasan_check_range+0x100/0x1a8
[   32.275102]  __kasan_check_write+0x20/0x30
[   32.275157]  kasan_atomics_helper+0x14e4/0x4858
[   32.275218]  kasan_atomics+0x198/0x2e0
[   32.275275]  kunit_try_run_case+0x170/0x3f0
[   32.275324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.275377]  kthread+0x328/0x630
[   32.275421]  ret_from_fork+0x10/0x20
[   32.275469] 
[   32.275489] Allocated by task 296:
[   32.275519]  kasan_save_stack+0x3c/0x68
[   32.275559]  kasan_save_track+0x20/0x40
[   32.275597]  kasan_save_alloc_info+0x40/0x58
[   32.275644]  __kasan_kmalloc+0xd4/0xd8
[   32.275682]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.275733]  kasan_atomics+0xb8/0x2e0
[   32.275773]  kunit_try_run_case+0x170/0x3f0
[   32.275812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.275858]  kthread+0x328/0x630
[   32.275894]  ret_from_fork+0x10/0x20
[   32.275932] 
[   32.275953] The buggy address belongs to the object at fff00000c9abb900
[   32.275953]  which belongs to the cache kmalloc-64 of size 64
[   32.276012] The buggy address is located 0 bytes to the right of
[   32.276012]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.276538] 
[   32.276634] The buggy address belongs to the physical page:
[   32.276672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.276727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.276775] page_type: f5(slab)
[   32.277196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.277290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.277488] page dumped because: kasan: bad access detected
[   32.277604] 
[   32.277674] Memory state around the buggy address:
[   32.277882]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.277928]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.277972] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.278047]                                      ^
[   32.278130]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.278189]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.278301] ==================================================================
[   32.208766] ==================================================================
[   32.208817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   32.208869] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.208921] 
[   32.208951] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.209035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.209078] Hardware name: linux,dummy-virt (DT)
[   32.209111] Call trace:
[   32.209136]  show_stack+0x20/0x38 (C)
[   32.209187]  dump_stack_lvl+0x8c/0xd0
[   32.209252]  print_report+0x118/0x5d0
[   32.209299]  kasan_report+0xdc/0x128
[   32.209343]  kasan_check_range+0x100/0x1a8
[   32.209408]  __kasan_check_write+0x20/0x30
[   32.209473]  kasan_atomics_helper+0xeb8/0x4858
[   32.209526]  kasan_atomics+0x198/0x2e0
[   32.209585]  kunit_try_run_case+0x170/0x3f0
[   32.209633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.209687]  kthread+0x328/0x630
[   32.209731]  ret_from_fork+0x10/0x20
[   32.209779] 
[   32.209801] Allocated by task 296:
[   32.209831]  kasan_save_stack+0x3c/0x68
[   32.212070]  kasan_save_track+0x20/0x40
[   32.212124]  kasan_save_alloc_info+0x40/0x58
[   32.212165]  __kasan_kmalloc+0xd4/0xd8
[   32.212202]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.212245]  kasan_atomics+0xb8/0x2e0
[   32.212283]  kunit_try_run_case+0x170/0x3f0
[   32.212323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.212369]  kthread+0x328/0x630
[   32.212416]  ret_from_fork+0x10/0x20
[   32.212455] 
[   32.212476] The buggy address belongs to the object at fff00000c9abb900
[   32.212476]  which belongs to the cache kmalloc-64 of size 64
[   32.212533] The buggy address is located 0 bytes to the right of
[   32.212533]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.212598] 
[   32.212619] The buggy address belongs to the physical page:
[   32.212651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.212704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.212753] page_type: f5(slab)
[   32.212791] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.212841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.212882] page dumped because: kasan: bad access detected
[   32.212916] 
[   32.212936] Memory state around the buggy address:
[   32.212968]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.213014]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.213067] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.213184]                                      ^
[   32.213271]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.213329]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.213369] ==================================================================
[   32.330550] ==================================================================
[   32.330664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   32.330750] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.330810] 
[   32.331123] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.331221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.331258] Hardware name: linux,dummy-virt (DT)
[   32.331323] Call trace:
[   32.331349]  show_stack+0x20/0x38 (C)
[   32.331437]  dump_stack_lvl+0x8c/0xd0
[   32.331504]  print_report+0x118/0x5d0
[   32.331659]  kasan_report+0xdc/0x128
[   32.331721]  kasan_check_range+0x100/0x1a8
[   32.331863]  __kasan_check_write+0x20/0x30
[   32.331926]  kasan_atomics_helper+0x175c/0x4858
[   32.331985]  kasan_atomics+0x198/0x2e0
[   32.332119]  kunit_try_run_case+0x170/0x3f0
[   32.332193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.332452]  kthread+0x328/0x630
[   32.332763]  ret_from_fork+0x10/0x20
[   32.333221] 
[   32.333288] Allocated by task 296:
[   32.333428]  kasan_save_stack+0x3c/0x68
[   32.333515]  kasan_save_track+0x20/0x40
[   32.333656]  kasan_save_alloc_info+0x40/0x58
[   32.333777]  __kasan_kmalloc+0xd4/0xd8
[   32.333930]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.334081]  kasan_atomics+0xb8/0x2e0
[   32.334185]  kunit_try_run_case+0x170/0x3f0
[   32.334397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.334559]  kthread+0x328/0x630
[   32.334639]  ret_from_fork+0x10/0x20
[   32.334696] 
[   32.334719] The buggy address belongs to the object at fff00000c9abb900
[   32.334719]  which belongs to the cache kmalloc-64 of size 64
[   32.334988] The buggy address is located 0 bytes to the right of
[   32.334988]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.335174] 
[   32.335245] The buggy address belongs to the physical page:
[   32.335544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.335688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.335774] page_type: f5(slab)
[   32.335920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.336142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.336284] page dumped because: kasan: bad access detected
[   32.336351] 
[   32.336559] Memory state around the buggy address:
[   32.336607]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.336653]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.336890] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.337027]                                      ^
[   32.337106]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.337382]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.337490] ==================================================================
[   32.231434] ==================================================================
[   32.231487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   32.231538] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.231589] 
[   32.231618] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.231703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.231731] Hardware name: linux,dummy-virt (DT)
[   32.231764] Call trace:
[   32.231789]  show_stack+0x20/0x38 (C)
[   32.231836]  dump_stack_lvl+0x8c/0xd0
[   32.231883]  print_report+0x118/0x5d0
[   32.231929]  kasan_report+0xdc/0x128
[   32.231973]  kasan_check_range+0x100/0x1a8
[   32.232022]  __kasan_check_write+0x20/0x30
[   32.232086]  kasan_atomics_helper+0x10c0/0x4858
[   32.232138]  kasan_atomics+0x198/0x2e0
[   32.232186]  kunit_try_run_case+0x170/0x3f0
[   32.232233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.232287]  kthread+0x328/0x630
[   32.232330]  ret_from_fork+0x10/0x20
[   32.232637] 
[   32.232734] Allocated by task 296:
[   32.232914]  kasan_save_stack+0x3c/0x68
[   32.232982]  kasan_save_track+0x20/0x40
[   32.233030]  kasan_save_alloc_info+0x40/0x58
[   32.233079]  __kasan_kmalloc+0xd4/0xd8
[   32.233116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.233160]  kasan_atomics+0xb8/0x2e0
[   32.233298]  kunit_try_run_case+0x170/0x3f0
[   32.233418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.233498]  kthread+0x328/0x630
[   32.233556]  ret_from_fork+0x10/0x20
[   32.233684] 
[   32.233754] The buggy address belongs to the object at fff00000c9abb900
[   32.233754]  which belongs to the cache kmalloc-64 of size 64
[   32.233855] The buggy address is located 0 bytes to the right of
[   32.233855]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.233921] 
[   32.233942] The buggy address belongs to the physical page:
[   32.233973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.234024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.234082] page_type: f5(slab)
[   32.234121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.234295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.234444] page dumped because: kasan: bad access detected
[   32.234534] 
[   32.234594] Memory state around the buggy address:
[   32.234692]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.234791]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.235006] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.235077]                                      ^
[   32.235255]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235334]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235406] ==================================================================
[   32.251994] ==================================================================
[   32.252044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   32.252128] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.252186] 
[   32.252233] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.252344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.252403] Hardware name: linux,dummy-virt (DT)
[   32.252507] Call trace:
[   32.252633]  show_stack+0x20/0x38 (C)
[   32.252741]  dump_stack_lvl+0x8c/0xd0
[   32.252849]  print_report+0x118/0x5d0
[   32.252929]  kasan_report+0xdc/0x128
[   32.252999]  kasan_check_range+0x100/0x1a8
[   32.253048]  __kasan_check_write+0x20/0x30
[   32.253106]  kasan_atomics_helper+0x1384/0x4858
[   32.253157]  kasan_atomics+0x198/0x2e0
[   32.253205]  kunit_try_run_case+0x170/0x3f0
[   32.253254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.253307]  kthread+0x328/0x630
[   32.253352]  ret_from_fork+0x10/0x20
[   32.253408] 
[   32.253428] Allocated by task 296:
[   32.253458]  kasan_save_stack+0x3c/0x68
[   32.253499]  kasan_save_track+0x20/0x40
[   32.253561]  kasan_save_alloc_info+0x40/0x58
[   32.253652]  __kasan_kmalloc+0xd4/0xd8
[   32.253710]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.253786]  kasan_atomics+0xb8/0x2e0
[   32.253914]  kunit_try_run_case+0x170/0x3f0
[   32.254001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.254069]  kthread+0x328/0x630
[   32.254103]  ret_from_fork+0x10/0x20
[   32.254141] 
[   32.254164] The buggy address belongs to the object at fff00000c9abb900
[   32.254164]  which belongs to the cache kmalloc-64 of size 64
[   32.254223] The buggy address is located 0 bytes to the right of
[   32.254223]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.254306] 
[   32.254385] The buggy address belongs to the physical page:
[   32.254484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.254564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.254657] page_type: f5(slab)
[   32.254746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.254805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.254847] page dumped because: kasan: bad access detected
[   32.254879] 
[   32.254899] Memory state around the buggy address:
[   32.254932]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.254975]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.255019] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.255068]                                      ^
[   32.255102]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.255201]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.255298] ==================================================================
[   32.203914] ==================================================================
[   32.203966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   32.204019] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.204088] 
[   32.204121] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.204208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.204248] Hardware name: linux,dummy-virt (DT)
[   32.204292] Call trace:
[   32.204323]  show_stack+0x20/0x38 (C)
[   32.204373]  dump_stack_lvl+0x8c/0xd0
[   32.204429]  print_report+0x118/0x5d0
[   32.204476]  kasan_report+0xdc/0x128
[   32.204521]  __asan_report_store8_noabort+0x20/0x30
[   32.204574]  kasan_atomics_helper+0x3e5c/0x4858
[   32.204625]  kasan_atomics+0x198/0x2e0
[   32.204673]  kunit_try_run_case+0x170/0x3f0
[   32.204730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.204799]  kthread+0x328/0x630
[   32.204849]  ret_from_fork+0x10/0x20
[   32.204898] 
[   32.204928] Allocated by task 296:
[   32.204974]  kasan_save_stack+0x3c/0x68
[   32.205024]  kasan_save_track+0x20/0x40
[   32.205075]  kasan_save_alloc_info+0x40/0x58
[   32.205115]  __kasan_kmalloc+0xd4/0xd8
[   32.205151]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.205193]  kasan_atomics+0xb8/0x2e0
[   32.205234]  kunit_try_run_case+0x170/0x3f0
[   32.205274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.205319]  kthread+0x328/0x630
[   32.205355]  ret_from_fork+0x10/0x20
[   32.205405] 
[   32.205450] The buggy address belongs to the object at fff00000c9abb900
[   32.205450]  which belongs to the cache kmalloc-64 of size 64
[   32.205509] The buggy address is located 0 bytes to the right of
[   32.205509]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.205575] 
[   32.205595] The buggy address belongs to the physical page:
[   32.205625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.205679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.206035] page_type: f5(slab)
[   32.206094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.206183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.206272] page dumped because: kasan: bad access detected
[   32.206366] 
[   32.206613] Memory state around the buggy address:
[   32.206671]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.206759]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.206841] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.206977]                                      ^
[   32.207042]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.207127]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.207291] ==================================================================
[   32.268373] ==================================================================
[   32.268441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   32.268493] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.268544] 
[   32.268573] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.268659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.268687] Hardware name: linux,dummy-virt (DT)
[   32.268719] Call trace:
[   32.268741]  show_stack+0x20/0x38 (C)
[   32.268790]  dump_stack_lvl+0x8c/0xd0
[   32.268838]  print_report+0x118/0x5d0
[   32.268882]  kasan_report+0xdc/0x128
[   32.268927]  kasan_check_range+0x100/0x1a8
[   32.268975]  __kasan_check_write+0x20/0x30
[   32.269076]  kasan_atomics_helper+0x147c/0x4858
[   32.269184]  kasan_atomics+0x198/0x2e0
[   32.269280]  kunit_try_run_case+0x170/0x3f0
[   32.269329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.269382]  kthread+0x328/0x630
[   32.269427]  ret_from_fork+0x10/0x20
[   32.269638] 
[   32.270047] Allocated by task 296:
[   32.270391]  kasan_save_stack+0x3c/0x68
[   32.270454]  kasan_save_track+0x20/0x40
[   32.270541]  kasan_save_alloc_info+0x40/0x58
[   32.270645]  __kasan_kmalloc+0xd4/0xd8
[   32.270754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.271018]  kasan_atomics+0xb8/0x2e0
[   32.271133]  kunit_try_run_case+0x170/0x3f0
[   32.271222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.271271]  kthread+0x328/0x630
[   32.271313]  ret_from_fork+0x10/0x20
[   32.271559] 
[   32.271654] The buggy address belongs to the object at fff00000c9abb900
[   32.271654]  which belongs to the cache kmalloc-64 of size 64
[   32.271762] The buggy address is located 0 bytes to the right of
[   32.271762]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.271964] 
[   32.272135] The buggy address belongs to the physical page:
[   32.272201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.272289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.272385] page_type: f5(slab)
[   32.272449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.272503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.272552] page dumped because: kasan: bad access detected
[   32.272585] 
[   32.272605] Memory state around the buggy address:
[   32.272639]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.272933]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.273073] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.273170]                                      ^
[   32.273480]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273557]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.273644] ==================================================================
[   32.255729] ==================================================================
[   32.255774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   32.255823] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.255874] 
[   32.255903] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.256005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.256035] Hardware name: linux,dummy-virt (DT)
[   32.256096] Call trace:
[   32.256121]  show_stack+0x20/0x38 (C)
[   32.256177]  dump_stack_lvl+0x8c/0xd0
[   32.256249]  print_report+0x118/0x5d0
[   32.256335]  kasan_report+0xdc/0x128
[   32.256415]  __asan_report_load8_noabort+0x20/0x30
[   32.256518]  kasan_atomics_helper+0x3f04/0x4858
[   32.256627]  kasan_atomics+0x198/0x2e0
[   32.256750]  kunit_try_run_case+0x170/0x3f0
[   32.256813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.256888]  kthread+0x328/0x630
[   32.256933]  ret_from_fork+0x10/0x20
[   32.256983] 
[   32.257003] Allocated by task 296:
[   32.257032]  kasan_save_stack+0x3c/0x68
[   32.257081]  kasan_save_track+0x20/0x40
[   32.257119]  kasan_save_alloc_info+0x40/0x58
[   32.257159]  __kasan_kmalloc+0xd4/0xd8
[   32.257194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.257238]  kasan_atomics+0xb8/0x2e0
[   32.257277]  kunit_try_run_case+0x170/0x3f0
[   32.257351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.257421]  kthread+0x328/0x630
[   32.257477]  ret_from_fork+0x10/0x20
[   32.257572] 
[   32.257650] The buggy address belongs to the object at fff00000c9abb900
[   32.257650]  which belongs to the cache kmalloc-64 of size 64
[   32.257750] The buggy address is located 0 bytes to the right of
[   32.257750]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.258099] 
[   32.258168] The buggy address belongs to the physical page:
[   32.258263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.258400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.258468] page_type: f5(slab)
[   32.258507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.258559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.258755] page dumped because: kasan: bad access detected
[   32.258900] 
[   32.258976] Memory state around the buggy address:
[   32.259078]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.259177]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.259276] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.259518]                                      ^
[   32.259661]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.259730]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.259813] ==================================================================
[   32.289650] ==================================================================
[   32.289702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   32.290003] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.291213] 
[   32.291300] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.291411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.291508] Hardware name: linux,dummy-virt (DT)
[   32.291543] Call trace:
[   32.291567]  show_stack+0x20/0x38 (C)
[   32.291624]  dump_stack_lvl+0x8c/0xd0
[   32.291680]  print_report+0x118/0x5d0
[   32.291726]  kasan_report+0xdc/0x128
[   32.291772]  kasan_check_range+0x100/0x1a8
[   32.292086]  __kasan_check_write+0x20/0x30
[   32.292289]  kasan_atomics_helper+0x15b4/0x4858
[   32.292390]  kasan_atomics+0x198/0x2e0
[   32.292521]  kunit_try_run_case+0x170/0x3f0
[   32.292702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.292763]  kthread+0x328/0x630
[   32.292940]  ret_from_fork+0x10/0x20
[   32.293000] 
[   32.293021] Allocated by task 296:
[   32.293052]  kasan_save_stack+0x3c/0x68
[   32.293200]  kasan_save_track+0x20/0x40
[   32.293395]  kasan_save_alloc_info+0x40/0x58
[   32.293480]  __kasan_kmalloc+0xd4/0xd8
[   32.293872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.293989]  kasan_atomics+0xb8/0x2e0
[   32.294291]  kunit_try_run_case+0x170/0x3f0
[   32.294404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.294504]  kthread+0x328/0x630
[   32.294590]  ret_from_fork+0x10/0x20
[   32.294881] 
[   32.294927] The buggy address belongs to the object at fff00000c9abb900
[   32.294927]  which belongs to the cache kmalloc-64 of size 64
[   32.295081] The buggy address is located 0 bytes to the right of
[   32.295081]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.295152] 
[   32.295176] The buggy address belongs to the physical page:
[   32.295370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.295448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.295610] page_type: f5(slab)
[   32.295672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.295739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.295910] page dumped because: kasan: bad access detected
[   32.296085] 
[   32.296146] Memory state around the buggy address:
[   32.296253]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.296402]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.296474] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.296809]                                      ^
[   32.296924]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.297040]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.297241] ==================================================================
[   32.235827] ==================================================================
[   32.235876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   32.235924] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.235974] 
[   32.236005] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.236104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.236132] Hardware name: linux,dummy-virt (DT)
[   32.236164] Call trace:
[   32.236186]  show_stack+0x20/0x38 (C)
[   32.236250]  dump_stack_lvl+0x8c/0xd0
[   32.236301]  print_report+0x118/0x5d0
[   32.236345]  kasan_report+0xdc/0x128
[   32.236399]  kasan_check_range+0x100/0x1a8
[   32.236446]  __kasan_check_write+0x20/0x30
[   32.236493]  kasan_atomics_helper+0x1128/0x4858
[   32.236553]  kasan_atomics+0x198/0x2e0
[   32.236603]  kunit_try_run_case+0x170/0x3f0
[   32.236652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.236705]  kthread+0x328/0x630
[   32.236757]  ret_from_fork+0x10/0x20
[   32.236814] 
[   32.236834] Allocated by task 296:
[   32.236863]  kasan_save_stack+0x3c/0x68
[   32.236904]  kasan_save_track+0x20/0x40
[   32.236941]  kasan_save_alloc_info+0x40/0x58
[   32.236981]  __kasan_kmalloc+0xd4/0xd8
[   32.237018]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.237069]  kasan_atomics+0xb8/0x2e0
[   32.237110]  kunit_try_run_case+0x170/0x3f0
[   32.237150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.237211]  kthread+0x328/0x630
[   32.237247]  ret_from_fork+0x10/0x20
[   32.237285] 
[   32.237305] The buggy address belongs to the object at fff00000c9abb900
[   32.237305]  which belongs to the cache kmalloc-64 of size 64
[   32.237371] The buggy address is located 0 bytes to the right of
[   32.237371]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.237436] 
[   32.237459] The buggy address belongs to the physical page:
[   32.237491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.237541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.237588] page_type: f5(slab)
[   32.237655] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.237706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.237759] page dumped because: kasan: bad access detected
[   32.237791] 
[   32.237811] Memory state around the buggy address:
[   32.237842]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.237886]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.237952] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.238013]                                      ^
[   32.238048]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.238100]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.238139] ==================================================================
[   32.342665] ==================================================================
[   32.342876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   32.342950] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.343077] 
[   32.343136] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.343300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.343544] Hardware name: linux,dummy-virt (DT)
[   32.343620] Call trace:
[   32.343645]  show_stack+0x20/0x38 (C)
[   32.343783]  dump_stack_lvl+0x8c/0xd0
[   32.343837]  print_report+0x118/0x5d0
[   32.343884]  kasan_report+0xdc/0x128
[   32.343927]  kasan_check_range+0x100/0x1a8
[   32.344101]  __kasan_check_write+0x20/0x30
[   32.344320]  kasan_atomics_helper+0x17ec/0x4858
[   32.344543]  kasan_atomics+0x198/0x2e0
[   32.344621]  kunit_try_run_case+0x170/0x3f0
[   32.344801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.344880]  kthread+0x328/0x630
[   32.345032]  ret_from_fork+0x10/0x20
[   32.345151] 
[   32.345267] Allocated by task 296:
[   32.345365]  kasan_save_stack+0x3c/0x68
[   32.345567]  kasan_save_track+0x20/0x40
[   32.345628]  kasan_save_alloc_info+0x40/0x58
[   32.345715]  __kasan_kmalloc+0xd4/0xd8
[   32.345835]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.345906]  kasan_atomics+0xb8/0x2e0
[   32.346205]  kunit_try_run_case+0x170/0x3f0
[   32.346320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.346416]  kthread+0x328/0x630
[   32.346671]  ret_from_fork+0x10/0x20
[   32.346802] 
[   32.346873] The buggy address belongs to the object at fff00000c9abb900
[   32.346873]  which belongs to the cache kmalloc-64 of size 64
[   32.347008] The buggy address is located 0 bytes to the right of
[   32.347008]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.347088] 
[   32.347110] The buggy address belongs to the physical page:
[   32.347143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.347317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.347406] page_type: f5(slab)
[   32.347454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.347523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.347762] page dumped because: kasan: bad access detected
[   32.347929] 
[   32.347998] Memory state around the buggy address:
[   32.348081]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.348219]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.348273] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.348312]                                      ^
[   32.348459]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.348666]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.348787] ==================================================================
[   32.193695] ==================================================================
[   32.193880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   32.193944] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.194000] 
[   32.194120] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.194251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.194318] Hardware name: linux,dummy-virt (DT)
[   32.194352] Call trace:
[   32.194447]  show_stack+0x20/0x38 (C)
[   32.194515]  dump_stack_lvl+0x8c/0xd0
[   32.194567]  print_report+0x118/0x5d0
[   32.194614]  kasan_report+0xdc/0x128
[   32.194659]  __asan_report_load8_noabort+0x20/0x30
[   32.194818]  kasan_atomics_helper+0x3f58/0x4858
[   32.194894]  kasan_atomics+0x198/0x2e0
[   32.194945]  kunit_try_run_case+0x170/0x3f0
[   32.194994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.195047]  kthread+0x328/0x630
[   32.195104]  ret_from_fork+0x10/0x20
[   32.195338] 
[   32.195440] Allocated by task 296:
[   32.195482]  kasan_save_stack+0x3c/0x68
[   32.195525]  kasan_save_track+0x20/0x40
[   32.195563]  kasan_save_alloc_info+0x40/0x58
[   32.195603]  __kasan_kmalloc+0xd4/0xd8
[   32.195639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.195682]  kasan_atomics+0xb8/0x2e0
[   32.195856]  kunit_try_run_case+0x170/0x3f0
[   32.196004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.196099]  kthread+0x328/0x630
[   32.196219]  ret_from_fork+0x10/0x20
[   32.196256] 
[   32.196294] The buggy address belongs to the object at fff00000c9abb900
[   32.196294]  which belongs to the cache kmalloc-64 of size 64
[   32.196355] The buggy address is located 0 bytes to the right of
[   32.196355]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.196456] 
[   32.196738] The buggy address belongs to the physical page:
[   32.196822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.196878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.196927] page_type: f5(slab)
[   32.196979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.197073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.197116] page dumped because: kasan: bad access detected
[   32.197148] 
[   32.197177] Memory state around the buggy address:
[   32.197216]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.197261]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.197314] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.197355]                                      ^
[   32.197388]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.197431]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.197808] ==================================================================
[   32.213576] ==================================================================
[   32.213622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   32.213695] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.213752] 
[   32.213785] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.213869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.213897] Hardware name: linux,dummy-virt (DT)
[   32.213929] Call trace:
[   32.213954]  show_stack+0x20/0x38 (C)
[   32.214011]  dump_stack_lvl+0x8c/0xd0
[   32.214075]  print_report+0x118/0x5d0
[   32.214121]  kasan_report+0xdc/0x128
[   32.214175]  kasan_check_range+0x100/0x1a8
[   32.214223]  __kasan_check_write+0x20/0x30
[   32.214271]  kasan_atomics_helper+0xf20/0x4858
[   32.214326]  kasan_atomics+0x198/0x2e0
[   32.214375]  kunit_try_run_case+0x170/0x3f0
[   32.214423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.214476]  kthread+0x328/0x630
[   32.214530]  ret_from_fork+0x10/0x20
[   32.214588] 
[   32.214617] Allocated by task 296:
[   32.214656]  kasan_save_stack+0x3c/0x68
[   32.214706]  kasan_save_track+0x20/0x40
[   32.214744]  kasan_save_alloc_info+0x40/0x58
[   32.214791]  __kasan_kmalloc+0xd4/0xd8
[   32.214829]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.214871]  kasan_atomics+0xb8/0x2e0
[   32.214911]  kunit_try_run_case+0x170/0x3f0
[   32.214951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.214996]  kthread+0x328/0x630
[   32.215062]  ret_from_fork+0x10/0x20
[   32.215102] 
[   32.215122] The buggy address belongs to the object at fff00000c9abb900
[   32.215122]  which belongs to the cache kmalloc-64 of size 64
[   32.215179] The buggy address is located 0 bytes to the right of
[   32.215179]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.215242] 
[   32.215263] The buggy address belongs to the physical page:
[   32.215296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.215347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.215394] page_type: f5(slab)
[   32.215431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.215485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.215526] page dumped because: kasan: bad access detected
[   32.215559] 
[   32.215578] Memory state around the buggy address:
[   32.215612]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.215655]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.215698] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.215737]                                      ^
[   32.215771]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.215813]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.215853] ==================================================================
[   32.337953] ==================================================================
[   32.338028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   32.338095] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.338146] 
[   32.338177] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.338526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.338570] Hardware name: linux,dummy-virt (DT)
[   32.338605] Call trace:
[   32.338654]  show_stack+0x20/0x38 (C)
[   32.338834]  dump_stack_lvl+0x8c/0xd0
[   32.338885]  print_report+0x118/0x5d0
[   32.338930]  kasan_report+0xdc/0x128
[   32.338977]  __asan_report_load8_noabort+0x20/0x30
[   32.339027]  kasan_atomics_helper+0x3e20/0x4858
[   32.339091]  kasan_atomics+0x198/0x2e0
[   32.339140]  kunit_try_run_case+0x170/0x3f0
[   32.339189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.339243]  kthread+0x328/0x630
[   32.339288]  ret_from_fork+0x10/0x20
[   32.339367] 
[   32.339390] Allocated by task 296:
[   32.339434]  kasan_save_stack+0x3c/0x68
[   32.339476]  kasan_save_track+0x20/0x40
[   32.339513]  kasan_save_alloc_info+0x40/0x58
[   32.339553]  __kasan_kmalloc+0xd4/0xd8
[   32.339589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.339632]  kasan_atomics+0xb8/0x2e0
[   32.339671]  kunit_try_run_case+0x170/0x3f0
[   32.339710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.339754]  kthread+0x328/0x630
[   32.339790]  ret_from_fork+0x10/0x20
[   32.339828] 
[   32.339847] The buggy address belongs to the object at fff00000c9abb900
[   32.339847]  which belongs to the cache kmalloc-64 of size 64
[   32.339906] The buggy address is located 0 bytes to the right of
[   32.339906]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.339972] 
[   32.340009] The buggy address belongs to the physical page:
[   32.340046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.340589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.340714] page_type: f5(slab)
[   32.340954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.341140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.341318] page dumped because: kasan: bad access detected
[   32.341357] 
[   32.341377] Memory state around the buggy address:
[   32.341442]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.341502]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.341557] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.341676]                                      ^
[   32.341818]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342096]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.342195] ==================================================================
[   32.198169] ==================================================================
[   32.198245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   32.198294] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.198346] 
[   32.198401] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.198489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.198534] Hardware name: linux,dummy-virt (DT)
[   32.198686] Call trace:
[   32.198729]  show_stack+0x20/0x38 (C)
[   32.198801]  dump_stack_lvl+0x8c/0xd0
[   32.198850]  print_report+0x118/0x5d0
[   32.198896]  kasan_report+0xdc/0x128
[   32.199139]  kasan_check_range+0x100/0x1a8
[   32.199243]  __kasan_check_write+0x20/0x30
[   32.199354]  kasan_atomics_helper+0xe44/0x4858
[   32.199407]  kasan_atomics+0x198/0x2e0
[   32.199473]  kunit_try_run_case+0x170/0x3f0
[   32.199557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.199821]  kthread+0x328/0x630
[   32.199889]  ret_from_fork+0x10/0x20
[   32.199986] 
[   32.200015] Allocated by task 296:
[   32.200083]  kasan_save_stack+0x3c/0x68
[   32.200127]  kasan_save_track+0x20/0x40
[   32.200182]  kasan_save_alloc_info+0x40/0x58
[   32.200384]  __kasan_kmalloc+0xd4/0xd8
[   32.200438]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.200482]  kasan_atomics+0xb8/0x2e0
[   32.200600]  kunit_try_run_case+0x170/0x3f0
[   32.200642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.200687]  kthread+0x328/0x630
[   32.200723]  ret_from_fork+0x10/0x20
[   32.200817] 
[   32.200920] The buggy address belongs to the object at fff00000c9abb900
[   32.200920]  which belongs to the cache kmalloc-64 of size 64
[   32.201100] The buggy address is located 0 bytes to the right of
[   32.201100]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.201239] 
[   32.201433] The buggy address belongs to the physical page:
[   32.201486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.201537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.201586] page_type: f5(slab)
[   32.201771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.202038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.202151] page dumped because: kasan: bad access detected
[   32.202255] 
[   32.202438] Memory state around the buggy address:
[   32.202617]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.202734]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.202863] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.202941]                                      ^
[   32.203016]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.203166]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.203254] ==================================================================
[   32.241750] ==================================================================
[   32.241828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   32.241914] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.241968] 
[   32.242015] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.242351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.242398] Hardware name: linux,dummy-virt (DT)
[   32.242435] Call trace:
[   32.242464]  show_stack+0x20/0x38 (C)
[   32.242513]  dump_stack_lvl+0x8c/0xd0
[   32.242603]  print_report+0x118/0x5d0
[   32.242669]  kasan_report+0xdc/0x128
[   32.242760]  kasan_check_range+0x100/0x1a8
[   32.242820]  __kasan_check_write+0x20/0x30
[   32.242870]  kasan_atomics_helper+0x11f8/0x4858
[   32.242922]  kasan_atomics+0x198/0x2e0
[   32.242970]  kunit_try_run_case+0x170/0x3f0
[   32.243019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.243082]  kthread+0x328/0x630
[   32.243126]  ret_from_fork+0x10/0x20
[   32.243174] 
[   32.243195] Allocated by task 296:
[   32.243224]  kasan_save_stack+0x3c/0x68
[   32.243283]  kasan_save_track+0x20/0x40
[   32.243340]  kasan_save_alloc_info+0x40/0x58
[   32.243386]  __kasan_kmalloc+0xd4/0xd8
[   32.243422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.243483]  kasan_atomics+0xb8/0x2e0
[   32.243550]  kunit_try_run_case+0x170/0x3f0
[   32.243629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.243702]  kthread+0x328/0x630
[   32.243771]  ret_from_fork+0x10/0x20
[   32.243809] 
[   32.243831] The buggy address belongs to the object at fff00000c9abb900
[   32.243831]  which belongs to the cache kmalloc-64 of size 64
[   32.243889] The buggy address is located 0 bytes to the right of
[   32.243889]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.243954] 
[   32.243974] The buggy address belongs to the physical page:
[   32.244007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.244065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.244130] page_type: f5(slab)
[   32.244187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.244240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.244293] page dumped because: kasan: bad access detected
[   32.244327] 
[   32.244346] Memory state around the buggy address:
[   32.244396]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.244483]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.244563] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.244603]                                      ^
[   32.244637]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.244681]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.244721] ==================================================================
[   32.178869] ==================================================================
[   32.178922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   32.178977] Write of size 4 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.179932] 
[   32.179987] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.180294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.180324] Hardware name: linux,dummy-virt (DT)
[   32.180355] Call trace:
[   32.180713]  show_stack+0x20/0x38 (C)
[   32.180791]  dump_stack_lvl+0x8c/0xd0
[   32.180921]  print_report+0x118/0x5d0
[   32.181286]  kasan_report+0xdc/0x128
[   32.181509]  kasan_check_range+0x100/0x1a8
[   32.181561]  __kasan_check_write+0x20/0x30
[   32.181614]  kasan_atomics_helper+0xd3c/0x4858
[   32.181665]  kasan_atomics+0x198/0x2e0
[   32.181715]  kunit_try_run_case+0x170/0x3f0
[   32.181763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.181816]  kthread+0x328/0x630
[   32.181860]  ret_from_fork+0x10/0x20
[   32.181909] 
[   32.181929] Allocated by task 296:
[   32.181961]  kasan_save_stack+0x3c/0x68
[   32.182000]  kasan_save_track+0x20/0x40
[   32.182038]  kasan_save_alloc_info+0x40/0x58
[   32.182143]  __kasan_kmalloc+0xd4/0xd8
[   32.182232]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.182378]  kasan_atomics+0xb8/0x2e0
[   32.182475]  kunit_try_run_case+0x170/0x3f0
[   32.182565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.182785]  kthread+0x328/0x630
[   32.182970]  ret_from_fork+0x10/0x20
[   32.183031] 
[   32.183074] The buggy address belongs to the object at fff00000c9abb900
[   32.183074]  which belongs to the cache kmalloc-64 of size 64
[   32.183134] The buggy address is located 0 bytes to the right of
[   32.183134]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.183199] 
[   32.183241] The buggy address belongs to the physical page:
[   32.183280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.183348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.183406] page_type: f5(slab)
[   32.183455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.183506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.183548] page dumped because: kasan: bad access detected
[   32.183581] 
[   32.183607] Memory state around the buggy address:
[   32.183638]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.183683]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.183727] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.183767]                                      ^
[   32.183809]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183855]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183894] ==================================================================
[   32.221423] ==================================================================
[   32.221472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   32.221522] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.221573] 
[   32.221601] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.221688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.221715] Hardware name: linux,dummy-virt (DT)
[   32.221746] Call trace:
[   32.221770]  show_stack+0x20/0x38 (C)
[   32.221817]  dump_stack_lvl+0x8c/0xd0
[   32.221866]  print_report+0x118/0x5d0
[   32.221913]  kasan_report+0xdc/0x128
[   32.221958]  kasan_check_range+0x100/0x1a8
[   32.222005]  __kasan_check_write+0x20/0x30
[   32.222068]  kasan_atomics_helper+0xff0/0x4858
[   32.222120]  kasan_atomics+0x198/0x2e0
[   32.222169]  kunit_try_run_case+0x170/0x3f0
[   32.222250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.222304]  kthread+0x328/0x630
[   32.222348]  ret_from_fork+0x10/0x20
[   32.222431] 
[   32.222469] Allocated by task 296:
[   32.222528]  kasan_save_stack+0x3c/0x68
[   32.222569]  kasan_save_track+0x20/0x40
[   32.222905]  kasan_save_alloc_info+0x40/0x58
[   32.222957]  __kasan_kmalloc+0xd4/0xd8
[   32.223014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.223100]  kasan_atomics+0xb8/0x2e0
[   32.223188]  kunit_try_run_case+0x170/0x3f0
[   32.223276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.223372]  kthread+0x328/0x630
[   32.223419]  ret_from_fork+0x10/0x20
[   32.223478] 
[   32.223517] The buggy address belongs to the object at fff00000c9abb900
[   32.223517]  which belongs to the cache kmalloc-64 of size 64
[   32.223610] The buggy address is located 0 bytes to the right of
[   32.223610]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.223691] 
[   32.223713] The buggy address belongs to the physical page:
[   32.223745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.223798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.224070] page_type: f5(slab)
[   32.224146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.224256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.224300] page dumped because: kasan: bad access detected
[   32.224359] 
[   32.224419] Memory state around the buggy address:
[   32.224483]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.224818]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.224933] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.225047]                                      ^
[   32.225132]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.225195]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.225273] ==================================================================
[   32.260336] ==================================================================
[   32.263086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   32.263144] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.263195] 
[   32.263225] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.263310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.263339] Hardware name: linux,dummy-virt (DT)
[   32.263371] Call trace:
[   32.263394]  show_stack+0x20/0x38 (C)
[   32.263441]  dump_stack_lvl+0x8c/0xd0
[   32.263491]  print_report+0x118/0x5d0
[   32.263536]  kasan_report+0xdc/0x128
[   32.263580]  kasan_check_range+0x100/0x1a8
[   32.263627]  __kasan_check_write+0x20/0x30
[   32.263675]  kasan_atomics_helper+0x1414/0x4858
[   32.263727]  kasan_atomics+0x198/0x2e0
[   32.263775]  kunit_try_run_case+0x170/0x3f0
[   32.263824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.263877]  kthread+0x328/0x630
[   32.263921]  ret_from_fork+0x10/0x20
[   32.263970] 
[   32.263990] Allocated by task 296:
[   32.264019]  kasan_save_stack+0x3c/0x68
[   32.264070]  kasan_save_track+0x20/0x40
[   32.264166]  kasan_save_alloc_info+0x40/0x58
[   32.264206]  __kasan_kmalloc+0xd4/0xd8
[   32.264243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.264288]  kasan_atomics+0xb8/0x2e0
[   32.264328]  kunit_try_run_case+0x170/0x3f0
[   32.264368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.264429]  kthread+0x328/0x630
[   32.264480]  ret_from_fork+0x10/0x20
[   32.264526] 
[   32.264558] The buggy address belongs to the object at fff00000c9abb900
[   32.264558]  which belongs to the cache kmalloc-64 of size 64
[   32.264616] The buggy address is located 0 bytes to the right of
[   32.264616]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.264692] 
[   32.264733] The buggy address belongs to the physical page:
[   32.264764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.264822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.264868] page_type: f5(slab)
[   32.264918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.264970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.265013] page dumped because: kasan: bad access detected
[   32.265064] 
[   32.265100] Memory state around the buggy address:
[   32.265134]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.265178]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.265222] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.265273]                                      ^
[   32.265316]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.265361]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.265401] ==================================================================
[   32.306021] ==================================================================
[   32.306099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   32.306212] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.306265] 
[   32.306306] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.306401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.306439] Hardware name: linux,dummy-virt (DT)
[   32.306472] Call trace:
[   32.306495]  show_stack+0x20/0x38 (C)
[   32.306544]  dump_stack_lvl+0x8c/0xd0
[   32.306595]  print_report+0x118/0x5d0
[   32.306640]  kasan_report+0xdc/0x128
[   32.306693]  kasan_check_range+0x100/0x1a8
[   32.306749]  __kasan_check_write+0x20/0x30
[   32.306805]  kasan_atomics_helper+0x1644/0x4858
[   32.306857]  kasan_atomics+0x198/0x2e0
[   32.306906]  kunit_try_run_case+0x170/0x3f0
[   32.306955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.307017]  kthread+0x328/0x630
[   32.307074]  ret_from_fork+0x10/0x20
[   32.307123] 
[   32.307143] Allocated by task 296:
[   32.307173]  kasan_save_stack+0x3c/0x68
[   32.307222]  kasan_save_track+0x20/0x40
[   32.307270]  kasan_save_alloc_info+0x40/0x58
[   32.307311]  __kasan_kmalloc+0xd4/0xd8
[   32.307355]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.307401]  kasan_atomics+0xb8/0x2e0
[   32.307442]  kunit_try_run_case+0x170/0x3f0
[   32.307482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.307528]  kthread+0x328/0x630
[   32.307564]  ret_from_fork+0x10/0x20
[   32.307601] 
[   32.307623] The buggy address belongs to the object at fff00000c9abb900
[   32.307623]  which belongs to the cache kmalloc-64 of size 64
[   32.307682] The buggy address is located 0 bytes to the right of
[   32.307682]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.307747] 
[   32.307776] The buggy address belongs to the physical page:
[   32.307810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.307860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.307916] page_type: f5(slab)
[   32.307954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.308006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.308047] page dumped because: kasan: bad access detected
[   32.308100] 
[   32.308553] Memory state around the buggy address:
[   32.309079]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.309135]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.309298] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.309396]                                      ^
[   32.309526]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.309633]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.309789] ==================================================================
[   32.278979] ==================================================================
[   32.279052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   32.279117] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.279168] 
[   32.279398] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.279587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.279622] Hardware name: linux,dummy-virt (DT)
[   32.279672] Call trace:
[   32.279768]  show_stack+0x20/0x38 (C)
[   32.279841]  dump_stack_lvl+0x8c/0xd0
[   32.279909]  print_report+0x118/0x5d0
[   32.279955]  kasan_report+0xdc/0x128
[   32.280036]  kasan_check_range+0x100/0x1a8
[   32.280097]  __kasan_check_write+0x20/0x30
[   32.280145]  kasan_atomics_helper+0x154c/0x4858
[   32.280286]  kasan_atomics+0x198/0x2e0
[   32.280499]  kunit_try_run_case+0x170/0x3f0
[   32.280639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.280747]  kthread+0x328/0x630
[   32.281646]  ret_from_fork+0x10/0x20
[   32.281716] 
[   32.281738] Allocated by task 296:
[   32.281770]  kasan_save_stack+0x3c/0x68
[   32.281812]  kasan_save_track+0x20/0x40
[   32.281851]  kasan_save_alloc_info+0x40/0x58
[   32.284190]  __kasan_kmalloc+0xd4/0xd8
[   32.284902]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.285043]  kasan_atomics+0xb8/0x2e0
[   32.286182]  kunit_try_run_case+0x170/0x3f0
[   32.286325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.286377]  kthread+0x328/0x630
[   32.286412]  ret_from_fork+0x10/0x20
[   32.286451] 
[   32.286482] The buggy address belongs to the object at fff00000c9abb900
[   32.286482]  which belongs to the cache kmalloc-64 of size 64
[   32.286543] The buggy address is located 0 bytes to the right of
[   32.286543]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.286608] 
[   32.286631] The buggy address belongs to the physical page:
[   32.286663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.286715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.286762] page_type: f5(slab)
[   32.286812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.286866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.286909] page dumped because: kasan: bad access detected
[   32.286942] 
[   32.286962] Memory state around the buggy address:
[   32.286995]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.287039]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.287173] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.287214]                                      ^
[   32.287249]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.287292]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.287331] ==================================================================
[   32.309982] ==================================================================
[   32.310028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   32.310093] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.310329] 
[   32.310414] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.310660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.311025] Hardware name: linux,dummy-virt (DT)
[   32.311078] Call trace:
[   32.311138]  show_stack+0x20/0x38 (C)
[   32.311199]  dump_stack_lvl+0x8c/0xd0
[   32.311320]  print_report+0x118/0x5d0
[   32.311396]  kasan_report+0xdc/0x128
[   32.311442]  __asan_report_load8_noabort+0x20/0x30
[   32.311702]  kasan_atomics_helper+0x3df4/0x4858
[   32.311797]  kasan_atomics+0x198/0x2e0
[   32.312051]  kunit_try_run_case+0x170/0x3f0
[   32.312261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.312354]  kthread+0x328/0x630
[   32.312419]  ret_from_fork+0x10/0x20
[   32.312472] 
[   32.312492] Allocated by task 296:
[   32.312523]  kasan_save_stack+0x3c/0x68
[   32.312563]  kasan_save_track+0x20/0x40
[   32.312601]  kasan_save_alloc_info+0x40/0x58
[   32.313010]  __kasan_kmalloc+0xd4/0xd8
[   32.313360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.313529]  kasan_atomics+0xb8/0x2e0
[   32.313785]  kunit_try_run_case+0x170/0x3f0
[   32.314020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.314131]  kthread+0x328/0x630
[   32.314415]  ret_from_fork+0x10/0x20
[   32.314641] 
[   32.314691] The buggy address belongs to the object at fff00000c9abb900
[   32.314691]  which belongs to the cache kmalloc-64 of size 64
[   32.314816] The buggy address is located 0 bytes to the right of
[   32.314816]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.315167] 
[   32.315318] The buggy address belongs to the physical page:
[   32.315407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.315716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.315819] page_type: f5(slab)
[   32.315983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.316338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.316391] page dumped because: kasan: bad access detected
[   32.316531] 
[   32.316611] Memory state around the buggy address:
[   32.316743]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.316848]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.316933] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.317131]                                      ^
[   32.317383]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.317581]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.317648] ==================================================================
[   32.225684] ==================================================================
[   32.225753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   32.225810] Write of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.225897] 
[   32.225976] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.226094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.226122] Hardware name: linux,dummy-virt (DT)
[   32.226169] Call trace:
[   32.226192]  show_stack+0x20/0x38 (C)
[   32.226240]  dump_stack_lvl+0x8c/0xd0
[   32.226289]  print_report+0x118/0x5d0
[   32.226333]  kasan_report+0xdc/0x128
[   32.226378]  kasan_check_range+0x100/0x1a8
[   32.226428]  __kasan_check_write+0x20/0x30
[   32.226476]  kasan_atomics_helper+0x1058/0x4858
[   32.226527]  kasan_atomics+0x198/0x2e0
[   32.226575]  kunit_try_run_case+0x170/0x3f0
[   32.226622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.226675]  kthread+0x328/0x630
[   32.226735]  ret_from_fork+0x10/0x20
[   32.226818] 
[   32.226857] Allocated by task 296:
[   32.226913]  kasan_save_stack+0x3c/0x68
[   32.226992]  kasan_save_track+0x20/0x40
[   32.227095]  kasan_save_alloc_info+0x40/0x58
[   32.227139]  __kasan_kmalloc+0xd4/0xd8
[   32.227205]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.227535]  kasan_atomics+0xb8/0x2e0
[   32.227575]  kunit_try_run_case+0x170/0x3f0
[   32.227635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.227701]  kthread+0x328/0x630
[   32.227755]  ret_from_fork+0x10/0x20
[   32.227832] 
[   32.227870] The buggy address belongs to the object at fff00000c9abb900
[   32.227870]  which belongs to the cache kmalloc-64 of size 64
[   32.227949] The buggy address is located 0 bytes to the right of
[   32.227949]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.228041] 
[   32.228072] The buggy address belongs to the physical page:
[   32.228103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.228153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.228201] page_type: f5(slab)
[   32.228240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.228289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.228331] page dumped because: kasan: bad access detected
[   32.228364] 
[   32.228392] Memory state around the buggy address:
[   32.228425]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.228468]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.228541] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.228641]                                      ^
[   32.228748]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.228836]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.228948] ==================================================================
[   32.298584] ==================================================================
[   32.298636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   32.298690] Read of size 8 at addr fff00000c9abb930 by task kunit_try_catch/296
[   32.298893] 
[   32.298928] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT 
[   32.299152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.299234] Hardware name: linux,dummy-virt (DT)
[   32.299270] Call trace:
[   32.299311]  show_stack+0x20/0x38 (C)
[   32.299374]  dump_stack_lvl+0x8c/0xd0
[   32.299472]  print_report+0x118/0x5d0
[   32.299520]  kasan_report+0xdc/0x128
[   32.299566]  __asan_report_load8_noabort+0x20/0x30
[   32.299617]  kasan_atomics_helper+0x3db0/0x4858
[   32.299668]  kasan_atomics+0x198/0x2e0
[   32.299717]  kunit_try_run_case+0x170/0x3f0
[   32.299767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.299836]  kthread+0x328/0x630
[   32.299882]  ret_from_fork+0x10/0x20
[   32.299931] 
[   32.299964] Allocated by task 296:
[   32.299996]  kasan_save_stack+0x3c/0x68
[   32.300044]  kasan_save_track+0x20/0x40
[   32.300346]  kasan_save_alloc_info+0x40/0x58
[   32.300407]  __kasan_kmalloc+0xd4/0xd8
[   32.300850]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.300973]  kasan_atomics+0xb8/0x2e0
[   32.301036]  kunit_try_run_case+0x170/0x3f0
[   32.301195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.301525]  kthread+0x328/0x630
[   32.301849]  ret_from_fork+0x10/0x20
[   32.301920] 
[   32.302048] The buggy address belongs to the object at fff00000c9abb900
[   32.302048]  which belongs to the cache kmalloc-64 of size 64
[   32.302296] The buggy address is located 0 bytes to the right of
[   32.302296]  allocated 48-byte region [fff00000c9abb900, fff00000c9abb930)
[   32.302452] 
[   32.302584] The buggy address belongs to the physical page:
[   32.302682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109abb
[   32.302744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.303031] page_type: f5(slab)
[   32.303257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.303616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.303827] page dumped because: kasan: bad access detected
[   32.303965] 
[   32.304044] Memory state around the buggy address:
[   32.304125]  fff00000c9abb800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.304385]  fff00000c9abb880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.304561] >fff00000c9abb900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.304733]                                      ^
[   32.304801]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.304882]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.304924] ==================================================================
[   32.035785] ==================================================================
[   32.035871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   32.038380]  kasan_save_track+0x20/0x40
[   32.038981] 
[   32.040012] page dumped because: kasan: bad access detected
[   32.041252]  fff00000c9abb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.041318]  fff00000c9abba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.041462] ==================================================================

[   28.775636] ==================================================================
[   28.776042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   28.776838] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.777446] 
[   28.777560] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.777770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.777785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.777807] Call Trace:
[   28.777822]  <TASK>
[   28.777839]  dump_stack_lvl+0x73/0xb0
[   28.777870]  print_report+0xd1/0x610
[   28.777892]  ? __virt_addr_valid+0x1db/0x2d0
[   28.777915]  ? kasan_atomics_helper+0x12e6/0x5450
[   28.777943]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.777969]  ? kasan_atomics_helper+0x12e6/0x5450
[   28.777990]  kasan_report+0x141/0x180
[   28.778013]  ? kasan_atomics_helper+0x12e6/0x5450
[   28.778040]  kasan_check_range+0x10c/0x1c0
[   28.778063]  __kasan_check_write+0x18/0x20
[   28.778097]  kasan_atomics_helper+0x12e6/0x5450
[   28.778120]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.778142]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.778168]  ? kasan_atomics+0x152/0x310
[   28.778194]  kasan_atomics+0x1dc/0x310
[   28.778217]  ? __pfx_kasan_atomics+0x10/0x10
[   28.778242]  ? __pfx_read_tsc+0x10/0x10
[   28.778264]  ? ktime_get_ts64+0x86/0x230
[   28.778299]  kunit_try_run_case+0x1a5/0x480
[   28.778323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.778346]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.778369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.778393]  ? __kthread_parkme+0x82/0x180
[   28.778417]  ? preempt_count_sub+0x50/0x80
[   28.778441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.778465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.778489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.778512]  kthread+0x337/0x6f0
[   28.778532]  ? trace_preempt_on+0x20/0xc0
[   28.778554]  ? __pfx_kthread+0x10/0x10
[   28.778575]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.778597]  ? calculate_sigpending+0x7b/0xa0
[   28.778620]  ? __pfx_kthread+0x10/0x10
[   28.778641]  ret_from_fork+0x116/0x1d0
[   28.778660]  ? __pfx_kthread+0x10/0x10
[   28.778681]  ret_from_fork_asm+0x1a/0x30
[   28.778713]  </TASK>
[   28.778724] 
[   28.788155] Allocated by task 314:
[   28.788438]  kasan_save_stack+0x45/0x70
[   28.788783]  kasan_save_track+0x18/0x40
[   28.789019]  kasan_save_alloc_info+0x3b/0x50
[   28.789317]  __kasan_kmalloc+0xb7/0xc0
[   28.789498]  __kmalloc_cache_noprof+0x189/0x420
[   28.789818]  kasan_atomics+0x95/0x310
[   28.790015]  kunit_try_run_case+0x1a5/0x480
[   28.790318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.790650]  kthread+0x337/0x6f0
[   28.790779]  ret_from_fork+0x116/0x1d0
[   28.791087]  ret_from_fork_asm+0x1a/0x30
[   28.791260] 
[   28.791364] The buggy address belongs to the object at ffff88810458d180
[   28.791364]  which belongs to the cache kmalloc-64 of size 64
[   28.791844] The buggy address is located 0 bytes to the right of
[   28.791844]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.792671] 
[   28.792771] The buggy address belongs to the physical page:
[   28.792967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.793474] flags: 0x200000000000000(node=0|zone=2)
[   28.793742] page_type: f5(slab)
[   28.793893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.794206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.794710] page dumped because: kasan: bad access detected
[   28.794997] 
[   28.795086] Memory state around the buggy address:
[   28.795277]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.795772]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.796062] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.796549]                                      ^
[   28.796765]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.797173]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.797578] ==================================================================
[   28.819823] ==================================================================
[   28.820215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   28.820769] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.821361] 
[   28.821455] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.821502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.821514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.821534] Call Trace:
[   28.821548]  <TASK>
[   28.821562]  dump_stack_lvl+0x73/0xb0
[   28.821786]  print_report+0xd1/0x610
[   28.821812]  ? __virt_addr_valid+0x1db/0x2d0
[   28.821835]  ? kasan_atomics_helper+0x13b5/0x5450
[   28.821856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.821882]  ? kasan_atomics_helper+0x13b5/0x5450
[   28.821905]  kasan_report+0x141/0x180
[   28.821936]  ? kasan_atomics_helper+0x13b5/0x5450
[   28.821963]  kasan_check_range+0x10c/0x1c0
[   28.821986]  __kasan_check_read+0x15/0x20
[   28.822009]  kasan_atomics_helper+0x13b5/0x5450
[   28.822032]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.822055]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.822090]  ? kasan_atomics+0x152/0x310
[   28.822117]  kasan_atomics+0x1dc/0x310
[   28.822139]  ? __pfx_kasan_atomics+0x10/0x10
[   28.822163]  ? __pfx_read_tsc+0x10/0x10
[   28.822184]  ? ktime_get_ts64+0x86/0x230
[   28.822208]  kunit_try_run_case+0x1a5/0x480
[   28.822232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.822254]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.822279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.822302]  ? __kthread_parkme+0x82/0x180
[   28.822326]  ? preempt_count_sub+0x50/0x80
[   28.822350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.822373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.822398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.822421]  kthread+0x337/0x6f0
[   28.822441]  ? trace_preempt_on+0x20/0xc0
[   28.822463]  ? __pfx_kthread+0x10/0x10
[   28.822485]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.822507]  ? calculate_sigpending+0x7b/0xa0
[   28.822530]  ? __pfx_kthread+0x10/0x10
[   28.822552]  ret_from_fork+0x116/0x1d0
[   28.822571]  ? __pfx_kthread+0x10/0x10
[   28.822591]  ret_from_fork_asm+0x1a/0x30
[   28.822623]  </TASK>
[   28.822633] 
[   28.831885] Allocated by task 314:
[   28.832230]  kasan_save_stack+0x45/0x70
[   28.832473]  kasan_save_track+0x18/0x40
[   28.832770]  kasan_save_alloc_info+0x3b/0x50
[   28.832943]  __kasan_kmalloc+0xb7/0xc0
[   28.833140]  __kmalloc_cache_noprof+0x189/0x420
[   28.833563]  kasan_atomics+0x95/0x310
[   28.833737]  kunit_try_run_case+0x1a5/0x480
[   28.833916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.834165]  kthread+0x337/0x6f0
[   28.834542]  ret_from_fork+0x116/0x1d0
[   28.834732]  ret_from_fork_asm+0x1a/0x30
[   28.834974] 
[   28.835053] The buggy address belongs to the object at ffff88810458d180
[   28.835053]  which belongs to the cache kmalloc-64 of size 64
[   28.835743] The buggy address is located 0 bytes to the right of
[   28.835743]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.836246] 
[   28.836554] The buggy address belongs to the physical page:
[   28.836775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.837115] flags: 0x200000000000000(node=0|zone=2)
[   28.837322] page_type: f5(slab)
[   28.837460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.837768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.838074] page dumped because: kasan: bad access detected
[   28.838620] 
[   28.838706] Memory state around the buggy address:
[   28.838887]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.839354]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.839723] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.840021]                                      ^
[   28.840332]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.840695]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.840946] ==================================================================
[   29.106341] ==================================================================
[   29.107250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   29.107683] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.107906] 
[   29.107985] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.108033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.108045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.108067] Call Trace:
[   29.108093]  <TASK>
[   29.108109]  dump_stack_lvl+0x73/0xb0
[   29.108139]  print_report+0xd1/0x610
[   29.108161]  ? __virt_addr_valid+0x1db/0x2d0
[   29.108184]  ? kasan_atomics_helper+0x1b22/0x5450
[   29.108206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.108232]  ? kasan_atomics_helper+0x1b22/0x5450
[   29.108254]  kasan_report+0x141/0x180
[   29.108297]  ? kasan_atomics_helper+0x1b22/0x5450
[   29.108325]  kasan_check_range+0x10c/0x1c0
[   29.108348]  __kasan_check_write+0x18/0x20
[   29.108371]  kasan_atomics_helper+0x1b22/0x5450
[   29.108394]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.108416]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.108441]  ? kasan_atomics+0x152/0x310
[   29.108468]  kasan_atomics+0x1dc/0x310
[   29.108491]  ? __pfx_kasan_atomics+0x10/0x10
[   29.108515]  ? __pfx_read_tsc+0x10/0x10
[   29.108537]  ? ktime_get_ts64+0x86/0x230
[   29.108561]  kunit_try_run_case+0x1a5/0x480
[   29.108586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.108607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.108631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.108656]  ? __kthread_parkme+0x82/0x180
[   29.108680]  ? preempt_count_sub+0x50/0x80
[   29.108704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.108727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.108751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.108774]  kthread+0x337/0x6f0
[   29.108794]  ? trace_preempt_on+0x20/0xc0
[   29.108817]  ? __pfx_kthread+0x10/0x10
[   29.108837]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.108859]  ? calculate_sigpending+0x7b/0xa0
[   29.108883]  ? __pfx_kthread+0x10/0x10
[   29.108905]  ret_from_fork+0x116/0x1d0
[   29.108925]  ? __pfx_kthread+0x10/0x10
[   29.108946]  ret_from_fork_asm+0x1a/0x30
[   29.108978]  </TASK>
[   29.108989] 
[   29.115813] Allocated by task 314:
[   29.115982]  kasan_save_stack+0x45/0x70
[   29.116182]  kasan_save_track+0x18/0x40
[   29.116387]  kasan_save_alloc_info+0x3b/0x50
[   29.116578]  __kasan_kmalloc+0xb7/0xc0
[   29.116703]  __kmalloc_cache_noprof+0x189/0x420
[   29.116851]  kasan_atomics+0x95/0x310
[   29.116978]  kunit_try_run_case+0x1a5/0x480
[   29.117175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.117453]  kthread+0x337/0x6f0
[   29.117617]  ret_from_fork+0x116/0x1d0
[   29.117806]  ret_from_fork_asm+0x1a/0x30
[   29.117999] 
[   29.118099] The buggy address belongs to the object at ffff88810458d180
[   29.118099]  which belongs to the cache kmalloc-64 of size 64
[   29.118640] The buggy address is located 0 bytes to the right of
[   29.118640]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.119125] 
[   29.119201] The buggy address belongs to the physical page:
[   29.119445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.119777] flags: 0x200000000000000(node=0|zone=2)
[   29.119973] page_type: f5(slab)
[   29.120142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.120458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.120736] page dumped because: kasan: bad access detected
[   29.120901] 
[   29.120964] Memory state around the buggy address:
[   29.121120]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.121356]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.121615] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.121927]                                      ^
[   29.122149]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.122482]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.122698] ==================================================================
[   28.053131] ==================================================================
[   28.054991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   28.055872] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.056107] 
[   28.056192] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.056251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.056264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.056286] Call Trace:
[   28.056298]  <TASK>
[   28.056315]  dump_stack_lvl+0x73/0xb0
[   28.056345]  print_report+0xd1/0x610
[   28.056366]  ? __virt_addr_valid+0x1db/0x2d0
[   28.056390]  ? kasan_atomics_helper+0x4bbc/0x5450
[   28.056410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.056435]  ? kasan_atomics_helper+0x4bbc/0x5450
[   28.056456]  kasan_report+0x141/0x180
[   28.056477]  ? kasan_atomics_helper+0x4bbc/0x5450
[   28.056503]  __asan_report_load4_noabort+0x18/0x20
[   28.056527]  kasan_atomics_helper+0x4bbc/0x5450
[   28.056549]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.056570]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.056593]  ? kasan_atomics+0x152/0x310
[   28.056618]  kasan_atomics+0x1dc/0x310
[   28.056639]  ? __pfx_kasan_atomics+0x10/0x10
[   28.056662]  ? __pfx_read_tsc+0x10/0x10
[   28.056683]  ? ktime_get_ts64+0x86/0x230
[   28.056707]  kunit_try_run_case+0x1a5/0x480
[   28.056730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.056751]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.056773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.056796]  ? __kthread_parkme+0x82/0x180
[   28.056818]  ? preempt_count_sub+0x50/0x80
[   28.056841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.056864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.056886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.056909]  kthread+0x337/0x6f0
[   28.056927]  ? trace_preempt_on+0x20/0xc0
[   28.056949]  ? __pfx_kthread+0x10/0x10
[   28.056968]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.056989]  ? calculate_sigpending+0x7b/0xa0
[   28.057012]  ? __pfx_kthread+0x10/0x10
[   28.057032]  ret_from_fork+0x116/0x1d0
[   28.057050]  ? __pfx_kthread+0x10/0x10
[   28.057070]  ret_from_fork_asm+0x1a/0x30
[   28.057672]  </TASK>
[   28.057685] 
[   28.065564] Allocated by task 314:
[   28.065688]  kasan_save_stack+0x45/0x70
[   28.065826]  kasan_save_track+0x18/0x40
[   28.065967]  kasan_save_alloc_info+0x3b/0x50
[   28.066272]  __kasan_kmalloc+0xb7/0xc0
[   28.066562]  __kmalloc_cache_noprof+0x189/0x420
[   28.066841]  kasan_atomics+0x95/0x310
[   28.067042]  kunit_try_run_case+0x1a5/0x480
[   28.067324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.067611]  kthread+0x337/0x6f0
[   28.067771]  ret_from_fork+0x116/0x1d0
[   28.067961]  ret_from_fork_asm+0x1a/0x30
[   28.068153] 
[   28.068219] The buggy address belongs to the object at ffff88810458d180
[   28.068219]  which belongs to the cache kmalloc-64 of size 64
[   28.068800] The buggy address is located 0 bytes to the right of
[   28.068800]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.069219] 
[   28.069306] The buggy address belongs to the physical page:
[   28.069580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.069930] flags: 0x200000000000000(node=0|zone=2)
[   28.070160] page_type: f5(slab)
[   28.070538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.070780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.071092] page dumped because: kasan: bad access detected
[   28.071427] 
[   28.071524] Memory state around the buggy address:
[   28.071723]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.072016]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.072356] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.072726]                                      ^
[   28.072970]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.073334]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.073681] ==================================================================
[   28.396770] ==================================================================
[   28.397105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   28.397421] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.397707] 
[   28.397788] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.397835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.397848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.397869] Call Trace:
[   28.397883]  <TASK>
[   28.397901]  dump_stack_lvl+0x73/0xb0
[   28.397966]  print_report+0xd1/0x610
[   28.397989]  ? __virt_addr_valid+0x1db/0x2d0
[   28.398012]  ? kasan_atomics_helper+0xa2b/0x5450
[   28.398046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.398072]  ? kasan_atomics_helper+0xa2b/0x5450
[   28.398135]  kasan_report+0x141/0x180
[   28.398159]  ? kasan_atomics_helper+0xa2b/0x5450
[   28.398185]  kasan_check_range+0x10c/0x1c0
[   28.398220]  __kasan_check_write+0x18/0x20
[   28.398244]  kasan_atomics_helper+0xa2b/0x5450
[   28.398267]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.398301]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.398326]  ? kasan_atomics+0x152/0x310
[   28.398353]  kasan_atomics+0x1dc/0x310
[   28.398393]  ? __pfx_kasan_atomics+0x10/0x10
[   28.398418]  ? __pfx_read_tsc+0x10/0x10
[   28.398453]  ? ktime_get_ts64+0x86/0x230
[   28.398487]  kunit_try_run_case+0x1a5/0x480
[   28.398510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.398532]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.398568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.398592]  ? __kthread_parkme+0x82/0x180
[   28.398620]  ? preempt_count_sub+0x50/0x80
[   28.398644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.398668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.398691]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.398714]  kthread+0x337/0x6f0
[   28.398734]  ? trace_preempt_on+0x20/0xc0
[   28.398757]  ? __pfx_kthread+0x10/0x10
[   28.398778]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.398800]  ? calculate_sigpending+0x7b/0xa0
[   28.398824]  ? __pfx_kthread+0x10/0x10
[   28.398845]  ret_from_fork+0x116/0x1d0
[   28.398865]  ? __pfx_kthread+0x10/0x10
[   28.398885]  ret_from_fork_asm+0x1a/0x30
[   28.398917]  </TASK>
[   28.398927] 
[   28.409211] Allocated by task 314:
[   28.409451]  kasan_save_stack+0x45/0x70
[   28.409919]  kasan_save_track+0x18/0x40
[   28.410117]  kasan_save_alloc_info+0x3b/0x50
[   28.410276]  __kasan_kmalloc+0xb7/0xc0
[   28.410581]  __kmalloc_cache_noprof+0x189/0x420
[   28.410806]  kasan_atomics+0x95/0x310
[   28.411216]  kunit_try_run_case+0x1a5/0x480
[   28.411407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.411722]  kthread+0x337/0x6f0
[   28.411890]  ret_from_fork+0x116/0x1d0
[   28.412334]  ret_from_fork_asm+0x1a/0x30
[   28.412548] 
[   28.412755] The buggy address belongs to the object at ffff88810458d180
[   28.412755]  which belongs to the cache kmalloc-64 of size 64
[   28.413392] The buggy address is located 0 bytes to the right of
[   28.413392]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.414126] 
[   28.414221] The buggy address belongs to the physical page:
[   28.414666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.415044] flags: 0x200000000000000(node=0|zone=2)
[   28.415303] page_type: f5(slab)
[   28.415568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.415881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.416200] page dumped because: kasan: bad access detected
[   28.416656] 
[   28.416774] Memory state around the buggy address:
[   28.417112]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.417642]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.418013] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.418458]                                      ^
[   28.418751]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.419137]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.419592] ==================================================================
[   28.527743] ==================================================================
[   28.528042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   28.528390] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.529040] 
[   28.529171] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.529221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.529234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.529257] Call Trace:
[   28.529274]  <TASK>
[   28.529291]  dump_stack_lvl+0x73/0xb0
[   28.529322]  print_report+0xd1/0x610
[   28.529344]  ? __virt_addr_valid+0x1db/0x2d0
[   28.529367]  ? kasan_atomics_helper+0xde0/0x5450
[   28.529401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.529428]  ? kasan_atomics_helper+0xde0/0x5450
[   28.529450]  kasan_report+0x141/0x180
[   28.529485]  ? kasan_atomics_helper+0xde0/0x5450
[   28.529511]  kasan_check_range+0x10c/0x1c0
[   28.529535]  __kasan_check_write+0x18/0x20
[   28.529559]  kasan_atomics_helper+0xde0/0x5450
[   28.529582]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.529605]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.529630]  ? kasan_atomics+0x152/0x310
[   28.529657]  kasan_atomics+0x1dc/0x310
[   28.529680]  ? __pfx_kasan_atomics+0x10/0x10
[   28.529705]  ? __pfx_read_tsc+0x10/0x10
[   28.529728]  ? ktime_get_ts64+0x86/0x230
[   28.529762]  kunit_try_run_case+0x1a5/0x480
[   28.529786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.529808]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.529843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.529867]  ? __kthread_parkme+0x82/0x180
[   28.529891]  ? preempt_count_sub+0x50/0x80
[   28.529916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.529953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.529977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.530001]  kthread+0x337/0x6f0
[   28.530032]  ? trace_preempt_on+0x20/0xc0
[   28.530056]  ? __pfx_kthread+0x10/0x10
[   28.530085]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.530107]  ? calculate_sigpending+0x7b/0xa0
[   28.530131]  ? __pfx_kthread+0x10/0x10
[   28.530153]  ret_from_fork+0x116/0x1d0
[   28.530173]  ? __pfx_kthread+0x10/0x10
[   28.530195]  ret_from_fork_asm+0x1a/0x30
[   28.530228]  </TASK>
[   28.530239] 
[   28.537763] Allocated by task 314:
[   28.537930]  kasan_save_stack+0x45/0x70
[   28.538152]  kasan_save_track+0x18/0x40
[   28.538284]  kasan_save_alloc_info+0x3b/0x50
[   28.538426]  __kasan_kmalloc+0xb7/0xc0
[   28.538607]  __kmalloc_cache_noprof+0x189/0x420
[   28.538825]  kasan_atomics+0x95/0x310
[   28.539030]  kunit_try_run_case+0x1a5/0x480
[   28.539243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.539460]  kthread+0x337/0x6f0
[   28.539575]  ret_from_fork+0x116/0x1d0
[   28.539799]  ret_from_fork_asm+0x1a/0x30
[   28.539990] 
[   28.540087] The buggy address belongs to the object at ffff88810458d180
[   28.540087]  which belongs to the cache kmalloc-64 of size 64
[   28.540639] The buggy address is located 0 bytes to the right of
[   28.540639]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.541156] 
[   28.541246] The buggy address belongs to the physical page:
[   28.541515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.541909] flags: 0x200000000000000(node=0|zone=2)
[   28.542129] page_type: f5(slab)
[   28.542312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.542641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.542894] page dumped because: kasan: bad access detected
[   28.543059] 
[   28.543132] Memory state around the buggy address:
[   28.543282]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.543492]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.544156] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.544617]                                      ^
[   28.544928]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.545210]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.545599] ==================================================================
[   29.341242] ==================================================================
[   29.341598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   29.341905] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.342212] 
[   29.342319] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.342365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.342378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.342400] Call Trace:
[   29.342413]  <TASK>
[   29.342428]  dump_stack_lvl+0x73/0xb0
[   29.342455]  print_report+0xd1/0x610
[   29.342477]  ? __virt_addr_valid+0x1db/0x2d0
[   29.342499]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.342521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.342547]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.342569]  kasan_report+0x141/0x180
[   29.342591]  ? kasan_atomics_helper+0x20c8/0x5450
[   29.342617]  kasan_check_range+0x10c/0x1c0
[   29.342641]  __kasan_check_write+0x18/0x20
[   29.342664]  kasan_atomics_helper+0x20c8/0x5450
[   29.342687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.342709]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.342734]  ? kasan_atomics+0x152/0x310
[   29.342760]  kasan_atomics+0x1dc/0x310
[   29.342783]  ? __pfx_kasan_atomics+0x10/0x10
[   29.342808]  ? __pfx_read_tsc+0x10/0x10
[   29.342829]  ? ktime_get_ts64+0x86/0x230
[   29.342853]  kunit_try_run_case+0x1a5/0x480
[   29.342877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.342900]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.342923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.342947]  ? __kthread_parkme+0x82/0x180
[   29.342971]  ? preempt_count_sub+0x50/0x80
[   29.342994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.343018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.343041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.343065]  kthread+0x337/0x6f0
[   29.343096]  ? trace_preempt_on+0x20/0xc0
[   29.343119]  ? __pfx_kthread+0x10/0x10
[   29.343139]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.343161]  ? calculate_sigpending+0x7b/0xa0
[   29.343184]  ? __pfx_kthread+0x10/0x10
[   29.343208]  ret_from_fork+0x116/0x1d0
[   29.343226]  ? __pfx_kthread+0x10/0x10
[   29.343248]  ret_from_fork_asm+0x1a/0x30
[   29.343279]  </TASK>
[   29.343290] 
[   29.351189] Allocated by task 314:
[   29.352200]  kasan_save_stack+0x45/0x70
[   29.353032]  kasan_save_track+0x18/0x40
[   29.353238]  kasan_save_alloc_info+0x3b/0x50
[   29.353441]  __kasan_kmalloc+0xb7/0xc0
[   29.353566]  __kmalloc_cache_noprof+0x189/0x420
[   29.353710]  kasan_atomics+0x95/0x310
[   29.353832]  kunit_try_run_case+0x1a5/0x480
[   29.353970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.354165]  kthread+0x337/0x6f0
[   29.354781]  ret_from_fork+0x116/0x1d0
[   29.355036]  ret_from_fork_asm+0x1a/0x30
[   29.355538] 
[   29.355779] The buggy address belongs to the object at ffff88810458d180
[   29.355779]  which belongs to the cache kmalloc-64 of size 64
[   29.356564] The buggy address is located 0 bytes to the right of
[   29.356564]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.357095] 
[   29.357181] The buggy address belongs to the physical page:
[   29.357824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.358259] flags: 0x200000000000000(node=0|zone=2)
[   29.358766] page_type: f5(slab)
[   29.359010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.359570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.359882] page dumped because: kasan: bad access detected
[   29.360125] 
[   29.360209] Memory state around the buggy address:
[   29.360763]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.361201]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.361520] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.361805]                                      ^
[   29.362012]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.362565]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.363015] ==================================================================
[   29.409569] ==================================================================
[   29.409873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   29.410311] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.410635] 
[   29.410752] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.410799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.410812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.410832] Call Trace:
[   29.410864]  <TASK>
[   29.410879]  dump_stack_lvl+0x73/0xb0
[   29.410906]  print_report+0xd1/0x610
[   29.410946]  ? __virt_addr_valid+0x1db/0x2d0
[   29.410969]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.411007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.411034]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.411056]  kasan_report+0x141/0x180
[   29.411091]  ? kasan_atomics_helper+0x4fa5/0x5450
[   29.411118]  __asan_report_load8_noabort+0x18/0x20
[   29.411159]  kasan_atomics_helper+0x4fa5/0x5450
[   29.411184]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.411220]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.411269]  ? kasan_atomics+0x152/0x310
[   29.411296]  kasan_atomics+0x1dc/0x310
[   29.411332]  ? __pfx_kasan_atomics+0x10/0x10
[   29.411369]  ? __pfx_read_tsc+0x10/0x10
[   29.411391]  ? ktime_get_ts64+0x86/0x230
[   29.411415]  kunit_try_run_case+0x1a5/0x480
[   29.411439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.411461]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.411485]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.411509]  ? __kthread_parkme+0x82/0x180
[   29.411533]  ? preempt_count_sub+0x50/0x80
[   29.411556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.411580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.411604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.411628]  kthread+0x337/0x6f0
[   29.411647]  ? trace_preempt_on+0x20/0xc0
[   29.411669]  ? __pfx_kthread+0x10/0x10
[   29.411690]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.411716]  ? calculate_sigpending+0x7b/0xa0
[   29.411741]  ? __pfx_kthread+0x10/0x10
[   29.411763]  ret_from_fork+0x116/0x1d0
[   29.411783]  ? __pfx_kthread+0x10/0x10
[   29.411805]  ret_from_fork_asm+0x1a/0x30
[   29.411836]  </TASK>
[   29.411847] 
[   29.419437] Allocated by task 314:
[   29.419616]  kasan_save_stack+0x45/0x70
[   29.419811]  kasan_save_track+0x18/0x40
[   29.420006]  kasan_save_alloc_info+0x3b/0x50
[   29.420197]  __kasan_kmalloc+0xb7/0xc0
[   29.420423]  __kmalloc_cache_noprof+0x189/0x420
[   29.420580]  kasan_atomics+0x95/0x310
[   29.420774]  kunit_try_run_case+0x1a5/0x480
[   29.420914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.421086]  kthread+0x337/0x6f0
[   29.421441]  ret_from_fork+0x116/0x1d0
[   29.423105]  ret_from_fork_asm+0x1a/0x30
[   29.423339] 
[   29.423539] The buggy address belongs to the object at ffff88810458d180
[   29.423539]  which belongs to the cache kmalloc-64 of size 64
[   29.424136] The buggy address is located 0 bytes to the right of
[   29.424136]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.424495] 
[   29.424560] The buggy address belongs to the physical page:
[   29.424719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.424993] flags: 0x200000000000000(node=0|zone=2)
[   29.425178] page_type: f5(slab)
[   29.425294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.425518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.425736] page dumped because: kasan: bad access detected
[   29.425899] 
[   29.425968] Memory state around the buggy address:
[   29.426126]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.426336]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.426549] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.427675]                                      ^
[   29.427912]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.430289]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.431565] ==================================================================
[   29.037946] ==================================================================
[   29.038591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   29.038819] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.039088] 
[   29.039187] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.039233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.039245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.039310] Call Trace:
[   29.039323]  <TASK>
[   29.039338]  dump_stack_lvl+0x73/0xb0
[   29.039366]  print_report+0xd1/0x610
[   29.039388]  ? __virt_addr_valid+0x1db/0x2d0
[   29.039411]  ? kasan_atomics_helper+0x194a/0x5450
[   29.039432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.039494]  ? kasan_atomics_helper+0x194a/0x5450
[   29.039517]  kasan_report+0x141/0x180
[   29.039540]  ? kasan_atomics_helper+0x194a/0x5450
[   29.039568]  kasan_check_range+0x10c/0x1c0
[   29.039591]  __kasan_check_write+0x18/0x20
[   29.039646]  kasan_atomics_helper+0x194a/0x5450
[   29.039671]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.039693]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.039718]  ? kasan_atomics+0x152/0x310
[   29.039744]  kasan_atomics+0x1dc/0x310
[   29.039798]  ? __pfx_kasan_atomics+0x10/0x10
[   29.039822]  ? __pfx_read_tsc+0x10/0x10
[   29.039844]  ? ktime_get_ts64+0x86/0x230
[   29.039868]  kunit_try_run_case+0x1a5/0x480
[   29.039894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.039916]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.039939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.039963]  ? __kthread_parkme+0x82/0x180
[   29.039987]  ? preempt_count_sub+0x50/0x80
[   29.040010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.040034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.040058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.040091]  kthread+0x337/0x6f0
[   29.040111]  ? trace_preempt_on+0x20/0xc0
[   29.040134]  ? __pfx_kthread+0x10/0x10
[   29.040154]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.040176]  ? calculate_sigpending+0x7b/0xa0
[   29.040200]  ? __pfx_kthread+0x10/0x10
[   29.040221]  ret_from_fork+0x116/0x1d0
[   29.040241]  ? __pfx_kthread+0x10/0x10
[   29.040261]  ret_from_fork_asm+0x1a/0x30
[   29.040327]  </TASK>
[   29.040338] 
[   29.048177] Allocated by task 314:
[   29.048414]  kasan_save_stack+0x45/0x70
[   29.048775]  kasan_save_track+0x18/0x40
[   29.048998]  kasan_save_alloc_info+0x3b/0x50
[   29.049272]  __kasan_kmalloc+0xb7/0xc0
[   29.049521]  __kmalloc_cache_noprof+0x189/0x420
[   29.049768]  kasan_atomics+0x95/0x310
[   29.049939]  kunit_try_run_case+0x1a5/0x480
[   29.050090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.050258]  kthread+0x337/0x6f0
[   29.050387]  ret_from_fork+0x116/0x1d0
[   29.050604]  ret_from_fork_asm+0x1a/0x30
[   29.050796] 
[   29.050884] The buggy address belongs to the object at ffff88810458d180
[   29.050884]  which belongs to the cache kmalloc-64 of size 64
[   29.051453] The buggy address is located 0 bytes to the right of
[   29.051453]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.051950] 
[   29.052018] The buggy address belongs to the physical page:
[   29.052285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.052633] flags: 0x200000000000000(node=0|zone=2)
[   29.052807] page_type: f5(slab)
[   29.053000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.053371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.053698] page dumped because: kasan: bad access detected
[   29.053939] 
[   29.054029] Memory state around the buggy address:
[   29.054282]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.054598]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.054934] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.055259]                                      ^
[   29.055487]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.055790]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.056047] ==================================================================
[   28.752444] ==================================================================
[   28.752780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   28.753246] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.753476] 
[   28.753577] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.753624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.753636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.753658] Call Trace:
[   28.753673]  <TASK>
[   28.753688]  dump_stack_lvl+0x73/0xb0
[   28.753716]  print_report+0xd1/0x610
[   28.753748]  ? __virt_addr_valid+0x1db/0x2d0
[   28.753950]  ? kasan_atomics_helper+0x49e8/0x5450
[   28.753978]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.754005]  ? kasan_atomics_helper+0x49e8/0x5450
[   28.754111]  kasan_report+0x141/0x180
[   28.754193]  ? kasan_atomics_helper+0x49e8/0x5450
[   28.754221]  __asan_report_load4_noabort+0x18/0x20
[   28.754297]  kasan_atomics_helper+0x49e8/0x5450
[   28.754321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.754344]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.754369]  ? kasan_atomics+0x152/0x310
[   28.754395]  kasan_atomics+0x1dc/0x310
[   28.754417]  ? __pfx_kasan_atomics+0x10/0x10
[   28.754442]  ? __pfx_read_tsc+0x10/0x10
[   28.754463]  ? ktime_get_ts64+0x86/0x230
[   28.754487]  kunit_try_run_case+0x1a5/0x480
[   28.754635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.754660]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.754683]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.754707]  ? __kthread_parkme+0x82/0x180
[   28.754731]  ? preempt_count_sub+0x50/0x80
[   28.754755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.754779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.754802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.754826]  kthread+0x337/0x6f0
[   28.754845]  ? trace_preempt_on+0x20/0xc0
[   28.754868]  ? __pfx_kthread+0x10/0x10
[   28.754889]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.754911]  ? calculate_sigpending+0x7b/0xa0
[   28.754934]  ? __pfx_kthread+0x10/0x10
[   28.754956]  ret_from_fork+0x116/0x1d0
[   28.754975]  ? __pfx_kthread+0x10/0x10
[   28.754995]  ret_from_fork_asm+0x1a/0x30
[   28.755027]  </TASK>
[   28.755039] 
[   28.764521] Allocated by task 314:
[   28.764813]  kasan_save_stack+0x45/0x70
[   28.764982]  kasan_save_track+0x18/0x40
[   28.765183]  kasan_save_alloc_info+0x3b/0x50
[   28.765819]  __kasan_kmalloc+0xb7/0xc0
[   28.765993]  __kmalloc_cache_noprof+0x189/0x420
[   28.766491]  kasan_atomics+0x95/0x310
[   28.766672]  kunit_try_run_case+0x1a5/0x480
[   28.766987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.767240]  kthread+0x337/0x6f0
[   28.767598]  ret_from_fork+0x116/0x1d0
[   28.767863]  ret_from_fork_asm+0x1a/0x30
[   28.768029] 
[   28.768212] The buggy address belongs to the object at ffff88810458d180
[   28.768212]  which belongs to the cache kmalloc-64 of size 64
[   28.768904] The buggy address is located 0 bytes to the right of
[   28.768904]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.769482] 
[   28.769811] The buggy address belongs to the physical page:
[   28.770070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.770605] flags: 0x200000000000000(node=0|zone=2)
[   28.770923] page_type: f5(slab)
[   28.771225] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.771677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.772003] page dumped because: kasan: bad access detected
[   28.772357] 
[   28.772457] Memory state around the buggy address:
[   28.772679]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.772992]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.773568] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.773854]                                      ^
[   28.774074]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.774611]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.774977] ==================================================================
[   28.638303] ==================================================================
[   28.638676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   28.638991] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.639285] 
[   28.639420] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.639482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.639495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.639517] Call Trace:
[   28.639531]  <TASK>
[   28.639549]  dump_stack_lvl+0x73/0xb0
[   28.639577]  print_report+0xd1/0x610
[   28.639600]  ? __virt_addr_valid+0x1db/0x2d0
[   28.639623]  ? kasan_atomics_helper+0x1079/0x5450
[   28.639645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.639671]  ? kasan_atomics_helper+0x1079/0x5450
[   28.639703]  kasan_report+0x141/0x180
[   28.639726]  ? kasan_atomics_helper+0x1079/0x5450
[   28.639752]  kasan_check_range+0x10c/0x1c0
[   28.639787]  __kasan_check_write+0x18/0x20
[   28.639811]  kasan_atomics_helper+0x1079/0x5450
[   28.639835]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.639857]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.639882]  ? kasan_atomics+0x152/0x310
[   28.639909]  kasan_atomics+0x1dc/0x310
[   28.639932]  ? __pfx_kasan_atomics+0x10/0x10
[   28.639957]  ? __pfx_read_tsc+0x10/0x10
[   28.639979]  ? ktime_get_ts64+0x86/0x230
[   28.640003]  kunit_try_run_case+0x1a5/0x480
[   28.640028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.640051]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.640075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.640109]  ? __kthread_parkme+0x82/0x180
[   28.640133]  ? preempt_count_sub+0x50/0x80
[   28.640157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.640192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.640216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.640239]  kthread+0x337/0x6f0
[   28.640270]  ? trace_preempt_on+0x20/0xc0
[   28.640294]  ? __pfx_kthread+0x10/0x10
[   28.640332]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.640355]  ? calculate_sigpending+0x7b/0xa0
[   28.640389]  ? __pfx_kthread+0x10/0x10
[   28.640411]  ret_from_fork+0x116/0x1d0
[   28.640430]  ? __pfx_kthread+0x10/0x10
[   28.640451]  ret_from_fork_asm+0x1a/0x30
[   28.640483]  </TASK>
[   28.640494] 
[   28.653783] Allocated by task 314:
[   28.653941]  kasan_save_stack+0x45/0x70
[   28.654374]  kasan_save_track+0x18/0x40
[   28.654547]  kasan_save_alloc_info+0x3b/0x50
[   28.654897]  __kasan_kmalloc+0xb7/0xc0
[   28.655074]  __kmalloc_cache_noprof+0x189/0x420
[   28.655433]  kasan_atomics+0x95/0x310
[   28.655624]  kunit_try_run_case+0x1a5/0x480
[   28.655821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.656107]  kthread+0x337/0x6f0
[   28.656464]  ret_from_fork+0x116/0x1d0
[   28.656655]  ret_from_fork_asm+0x1a/0x30
[   28.656975] 
[   28.657074] The buggy address belongs to the object at ffff88810458d180
[   28.657074]  which belongs to the cache kmalloc-64 of size 64
[   28.657734] The buggy address is located 0 bytes to the right of
[   28.657734]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.658467] 
[   28.658665] The buggy address belongs to the physical page:
[   28.658986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.659431] flags: 0x200000000000000(node=0|zone=2)
[   28.659612] page_type: f5(slab)
[   28.659951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.660392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.660743] page dumped because: kasan: bad access detected
[   28.661075] 
[   28.661183] Memory state around the buggy address:
[   28.661621]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.661994]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.662522] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.662900]                                      ^
[   28.663154]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.663659]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.663984] ==================================================================
[   29.196252] ==================================================================
[   29.197074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   29.197819] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.198546] 
[   29.198755] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.198804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.198817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.198839] Call Trace:
[   29.198855]  <TASK>
[   29.198902]  dump_stack_lvl+0x73/0xb0
[   29.198932]  print_report+0xd1/0x610
[   29.198955]  ? __virt_addr_valid+0x1db/0x2d0
[   29.198985]  ? kasan_atomics_helper+0x1d7a/0x5450
[   29.199007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.199032]  ? kasan_atomics_helper+0x1d7a/0x5450
[   29.199054]  kasan_report+0x141/0x180
[   29.199084]  ? kasan_atomics_helper+0x1d7a/0x5450
[   29.199111]  kasan_check_range+0x10c/0x1c0
[   29.199135]  __kasan_check_write+0x18/0x20
[   29.199158]  kasan_atomics_helper+0x1d7a/0x5450
[   29.199181]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.199203]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.199228]  ? kasan_atomics+0x152/0x310
[   29.199255]  kasan_atomics+0x1dc/0x310
[   29.199283]  ? __pfx_kasan_atomics+0x10/0x10
[   29.199307]  ? __pfx_read_tsc+0x10/0x10
[   29.199328]  ? ktime_get_ts64+0x86/0x230
[   29.199352]  kunit_try_run_case+0x1a5/0x480
[   29.199376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.199399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.199423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.199446]  ? __kthread_parkme+0x82/0x180
[   29.199470]  ? preempt_count_sub+0x50/0x80
[   29.199494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.199517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.199542]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.199565]  kthread+0x337/0x6f0
[   29.199584]  ? trace_preempt_on+0x20/0xc0
[   29.199607]  ? __pfx_kthread+0x10/0x10
[   29.199627]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.199650]  ? calculate_sigpending+0x7b/0xa0
[   29.199673]  ? __pfx_kthread+0x10/0x10
[   29.199695]  ret_from_fork+0x116/0x1d0
[   29.199714]  ? __pfx_kthread+0x10/0x10
[   29.199734]  ret_from_fork_asm+0x1a/0x30
[   29.199766]  </TASK>
[   29.199777] 
[   29.211019] Allocated by task 314:
[   29.211412]  kasan_save_stack+0x45/0x70
[   29.211804]  kasan_save_track+0x18/0x40
[   29.212190]  kasan_save_alloc_info+0x3b/0x50
[   29.212619]  __kasan_kmalloc+0xb7/0xc0
[   29.212988]  __kmalloc_cache_noprof+0x189/0x420
[   29.213451]  kasan_atomics+0x95/0x310
[   29.213863]  kunit_try_run_case+0x1a5/0x480
[   29.214299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.214793]  kthread+0x337/0x6f0
[   29.215044]  ret_from_fork+0x116/0x1d0
[   29.215180]  ret_from_fork_asm+0x1a/0x30
[   29.215440] 
[   29.215603] The buggy address belongs to the object at ffff88810458d180
[   29.215603]  which belongs to the cache kmalloc-64 of size 64
[   29.216687] The buggy address is located 0 bytes to the right of
[   29.216687]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.217036] 
[   29.217109] The buggy address belongs to the physical page:
[   29.217269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.218031] flags: 0x200000000000000(node=0|zone=2)
[   29.218518] page_type: f5(slab)
[   29.218834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.219582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.220266] page dumped because: kasan: bad access detected
[   29.220491] 
[   29.220666] Memory state around the buggy address:
[   29.221105]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.221489]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.221695] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.221894]                                      ^
[   29.222043]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.222518]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.222897] ==================================================================
[   28.457689] ==================================================================
[   28.457988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   28.458232] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.458863] 
[   28.458965] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.459014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.459045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.459067] Call Trace:
[   28.459107]  <TASK>
[   28.459124]  dump_stack_lvl+0x73/0xb0
[   28.459153]  print_report+0xd1/0x610
[   28.459194]  ? __virt_addr_valid+0x1db/0x2d0
[   28.459220]  ? kasan_atomics_helper+0xc70/0x5450
[   28.459258]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.459295]  ? kasan_atomics_helper+0xc70/0x5450
[   28.459318]  kasan_report+0x141/0x180
[   28.459342]  ? kasan_atomics_helper+0xc70/0x5450
[   28.459369]  kasan_check_range+0x10c/0x1c0
[   28.459393]  __kasan_check_write+0x18/0x20
[   28.459416]  kasan_atomics_helper+0xc70/0x5450
[   28.459439]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.459461]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.459486]  ? kasan_atomics+0x152/0x310
[   28.459513]  kasan_atomics+0x1dc/0x310
[   28.459552]  ? __pfx_kasan_atomics+0x10/0x10
[   28.459590]  ? __pfx_read_tsc+0x10/0x10
[   28.459625]  ? ktime_get_ts64+0x86/0x230
[   28.459650]  kunit_try_run_case+0x1a5/0x480
[   28.459674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.459696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.459720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.459745]  ? __kthread_parkme+0x82/0x180
[   28.459768]  ? preempt_count_sub+0x50/0x80
[   28.459791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.459815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.459839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.459862]  kthread+0x337/0x6f0
[   28.459882]  ? trace_preempt_on+0x20/0xc0
[   28.459905]  ? __pfx_kthread+0x10/0x10
[   28.459926]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.459948]  ? calculate_sigpending+0x7b/0xa0
[   28.459971]  ? __pfx_kthread+0x10/0x10
[   28.459994]  ret_from_fork+0x116/0x1d0
[   28.460013]  ? __pfx_kthread+0x10/0x10
[   28.460034]  ret_from_fork_asm+0x1a/0x30
[   28.460066]  </TASK>
[   28.460087] 
[   28.467467] Allocated by task 314:
[   28.467639]  kasan_save_stack+0x45/0x70
[   28.467826]  kasan_save_track+0x18/0x40
[   28.468005]  kasan_save_alloc_info+0x3b/0x50
[   28.468216]  __kasan_kmalloc+0xb7/0xc0
[   28.468404]  __kmalloc_cache_noprof+0x189/0x420
[   28.468600]  kasan_atomics+0x95/0x310
[   28.468721]  kunit_try_run_case+0x1a5/0x480
[   28.468922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.469195]  kthread+0x337/0x6f0
[   28.469405]  ret_from_fork+0x116/0x1d0
[   28.469541]  ret_from_fork_asm+0x1a/0x30
[   28.469752] 
[   28.469837] The buggy address belongs to the object at ffff88810458d180
[   28.469837]  which belongs to the cache kmalloc-64 of size 64
[   28.470294] The buggy address is located 0 bytes to the right of
[   28.470294]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.470847] 
[   28.470945] The buggy address belongs to the physical page:
[   28.471194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.471501] flags: 0x200000000000000(node=0|zone=2)
[   28.471723] page_type: f5(slab)
[   28.471890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.472179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.472632] page dumped because: kasan: bad access detected
[   28.472824] 
[   28.472905] Memory state around the buggy address:
[   28.473153]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.473493]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.473750] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.474063]                                      ^
[   28.474282]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.474673]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.475001] ==================================================================
[   28.882360] ==================================================================
[   28.882743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   28.883496] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.884061] 
[   28.884319] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.884468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.884487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.884511] Call Trace:
[   28.884527]  <TASK>
[   28.884543]  dump_stack_lvl+0x73/0xb0
[   28.884573]  print_report+0xd1/0x610
[   28.884596]  ? __virt_addr_valid+0x1db/0x2d0
[   28.884620]  ? kasan_atomics_helper+0x50d4/0x5450
[   28.884641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.884668]  ? kasan_atomics_helper+0x50d4/0x5450
[   28.884689]  kasan_report+0x141/0x180
[   28.884712]  ? kasan_atomics_helper+0x50d4/0x5450
[   28.884739]  __asan_report_store8_noabort+0x1b/0x30
[   28.884763]  kasan_atomics_helper+0x50d4/0x5450
[   28.884786]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.884808]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.884833]  ? kasan_atomics+0x152/0x310
[   28.884860]  kasan_atomics+0x1dc/0x310
[   28.884882]  ? __pfx_kasan_atomics+0x10/0x10
[   28.884906]  ? __pfx_read_tsc+0x10/0x10
[   28.884928]  ? ktime_get_ts64+0x86/0x230
[   28.884952]  kunit_try_run_case+0x1a5/0x480
[   28.884976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.884999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.885022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.885046]  ? __kthread_parkme+0x82/0x180
[   28.885070]  ? preempt_count_sub+0x50/0x80
[   28.885106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.885130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.885154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.885178]  kthread+0x337/0x6f0
[   28.885197]  ? trace_preempt_on+0x20/0xc0
[   28.885221]  ? __pfx_kthread+0x10/0x10
[   28.885241]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.885263]  ? calculate_sigpending+0x7b/0xa0
[   28.885286]  ? __pfx_kthread+0x10/0x10
[   28.885308]  ret_from_fork+0x116/0x1d0
[   28.885327]  ? __pfx_kthread+0x10/0x10
[   28.885348]  ret_from_fork_asm+0x1a/0x30
[   28.885379]  </TASK>
[   28.885390] 
[   28.894893] Allocated by task 314:
[   28.895068]  kasan_save_stack+0x45/0x70
[   28.895278]  kasan_save_track+0x18/0x40
[   28.895851]  kasan_save_alloc_info+0x3b/0x50
[   28.896010]  __kasan_kmalloc+0xb7/0xc0
[   28.896348]  __kmalloc_cache_noprof+0x189/0x420
[   28.896658]  kasan_atomics+0x95/0x310
[   28.896831]  kunit_try_run_case+0x1a5/0x480
[   28.897176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.897535]  kthread+0x337/0x6f0
[   28.897824]  ret_from_fork+0x116/0x1d0
[   28.898003]  ret_from_fork_asm+0x1a/0x30
[   28.898303] 
[   28.898379] The buggy address belongs to the object at ffff88810458d180
[   28.898379]  which belongs to the cache kmalloc-64 of size 64
[   28.898937] The buggy address is located 0 bytes to the right of
[   28.898937]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.899353] 
[   28.899842] The buggy address belongs to the physical page:
[   28.900122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.900512] flags: 0x200000000000000(node=0|zone=2)
[   28.900679] page_type: f5(slab)
[   28.900800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.901034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.901271] page dumped because: kasan: bad access detected
[   28.901438] 
[   28.901502] Memory state around the buggy address:
[   28.901651]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.901878]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.902117] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.902325]                                      ^
[   28.902474]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.902683]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.902890] ==================================================================
[   28.841567] ==================================================================
[   28.841962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   28.842615] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.843015] 
[   28.843116] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.843164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.843176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.843197] Call Trace:
[   28.843211]  <TASK>
[   28.843226]  dump_stack_lvl+0x73/0xb0
[   28.843256]  print_report+0xd1/0x610
[   28.843278]  ? __virt_addr_valid+0x1db/0x2d0
[   28.843303]  ? kasan_atomics_helper+0x4eae/0x5450
[   28.843324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.843351]  ? kasan_atomics_helper+0x4eae/0x5450
[   28.843373]  kasan_report+0x141/0x180
[   28.843395]  ? kasan_atomics_helper+0x4eae/0x5450
[   28.843422]  __asan_report_load8_noabort+0x18/0x20
[   28.843446]  kasan_atomics_helper+0x4eae/0x5450
[   28.843469]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.843491]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.843516]  ? kasan_atomics+0x152/0x310
[   28.843542]  kasan_atomics+0x1dc/0x310
[   28.843567]  ? __pfx_kasan_atomics+0x10/0x10
[   28.843592]  ? __pfx_read_tsc+0x10/0x10
[   28.843615]  ? ktime_get_ts64+0x86/0x230
[   28.843639]  kunit_try_run_case+0x1a5/0x480
[   28.843663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.843685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.843708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.843732]  ? __kthread_parkme+0x82/0x180
[   28.843756]  ? preempt_count_sub+0x50/0x80
[   28.843779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.843803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.843826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.843850]  kthread+0x337/0x6f0
[   28.843869]  ? trace_preempt_on+0x20/0xc0
[   28.843892]  ? __pfx_kthread+0x10/0x10
[   28.843913]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.843935]  ? calculate_sigpending+0x7b/0xa0
[   28.843959]  ? __pfx_kthread+0x10/0x10
[   28.843980]  ret_from_fork+0x116/0x1d0
[   28.843999]  ? __pfx_kthread+0x10/0x10
[   28.844020]  ret_from_fork_asm+0x1a/0x30
[   28.844052]  </TASK>
[   28.844062] 
[   28.850984] Allocated by task 314:
[   28.851114]  kasan_save_stack+0x45/0x70
[   28.851321]  kasan_save_track+0x18/0x40
[   28.851510]  kasan_save_alloc_info+0x3b/0x50
[   28.851710]  __kasan_kmalloc+0xb7/0xc0
[   28.851889]  __kmalloc_cache_noprof+0x189/0x420
[   28.852112]  kasan_atomics+0x95/0x310
[   28.852239]  kunit_try_run_case+0x1a5/0x480
[   28.852376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.852544]  kthread+0x337/0x6f0
[   28.852684]  ret_from_fork+0x116/0x1d0
[   28.852996]  ret_from_fork_asm+0x1a/0x30
[   28.853200] 
[   28.853288] The buggy address belongs to the object at ffff88810458d180
[   28.853288]  which belongs to the cache kmalloc-64 of size 64
[   28.853678] The buggy address is located 0 bytes to the right of
[   28.853678]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.854087] 
[   28.854178] The buggy address belongs to the physical page:
[   28.854419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.854769] flags: 0x200000000000000(node=0|zone=2)
[   28.855125] page_type: f5(slab)
[   28.855293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.855599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.855818] page dumped because: kasan: bad access detected
[   28.855980] 
[   28.856041] Memory state around the buggy address:
[   28.856273]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.856589]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.856902] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.857182]                                      ^
[   28.857427]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.857692]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.857932] ==================================================================
[   29.322911] ==================================================================
[   29.323335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   29.323682] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.324012] 
[   29.324123] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.324168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.324180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.324201] Call Trace:
[   29.324214]  <TASK>
[   29.324227]  dump_stack_lvl+0x73/0xb0
[   29.324254]  print_report+0xd1/0x610
[   29.324276]  ? __virt_addr_valid+0x1db/0x2d0
[   29.324311]  ? kasan_atomics_helper+0x4f98/0x5450
[   29.324333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.324359]  ? kasan_atomics_helper+0x4f98/0x5450
[   29.324381]  kasan_report+0x141/0x180
[   29.324403]  ? kasan_atomics_helper+0x4f98/0x5450
[   29.324430]  __asan_report_load8_noabort+0x18/0x20
[   29.324455]  kasan_atomics_helper+0x4f98/0x5450
[   29.324477]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.324499]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.324524]  ? kasan_atomics+0x152/0x310
[   29.324551]  kasan_atomics+0x1dc/0x310
[   29.324574]  ? __pfx_kasan_atomics+0x10/0x10
[   29.324598]  ? __pfx_read_tsc+0x10/0x10
[   29.324620]  ? ktime_get_ts64+0x86/0x230
[   29.324644]  kunit_try_run_case+0x1a5/0x480
[   29.324669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.324691]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.324715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.324739]  ? __kthread_parkme+0x82/0x180
[   29.324763]  ? preempt_count_sub+0x50/0x80
[   29.324786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.324810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.324834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.324857]  kthread+0x337/0x6f0
[   29.324876]  ? trace_preempt_on+0x20/0xc0
[   29.324899]  ? __pfx_kthread+0x10/0x10
[   29.324919]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.324941]  ? calculate_sigpending+0x7b/0xa0
[   29.324964]  ? __pfx_kthread+0x10/0x10
[   29.324986]  ret_from_fork+0x116/0x1d0
[   29.325005]  ? __pfx_kthread+0x10/0x10
[   29.325026]  ret_from_fork_asm+0x1a/0x30
[   29.325057]  </TASK>
[   29.325068] 
[   29.333472] Allocated by task 314:
[   29.333635]  kasan_save_stack+0x45/0x70
[   29.333810]  kasan_save_track+0x18/0x40
[   29.333976]  kasan_save_alloc_info+0x3b/0x50
[   29.334153]  __kasan_kmalloc+0xb7/0xc0
[   29.334374]  __kmalloc_cache_noprof+0x189/0x420
[   29.334576]  kasan_atomics+0x95/0x310
[   29.334727]  kunit_try_run_case+0x1a5/0x480
[   29.334886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.335124]  kthread+0x337/0x6f0
[   29.335265]  ret_from_fork+0x116/0x1d0
[   29.335447]  ret_from_fork_asm+0x1a/0x30
[   29.335578] 
[   29.335668] The buggy address belongs to the object at ffff88810458d180
[   29.335668]  which belongs to the cache kmalloc-64 of size 64
[   29.336145] The buggy address is located 0 bytes to the right of
[   29.336145]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.336605] 
[   29.336694] The buggy address belongs to the physical page:
[   29.336918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.337222] flags: 0x200000000000000(node=0|zone=2)
[   29.337552] page_type: f5(slab)
[   29.337710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.338011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.338331] page dumped because: kasan: bad access detected
[   29.338553] 
[   29.338624] Memory state around the buggy address:
[   29.338823]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.339091]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.339405] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.339675]                                      ^
[   29.339861]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.340067]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.340293] ==================================================================
[   28.944523] ==================================================================
[   28.944858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   28.945207] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.945654] 
[   28.945733] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.945779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.945792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.945813] Call Trace:
[   28.945827]  <TASK>
[   28.945841]  dump_stack_lvl+0x73/0xb0
[   28.945869]  print_report+0xd1/0x610
[   28.945890]  ? __virt_addr_valid+0x1db/0x2d0
[   28.945913]  ? kasan_atomics_helper+0x164f/0x5450
[   28.945939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.945965]  ? kasan_atomics_helper+0x164f/0x5450
[   28.945987]  kasan_report+0x141/0x180
[   28.946009]  ? kasan_atomics_helper+0x164f/0x5450
[   28.946037]  kasan_check_range+0x10c/0x1c0
[   28.946060]  __kasan_check_write+0x18/0x20
[   28.946095]  kasan_atomics_helper+0x164f/0x5450
[   28.946118]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.946141]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.946166]  ? kasan_atomics+0x152/0x310
[   28.946221]  kasan_atomics+0x1dc/0x310
[   28.946245]  ? __pfx_kasan_atomics+0x10/0x10
[   28.946269]  ? __pfx_read_tsc+0x10/0x10
[   28.946301]  ? ktime_get_ts64+0x86/0x230
[   28.946324]  kunit_try_run_case+0x1a5/0x480
[   28.946348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.946371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.946413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.946437]  ? __kthread_parkme+0x82/0x180
[   28.946461]  ? preempt_count_sub+0x50/0x80
[   28.946484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.946509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.946532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.946557]  kthread+0x337/0x6f0
[   28.946577]  ? trace_preempt_on+0x20/0xc0
[   28.946600]  ? __pfx_kthread+0x10/0x10
[   28.946620]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.946643]  ? calculate_sigpending+0x7b/0xa0
[   28.946667]  ? __pfx_kthread+0x10/0x10
[   28.946689]  ret_from_fork+0x116/0x1d0
[   28.946708]  ? __pfx_kthread+0x10/0x10
[   28.946729]  ret_from_fork_asm+0x1a/0x30
[   28.946760]  </TASK>
[   28.946771] 
[   28.954251] Allocated by task 314:
[   28.954374]  kasan_save_stack+0x45/0x70
[   28.954508]  kasan_save_track+0x18/0x40
[   28.954817]  kasan_save_alloc_info+0x3b/0x50
[   28.955026]  __kasan_kmalloc+0xb7/0xc0
[   28.955239]  __kmalloc_cache_noprof+0x189/0x420
[   28.955445]  kasan_atomics+0x95/0x310
[   28.955571]  kunit_try_run_case+0x1a5/0x480
[   28.955786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.956047]  kthread+0x337/0x6f0
[   28.956239]  ret_from_fork+0x116/0x1d0
[   28.956420]  ret_from_fork_asm+0x1a/0x30
[   28.956555] 
[   28.956618] The buggy address belongs to the object at ffff88810458d180
[   28.956618]  which belongs to the cache kmalloc-64 of size 64
[   28.957041] The buggy address is located 0 bytes to the right of
[   28.957041]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.957650] 
[   28.957738] The buggy address belongs to the physical page:
[   28.958015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.958368] flags: 0x200000000000000(node=0|zone=2)
[   28.958525] page_type: f5(slab)
[   28.958639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.958862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.959090] page dumped because: kasan: bad access detected
[   28.959334] 
[   28.959421] Memory state around the buggy address:
[   28.959638]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.959958]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.960333] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.960540]                                      ^
[   28.960687]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.961016]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.961411] ==================================================================
[   29.306756] ==================================================================
[   29.307111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   29.307494] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.307792] 
[   29.307887] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.307933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.307945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.307966] Call Trace:
[   29.307981]  <TASK>
[   29.307996]  dump_stack_lvl+0x73/0xb0
[   29.308023]  print_report+0xd1/0x610
[   29.308046]  ? __virt_addr_valid+0x1db/0x2d0
[   29.308069]  ? kasan_atomics_helper+0x2006/0x5450
[   29.308104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.308131]  ? kasan_atomics_helper+0x2006/0x5450
[   29.308153]  kasan_report+0x141/0x180
[   29.308176]  ? kasan_atomics_helper+0x2006/0x5450
[   29.308202]  kasan_check_range+0x10c/0x1c0
[   29.308227]  __kasan_check_write+0x18/0x20
[   29.308250]  kasan_atomics_helper+0x2006/0x5450
[   29.308273]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.308306]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.308331]  ? kasan_atomics+0x152/0x310
[   29.308358]  kasan_atomics+0x1dc/0x310
[   29.308381]  ? __pfx_kasan_atomics+0x10/0x10
[   29.308405]  ? __pfx_read_tsc+0x10/0x10
[   29.308426]  ? ktime_get_ts64+0x86/0x230
[   29.308450]  kunit_try_run_case+0x1a5/0x480
[   29.308474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.308497]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.308520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.308544]  ? __kthread_parkme+0x82/0x180
[   29.308568]  ? preempt_count_sub+0x50/0x80
[   29.308590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.308614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.308637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.308661]  kthread+0x337/0x6f0
[   29.308680]  ? trace_preempt_on+0x20/0xc0
[   29.308703]  ? __pfx_kthread+0x10/0x10
[   29.308724]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.308745]  ? calculate_sigpending+0x7b/0xa0
[   29.308769]  ? __pfx_kthread+0x10/0x10
[   29.308790]  ret_from_fork+0x116/0x1d0
[   29.308809]  ? __pfx_kthread+0x10/0x10
[   29.308829]  ret_from_fork_asm+0x1a/0x30
[   29.308860]  </TASK>
[   29.308871] 
[   29.316054] Allocated by task 314:
[   29.316203]  kasan_save_stack+0x45/0x70
[   29.316376]  kasan_save_track+0x18/0x40
[   29.316547]  kasan_save_alloc_info+0x3b/0x50
[   29.316744]  __kasan_kmalloc+0xb7/0xc0
[   29.316895]  __kmalloc_cache_noprof+0x189/0x420
[   29.317098]  kasan_atomics+0x95/0x310
[   29.317245]  kunit_try_run_case+0x1a5/0x480
[   29.317428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.317649]  kthread+0x337/0x6f0
[   29.317773]  ret_from_fork+0x116/0x1d0
[   29.317956]  ret_from_fork_asm+0x1a/0x30
[   29.318099] 
[   29.318164] The buggy address belongs to the object at ffff88810458d180
[   29.318164]  which belongs to the cache kmalloc-64 of size 64
[   29.318703] The buggy address is located 0 bytes to the right of
[   29.318703]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.319059] 
[   29.319131] The buggy address belongs to the physical page:
[   29.319296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.319526] flags: 0x200000000000000(node=0|zone=2)
[   29.319682] page_type: f5(slab)
[   29.319795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.320092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.320423] page dumped because: kasan: bad access detected
[   29.320672] 
[   29.320758] Memory state around the buggy address:
[   29.320973]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.321590]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.321814] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.322023]                                      ^
[   29.322180]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.322387]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.322592] ==================================================================
[   28.798201] ==================================================================
[   28.798585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   28.799153] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.799709] 
[   28.799805] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.799854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.799867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.799887] Call Trace:
[   28.799902]  <TASK>
[   28.799918]  dump_stack_lvl+0x73/0xb0
[   28.799949]  print_report+0xd1/0x610
[   28.799971]  ? __virt_addr_valid+0x1db/0x2d0
[   28.799995]  ? kasan_atomics_helper+0x49ce/0x5450
[   28.800016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.800042]  ? kasan_atomics_helper+0x49ce/0x5450
[   28.800064]  kasan_report+0x141/0x180
[   28.800099]  ? kasan_atomics_helper+0x49ce/0x5450
[   28.800126]  __asan_report_load4_noabort+0x18/0x20
[   28.800150]  kasan_atomics_helper+0x49ce/0x5450
[   28.800173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.800195]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.800220]  ? kasan_atomics+0x152/0x310
[   28.800246]  kasan_atomics+0x1dc/0x310
[   28.800269]  ? __pfx_kasan_atomics+0x10/0x10
[   28.800458]  ? __pfx_read_tsc+0x10/0x10
[   28.800481]  ? ktime_get_ts64+0x86/0x230
[   28.800505]  kunit_try_run_case+0x1a5/0x480
[   28.800531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.800554]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.800577]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.800601]  ? __kthread_parkme+0x82/0x180
[   28.800625]  ? preempt_count_sub+0x50/0x80
[   28.800648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.800672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.800696]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.800720]  kthread+0x337/0x6f0
[   28.800739]  ? trace_preempt_on+0x20/0xc0
[   28.800763]  ? __pfx_kthread+0x10/0x10
[   28.800784]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.800806]  ? calculate_sigpending+0x7b/0xa0
[   28.800829]  ? __pfx_kthread+0x10/0x10
[   28.800850]  ret_from_fork+0x116/0x1d0
[   28.800872]  ? __pfx_kthread+0x10/0x10
[   28.800893]  ret_from_fork_asm+0x1a/0x30
[   28.800925]  </TASK>
[   28.800936] 
[   28.810018] Allocated by task 314:
[   28.810178]  kasan_save_stack+0x45/0x70
[   28.810680]  kasan_save_track+0x18/0x40
[   28.810849]  kasan_save_alloc_info+0x3b/0x50
[   28.811127]  __kasan_kmalloc+0xb7/0xc0
[   28.811276]  __kmalloc_cache_noprof+0x189/0x420
[   28.811542]  kasan_atomics+0x95/0x310
[   28.811870]  kunit_try_run_case+0x1a5/0x480
[   28.812058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.812289]  kthread+0x337/0x6f0
[   28.812625]  ret_from_fork+0x116/0x1d0
[   28.812808]  ret_from_fork_asm+0x1a/0x30
[   28.812971] 
[   28.813042] The buggy address belongs to the object at ffff88810458d180
[   28.813042]  which belongs to the cache kmalloc-64 of size 64
[   28.813776] The buggy address is located 0 bytes to the right of
[   28.813776]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.814344] 
[   28.814531] The buggy address belongs to the physical page:
[   28.814785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.815243] flags: 0x200000000000000(node=0|zone=2)
[   28.815555] page_type: f5(slab)
[   28.815686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.816001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.816321] page dumped because: kasan: bad access detected
[   28.816745] 
[   28.816837] Memory state around the buggy address:
[   28.817144]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.817508]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.817864] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.818176]                                      ^
[   28.818567]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.818863]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.819160] ==================================================================
[   28.335309] ==================================================================
[   28.335657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   28.335971] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.336507] 
[   28.336631] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.336709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.336722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.336754] Call Trace:
[   28.336768]  <TASK>
[   28.336785]  dump_stack_lvl+0x73/0xb0
[   28.336814]  print_report+0xd1/0x610
[   28.336836]  ? __virt_addr_valid+0x1db/0x2d0
[   28.336859]  ? kasan_atomics_helper+0x860/0x5450
[   28.336880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.336907]  ? kasan_atomics_helper+0x860/0x5450
[   28.336928]  kasan_report+0x141/0x180
[   28.336950]  ? kasan_atomics_helper+0x860/0x5450
[   28.336977]  kasan_check_range+0x10c/0x1c0
[   28.337001]  __kasan_check_write+0x18/0x20
[   28.337024]  kasan_atomics_helper+0x860/0x5450
[   28.337046]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.337071]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.337105]  ? kasan_atomics+0x152/0x310
[   28.337131]  kasan_atomics+0x1dc/0x310
[   28.337187]  ? __pfx_kasan_atomics+0x10/0x10
[   28.337212]  ? __pfx_read_tsc+0x10/0x10
[   28.337243]  ? ktime_get_ts64+0x86/0x230
[   28.337268]  kunit_try_run_case+0x1a5/0x480
[   28.337293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.337316]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.337339]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.337363]  ? __kthread_parkme+0x82/0x180
[   28.337388]  ? preempt_count_sub+0x50/0x80
[   28.337413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.337562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.337594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.337618]  kthread+0x337/0x6f0
[   28.337638]  ? trace_preempt_on+0x20/0xc0
[   28.337662]  ? __pfx_kthread+0x10/0x10
[   28.337683]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.337706]  ? calculate_sigpending+0x7b/0xa0
[   28.337730]  ? __pfx_kthread+0x10/0x10
[   28.337751]  ret_from_fork+0x116/0x1d0
[   28.337771]  ? __pfx_kthread+0x10/0x10
[   28.337791]  ret_from_fork_asm+0x1a/0x30
[   28.337824]  </TASK>
[   28.337835] 
[   28.345426] Allocated by task 314:
[   28.345607]  kasan_save_stack+0x45/0x70
[   28.345785]  kasan_save_track+0x18/0x40
[   28.345955]  kasan_save_alloc_info+0x3b/0x50
[   28.346129]  __kasan_kmalloc+0xb7/0xc0
[   28.346258]  __kmalloc_cache_noprof+0x189/0x420
[   28.346605]  kasan_atomics+0x95/0x310
[   28.346805]  kunit_try_run_case+0x1a5/0x480
[   28.346994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.347260]  kthread+0x337/0x6f0
[   28.347418]  ret_from_fork+0x116/0x1d0
[   28.347626]  ret_from_fork_asm+0x1a/0x30
[   28.347914] 
[   28.347998] The buggy address belongs to the object at ffff88810458d180
[   28.347998]  which belongs to the cache kmalloc-64 of size 64
[   28.348588] The buggy address is located 0 bytes to the right of
[   28.348588]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.348953] 
[   28.349017] The buggy address belongs to the physical page:
[   28.349196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.349437] flags: 0x200000000000000(node=0|zone=2)
[   28.349645] page_type: f5(slab)
[   28.349810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.350206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.350542] page dumped because: kasan: bad access detected
[   28.350789] 
[   28.350875] Memory state around the buggy address:
[   28.351105]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.351595]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.351915] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.352174]                                      ^
[   28.352489]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.352771]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.353066] ==================================================================
[   29.289757] ==================================================================
[   29.290206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   29.290435] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.290650] 
[   29.290724] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.290770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.290782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.290803] Call Trace:
[   29.290816]  <TASK>
[   29.290830]  dump_stack_lvl+0x73/0xb0
[   29.290856]  print_report+0xd1/0x610
[   29.290878]  ? __virt_addr_valid+0x1db/0x2d0
[   29.290900]  ? kasan_atomics_helper+0x4f71/0x5450
[   29.290921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.290947]  ? kasan_atomics_helper+0x4f71/0x5450
[   29.290969]  kasan_report+0x141/0x180
[   29.290991]  ? kasan_atomics_helper+0x4f71/0x5450
[   29.291017]  __asan_report_load8_noabort+0x18/0x20
[   29.291041]  kasan_atomics_helper+0x4f71/0x5450
[   29.291075]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.291111]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.291136]  ? kasan_atomics+0x152/0x310
[   29.291163]  kasan_atomics+0x1dc/0x310
[   29.291185]  ? __pfx_kasan_atomics+0x10/0x10
[   29.291210]  ? __pfx_read_tsc+0x10/0x10
[   29.291231]  ? ktime_get_ts64+0x86/0x230
[   29.291256]  kunit_try_run_case+0x1a5/0x480
[   29.291280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.291302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.291325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.291349]  ? __kthread_parkme+0x82/0x180
[   29.291372]  ? preempt_count_sub+0x50/0x80
[   29.291396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.291420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.291451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.291475]  kthread+0x337/0x6f0
[   29.291494]  ? trace_preempt_on+0x20/0xc0
[   29.291518]  ? __pfx_kthread+0x10/0x10
[   29.291538]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.291560]  ? calculate_sigpending+0x7b/0xa0
[   29.291584]  ? __pfx_kthread+0x10/0x10
[   29.291605]  ret_from_fork+0x116/0x1d0
[   29.291625]  ? __pfx_kthread+0x10/0x10
[   29.291645]  ret_from_fork_asm+0x1a/0x30
[   29.291678]  </TASK>
[   29.291688] 
[   29.298854] Allocated by task 314:
[   29.299009]  kasan_save_stack+0x45/0x70
[   29.299204]  kasan_save_track+0x18/0x40
[   29.299458]  kasan_save_alloc_info+0x3b/0x50
[   29.299646]  __kasan_kmalloc+0xb7/0xc0
[   29.299773]  __kmalloc_cache_noprof+0x189/0x420
[   29.299921]  kasan_atomics+0x95/0x310
[   29.300046]  kunit_try_run_case+0x1a5/0x480
[   29.300255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.300507]  kthread+0x337/0x6f0
[   29.300804]  ret_from_fork+0x116/0x1d0
[   29.300989]  ret_from_fork_asm+0x1a/0x30
[   29.301167] 
[   29.301251] The buggy address belongs to the object at ffff88810458d180
[   29.301251]  which belongs to the cache kmalloc-64 of size 64
[   29.301705] The buggy address is located 0 bytes to the right of
[   29.301705]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.302152] 
[   29.302240] The buggy address belongs to the physical page:
[   29.302528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.302806] flags: 0x200000000000000(node=0|zone=2)
[   29.302964] page_type: f5(slab)
[   29.303088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.303313] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.303566] page dumped because: kasan: bad access detected
[   29.303818] 
[   29.303903] Memory state around the buggy address:
[   29.304124]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.304730]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.305035] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.305450]                                      ^
[   29.305666]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.305904]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.306124] ==================================================================
[   29.223770] ==================================================================
[   29.224620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   29.224861] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.225091] 
[   29.225200] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.225289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.225302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.225324] Call Trace:
[   29.225340]  <TASK>
[   29.225358]  dump_stack_lvl+0x73/0xb0
[   29.225388]  print_report+0xd1/0x610
[   29.225411]  ? __virt_addr_valid+0x1db/0x2d0
[   29.225435]  ? kasan_atomics_helper+0x1e12/0x5450
[   29.225456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.225482]  ? kasan_atomics_helper+0x1e12/0x5450
[   29.225504]  kasan_report+0x141/0x180
[   29.225554]  ? kasan_atomics_helper+0x1e12/0x5450
[   29.225581]  kasan_check_range+0x10c/0x1c0
[   29.225631]  __kasan_check_write+0x18/0x20
[   29.225664]  kasan_atomics_helper+0x1e12/0x5450
[   29.225686]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.225719]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.225743]  ? kasan_atomics+0x152/0x310
[   29.225770]  kasan_atomics+0x1dc/0x310
[   29.225792]  ? __pfx_kasan_atomics+0x10/0x10
[   29.225817]  ? __pfx_read_tsc+0x10/0x10
[   29.225839]  ? ktime_get_ts64+0x86/0x230
[   29.225890]  kunit_try_run_case+0x1a5/0x480
[   29.225915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.225941]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.225975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.225999]  ? __kthread_parkme+0x82/0x180
[   29.226024]  ? preempt_count_sub+0x50/0x80
[   29.226048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.226071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.226104]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.226127]  kthread+0x337/0x6f0
[   29.226147]  ? trace_preempt_on+0x20/0xc0
[   29.226170]  ? __pfx_kthread+0x10/0x10
[   29.226192]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.226214]  ? calculate_sigpending+0x7b/0xa0
[   29.226237]  ? __pfx_kthread+0x10/0x10
[   29.226259]  ret_from_fork+0x116/0x1d0
[   29.226296]  ? __pfx_kthread+0x10/0x10
[   29.226327]  ret_from_fork_asm+0x1a/0x30
[   29.226358]  </TASK>
[   29.226370] 
[   29.237933] Allocated by task 314:
[   29.238108]  kasan_save_stack+0x45/0x70
[   29.238510]  kasan_save_track+0x18/0x40
[   29.238687]  kasan_save_alloc_info+0x3b/0x50
[   29.238882]  __kasan_kmalloc+0xb7/0xc0
[   29.239054]  __kmalloc_cache_noprof+0x189/0x420
[   29.239234]  kasan_atomics+0x95/0x310
[   29.239430]  kunit_try_run_case+0x1a5/0x480
[   29.239634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.239883]  kthread+0x337/0x6f0
[   29.240009]  ret_from_fork+0x116/0x1d0
[   29.240188]  ret_from_fork_asm+0x1a/0x30
[   29.240466] 
[   29.240580] The buggy address belongs to the object at ffff88810458d180
[   29.240580]  which belongs to the cache kmalloc-64 of size 64
[   29.241061] The buggy address is located 0 bytes to the right of
[   29.241061]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.242209] 
[   29.242318] The buggy address belongs to the physical page:
[   29.242529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.242881] flags: 0x200000000000000(node=0|zone=2)
[   29.243113] page_type: f5(slab)
[   29.243253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.243867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.244279] page dumped because: kasan: bad access detected
[   29.244546] 
[   29.244780] Memory state around the buggy address:
[   29.245072]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.245552]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.245909] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.246233]                                      ^
[   29.246641]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.247058]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.247533] ==================================================================
[   28.979887] ==================================================================
[   28.980243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   28.980612] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.980848] 
[   28.980946] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.980991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.981003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.981023] Call Trace:
[   28.981037]  <TASK>
[   28.981051]  dump_stack_lvl+0x73/0xb0
[   28.981090]  print_report+0xd1/0x610
[   28.981111]  ? __virt_addr_valid+0x1db/0x2d0
[   28.981134]  ? kasan_atomics_helper+0x177f/0x5450
[   28.981156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.981182]  ? kasan_atomics_helper+0x177f/0x5450
[   28.981204]  kasan_report+0x141/0x180
[   28.981226]  ? kasan_atomics_helper+0x177f/0x5450
[   28.981253]  kasan_check_range+0x10c/0x1c0
[   28.981277]  __kasan_check_write+0x18/0x20
[   28.981336]  kasan_atomics_helper+0x177f/0x5450
[   28.981360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.981382]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.981407]  ? kasan_atomics+0x152/0x310
[   28.981433]  kasan_atomics+0x1dc/0x310
[   28.981456]  ? __pfx_kasan_atomics+0x10/0x10
[   28.981481]  ? __pfx_read_tsc+0x10/0x10
[   28.981502]  ? ktime_get_ts64+0x86/0x230
[   28.981527]  kunit_try_run_case+0x1a5/0x480
[   28.981551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.981573]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.981598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.981642]  ? __kthread_parkme+0x82/0x180
[   28.981666]  ? preempt_count_sub+0x50/0x80
[   28.981690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.981714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.981738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.981762]  kthread+0x337/0x6f0
[   28.981782]  ? trace_preempt_on+0x20/0xc0
[   28.981804]  ? __pfx_kthread+0x10/0x10
[   28.981825]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.981866]  ? calculate_sigpending+0x7b/0xa0
[   28.981890]  ? __pfx_kthread+0x10/0x10
[   28.981912]  ret_from_fork+0x116/0x1d0
[   28.981940]  ? __pfx_kthread+0x10/0x10
[   28.981960]  ret_from_fork_asm+0x1a/0x30
[   28.981992]  </TASK>
[   28.982003] 
[   28.989605] Allocated by task 314:
[   28.989797]  kasan_save_stack+0x45/0x70
[   28.990001]  kasan_save_track+0x18/0x40
[   28.990233]  kasan_save_alloc_info+0x3b/0x50
[   28.990465]  __kasan_kmalloc+0xb7/0xc0
[   28.990643]  __kmalloc_cache_noprof+0x189/0x420
[   28.990876]  kasan_atomics+0x95/0x310
[   28.991064]  kunit_try_run_case+0x1a5/0x480
[   28.991320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.991564]  kthread+0x337/0x6f0
[   28.991726]  ret_from_fork+0x116/0x1d0
[   28.991926]  ret_from_fork_asm+0x1a/0x30
[   28.992131] 
[   28.992223] The buggy address belongs to the object at ffff88810458d180
[   28.992223]  which belongs to the cache kmalloc-64 of size 64
[   28.992754] The buggy address is located 0 bytes to the right of
[   28.992754]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.993289] 
[   28.993435] The buggy address belongs to the physical page:
[   28.993654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.993889] flags: 0x200000000000000(node=0|zone=2)
[   28.994051] page_type: f5(slab)
[   28.994177] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.994491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.994817] page dumped because: kasan: bad access detected
[   28.995366] 
[   28.995458] Memory state around the buggy address:
[   28.995672]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.995958]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.996177] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.996695]                                      ^
[   28.996913]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.997297]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.997599] ==================================================================
[   28.113137] ==================================================================
[   28.113468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   28.113746] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.113970] 
[   28.114045] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.114175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.114188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.114211] Call Trace:
[   28.114226]  <TASK>
[   28.114270]  dump_stack_lvl+0x73/0xb0
[   28.114313]  print_report+0xd1/0x610
[   28.114336]  ? __virt_addr_valid+0x1db/0x2d0
[   28.114371]  ? kasan_atomics_helper+0x4b6e/0x5450
[   28.114393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.114419]  ? kasan_atomics_helper+0x4b6e/0x5450
[   28.114442]  kasan_report+0x141/0x180
[   28.114466]  ? kasan_atomics_helper+0x4b6e/0x5450
[   28.114492]  __asan_report_store4_noabort+0x1b/0x30
[   28.114517]  kasan_atomics_helper+0x4b6e/0x5450
[   28.114540]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.114562]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.114587]  ? kasan_atomics+0x152/0x310
[   28.114614]  kasan_atomics+0x1dc/0x310
[   28.114637]  ? __pfx_kasan_atomics+0x10/0x10
[   28.114661]  ? __pfx_read_tsc+0x10/0x10
[   28.114682]  ? ktime_get_ts64+0x86/0x230
[   28.114707]  kunit_try_run_case+0x1a5/0x480
[   28.114731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.114753]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.114777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.114800]  ? __kthread_parkme+0x82/0x180
[   28.114824]  ? preempt_count_sub+0x50/0x80
[   28.114848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.114882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.114904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.114928]  kthread+0x337/0x6f0
[   28.114959]  ? trace_preempt_on+0x20/0xc0
[   28.114982]  ? __pfx_kthread+0x10/0x10
[   28.115004]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.115028]  ? calculate_sigpending+0x7b/0xa0
[   28.115052]  ? __pfx_kthread+0x10/0x10
[   28.115075]  ret_from_fork+0x116/0x1d0
[   28.115103]  ? __pfx_kthread+0x10/0x10
[   28.115126]  ret_from_fork_asm+0x1a/0x30
[   28.115158]  </TASK>
[   28.115170] 
[   28.122618] Allocated by task 314:
[   28.122744]  kasan_save_stack+0x45/0x70
[   28.122880]  kasan_save_track+0x18/0x40
[   28.123004]  kasan_save_alloc_info+0x3b/0x50
[   28.123152]  __kasan_kmalloc+0xb7/0xc0
[   28.123274]  __kmalloc_cache_noprof+0x189/0x420
[   28.124341]  kasan_atomics+0x95/0x310
[   28.125073]  kunit_try_run_case+0x1a5/0x480
[   28.125287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.125534]  kthread+0x337/0x6f0
[   28.125787]  ret_from_fork+0x116/0x1d0
[   28.126099]  ret_from_fork_asm+0x1a/0x30
[   28.129097] 
[   28.129452] The buggy address belongs to the object at ffff88810458d180
[   28.129452]  which belongs to the cache kmalloc-64 of size 64
[   28.130994] The buggy address is located 0 bytes to the right of
[   28.130994]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.132089] 
[   28.132462] The buggy address belongs to the physical page:
[   28.133137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.133973] flags: 0x200000000000000(node=0|zone=2)
[   28.134686] page_type: f5(slab)
[   28.135094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.135785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.136023] page dumped because: kasan: bad access detected
[   28.136204] 
[   28.136569] Memory state around the buggy address:
[   28.137311]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.138146]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.139118] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.139999]                                      ^
[   28.140178]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.141002]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.141863] ==================================================================
[   29.432859] ==================================================================
[   29.433639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   29.434055] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.434730] 
[   29.434917] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.434972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.434988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.435013] Call Trace:
[   29.435028]  <TASK>
[   29.435044]  dump_stack_lvl+0x73/0xb0
[   29.435074]  print_report+0xd1/0x610
[   29.435210]  ? __virt_addr_valid+0x1db/0x2d0
[   29.435235]  ? kasan_atomics_helper+0x224c/0x5450
[   29.435257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.435298]  ? kasan_atomics_helper+0x224c/0x5450
[   29.435320]  kasan_report+0x141/0x180
[   29.435343]  ? kasan_atomics_helper+0x224c/0x5450
[   29.435369]  kasan_check_range+0x10c/0x1c0
[   29.435393]  __kasan_check_write+0x18/0x20
[   29.435417]  kasan_atomics_helper+0x224c/0x5450
[   29.435440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.435462]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.435486]  ? kasan_atomics+0x152/0x310
[   29.435513]  kasan_atomics+0x1dc/0x310
[   29.435538]  ? __pfx_kasan_atomics+0x10/0x10
[   29.435563]  ? __pfx_read_tsc+0x10/0x10
[   29.435585]  ? ktime_get_ts64+0x86/0x230
[   29.435611]  kunit_try_run_case+0x1a5/0x480
[   29.435635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.435658]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.435681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.435706]  ? __kthread_parkme+0x82/0x180
[   29.435731]  ? preempt_count_sub+0x50/0x80
[   29.435754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.435778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.435802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.435825]  kthread+0x337/0x6f0
[   29.435845]  ? trace_preempt_on+0x20/0xc0
[   29.435868]  ? __pfx_kthread+0x10/0x10
[   29.435889]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.435911]  ? calculate_sigpending+0x7b/0xa0
[   29.435935]  ? __pfx_kthread+0x10/0x10
[   29.435956]  ret_from_fork+0x116/0x1d0
[   29.435976]  ? __pfx_kthread+0x10/0x10
[   29.435996]  ret_from_fork_asm+0x1a/0x30
[   29.436028]  </TASK>
[   29.436040] 
[   29.445185] Allocated by task 314:
[   29.445316]  kasan_save_stack+0x45/0x70
[   29.445500]  kasan_save_track+0x18/0x40
[   29.445719]  kasan_save_alloc_info+0x3b/0x50
[   29.445872]  __kasan_kmalloc+0xb7/0xc0
[   29.446004]  __kmalloc_cache_noprof+0x189/0x420
[   29.446162]  kasan_atomics+0x95/0x310
[   29.446338]  kunit_try_run_case+0x1a5/0x480
[   29.446547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.446822]  kthread+0x337/0x6f0
[   29.446990]  ret_from_fork+0x116/0x1d0
[   29.447203]  ret_from_fork_asm+0x1a/0x30
[   29.447462] 
[   29.447528] The buggy address belongs to the object at ffff88810458d180
[   29.447528]  which belongs to the cache kmalloc-64 of size 64
[   29.448043] The buggy address is located 0 bytes to the right of
[   29.448043]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.448632] 
[   29.448745] The buggy address belongs to the physical page:
[   29.448978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.449267] flags: 0x200000000000000(node=0|zone=2)
[   29.449424] page_type: f5(slab)
[   29.449542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.449908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.450254] page dumped because: kasan: bad access detected
[   29.450508] 
[   29.450596] Memory state around the buggy address:
[   29.450800]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.451011]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.451300] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.451625]                                      ^
[   29.451908]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.452130]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.452496] ==================================================================
[   28.372799] ==================================================================
[   28.373181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   28.373555] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.373819] 
[   28.373934] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.373981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.373994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.374015] Call Trace:
[   28.374029]  <TASK>
[   28.374045]  dump_stack_lvl+0x73/0xb0
[   28.374072]  print_report+0xd1/0x610
[   28.374104]  ? __virt_addr_valid+0x1db/0x2d0
[   28.374127]  ? kasan_atomics_helper+0x992/0x5450
[   28.374148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.374174]  ? kasan_atomics_helper+0x992/0x5450
[   28.374196]  kasan_report+0x141/0x180
[   28.374218]  ? kasan_atomics_helper+0x992/0x5450
[   28.374244]  kasan_check_range+0x10c/0x1c0
[   28.374268]  __kasan_check_write+0x18/0x20
[   28.374336]  kasan_atomics_helper+0x992/0x5450
[   28.374360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.374392]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.374444]  ? kasan_atomics+0x152/0x310
[   28.374471]  kasan_atomics+0x1dc/0x310
[   28.374494]  ? __pfx_kasan_atomics+0x10/0x10
[   28.374529]  ? __pfx_read_tsc+0x10/0x10
[   28.374551]  ? ktime_get_ts64+0x86/0x230
[   28.374575]  kunit_try_run_case+0x1a5/0x480
[   28.374601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.374624]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.374674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.374699]  ? __kthread_parkme+0x82/0x180
[   28.374744]  ? preempt_count_sub+0x50/0x80
[   28.374768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.374792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.374816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.374840]  kthread+0x337/0x6f0
[   28.374860]  ? trace_preempt_on+0x20/0xc0
[   28.374884]  ? __pfx_kthread+0x10/0x10
[   28.374905]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.374927]  ? calculate_sigpending+0x7b/0xa0
[   28.374952]  ? __pfx_kthread+0x10/0x10
[   28.374974]  ret_from_fork+0x116/0x1d0
[   28.374994]  ? __pfx_kthread+0x10/0x10
[   28.375015]  ret_from_fork_asm+0x1a/0x30
[   28.375047]  </TASK>
[   28.375059] 
[   28.384011] Allocated by task 314:
[   28.385237]  kasan_save_stack+0x45/0x70
[   28.385614]  kasan_save_track+0x18/0x40
[   28.385977]  kasan_save_alloc_info+0x3b/0x50
[   28.386206]  __kasan_kmalloc+0xb7/0xc0
[   28.386388]  __kmalloc_cache_noprof+0x189/0x420
[   28.386604]  kasan_atomics+0x95/0x310
[   28.386788]  kunit_try_run_case+0x1a5/0x480
[   28.388255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.388558]  kthread+0x337/0x6f0
[   28.388684]  ret_from_fork+0x116/0x1d0
[   28.388811]  ret_from_fork_asm+0x1a/0x30
[   28.388944] 
[   28.389011] The buggy address belongs to the object at ffff88810458d180
[   28.389011]  which belongs to the cache kmalloc-64 of size 64
[   28.390424] The buggy address is located 0 bytes to the right of
[   28.390424]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.391172] 
[   28.391361] The buggy address belongs to the physical page:
[   28.391618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.391942] flags: 0x200000000000000(node=0|zone=2)
[   28.392178] page_type: f5(slab)
[   28.392382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.392722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.393052] page dumped because: kasan: bad access detected
[   28.393371] 
[   28.393484] Memory state around the buggy address:
[   28.393690]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.394004]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.394399] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.394716]                                      ^
[   28.394932]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.395216]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.395567] ==================================================================
[   28.290422] ==================================================================
[   28.290787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   28.291242] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.291579] 
[   28.291747] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.292056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.292092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.292113] Call Trace:
[   28.292125]  <TASK>
[   28.292141]  dump_stack_lvl+0x73/0xb0
[   28.292170]  print_report+0xd1/0x610
[   28.292193]  ? __virt_addr_valid+0x1db/0x2d0
[   28.292217]  ? kasan_atomics_helper+0x72f/0x5450
[   28.292238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.292265]  ? kasan_atomics_helper+0x72f/0x5450
[   28.292287]  kasan_report+0x141/0x180
[   28.292310]  ? kasan_atomics_helper+0x72f/0x5450
[   28.292413]  kasan_check_range+0x10c/0x1c0
[   28.292455]  __kasan_check_write+0x18/0x20
[   28.292480]  kasan_atomics_helper+0x72f/0x5450
[   28.292503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.292525]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.292551]  ? kasan_atomics+0x152/0x310
[   28.292577]  kasan_atomics+0x1dc/0x310
[   28.292600]  ? __pfx_kasan_atomics+0x10/0x10
[   28.292625]  ? __pfx_read_tsc+0x10/0x10
[   28.292647]  ? ktime_get_ts64+0x86/0x230
[   28.292672]  kunit_try_run_case+0x1a5/0x480
[   28.292696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.292719]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.292743]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.292767]  ? __kthread_parkme+0x82/0x180
[   28.292791]  ? preempt_count_sub+0x50/0x80
[   28.292815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.292839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.292863]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.292886]  kthread+0x337/0x6f0
[   28.292906]  ? trace_preempt_on+0x20/0xc0
[   28.292932]  ? __pfx_kthread+0x10/0x10
[   28.292953]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.292975]  ? calculate_sigpending+0x7b/0xa0
[   28.292999]  ? __pfx_kthread+0x10/0x10
[   28.293021]  ret_from_fork+0x116/0x1d0
[   28.293041]  ? __pfx_kthread+0x10/0x10
[   28.293062]  ret_from_fork_asm+0x1a/0x30
[   28.293103]  </TASK>
[   28.293115] 
[   28.303291] Allocated by task 314:
[   28.303684]  kasan_save_stack+0x45/0x70
[   28.303834]  kasan_save_track+0x18/0x40
[   28.303964]  kasan_save_alloc_info+0x3b/0x50
[   28.304118]  __kasan_kmalloc+0xb7/0xc0
[   28.304299]  __kmalloc_cache_noprof+0x189/0x420
[   28.304814]  kasan_atomics+0x95/0x310
[   28.305182]  kunit_try_run_case+0x1a5/0x480
[   28.305737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.306276]  kthread+0x337/0x6f0
[   28.306795]  ret_from_fork+0x116/0x1d0
[   28.307181]  ret_from_fork_asm+0x1a/0x30
[   28.307685] 
[   28.307842] The buggy address belongs to the object at ffff88810458d180
[   28.307842]  which belongs to the cache kmalloc-64 of size 64
[   28.308926] The buggy address is located 0 bytes to the right of
[   28.308926]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.309693] 
[   28.309878] The buggy address belongs to the physical page:
[   28.310545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.311252] flags: 0x200000000000000(node=0|zone=2)
[   28.311667] page_type: f5(slab)
[   28.311890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.312510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.312739] page dumped because: kasan: bad access detected
[   28.312906] 
[   28.312970] Memory state around the buggy address:
[   28.313136]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.313434]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.313939] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.314434]                                      ^
[   28.314631]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.314959]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.315352] ==================================================================
[   28.204091] ==================================================================
[   28.204518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   28.204853] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.205190] 
[   28.205366] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.205416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.205429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.205450] Call Trace:
[   28.205464]  <TASK>
[   28.205480]  dump_stack_lvl+0x73/0xb0
[   28.205509]  print_report+0xd1/0x610
[   28.205532]  ? __virt_addr_valid+0x1db/0x2d0
[   28.205557]  ? kasan_atomics_helper+0x4b3a/0x5450
[   28.205578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.205604]  ? kasan_atomics_helper+0x4b3a/0x5450
[   28.205627]  kasan_report+0x141/0x180
[   28.205649]  ? kasan_atomics_helper+0x4b3a/0x5450
[   28.205676]  __asan_report_store4_noabort+0x1b/0x30
[   28.205701]  kasan_atomics_helper+0x4b3a/0x5450
[   28.205724]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.205746]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.205771]  ? kasan_atomics+0x152/0x310
[   28.205798]  kasan_atomics+0x1dc/0x310
[   28.205821]  ? __pfx_kasan_atomics+0x10/0x10
[   28.205846]  ? __pfx_read_tsc+0x10/0x10
[   28.205868]  ? ktime_get_ts64+0x86/0x230
[   28.205893]  kunit_try_run_case+0x1a5/0x480
[   28.205917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.205947]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.205971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.205996]  ? __kthread_parkme+0x82/0x180
[   28.206020]  ? preempt_count_sub+0x50/0x80
[   28.206044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.206068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.206103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.206127]  kthread+0x337/0x6f0
[   28.206146]  ? trace_preempt_on+0x20/0xc0
[   28.206170]  ? __pfx_kthread+0x10/0x10
[   28.206191]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.206213]  ? calculate_sigpending+0x7b/0xa0
[   28.206256]  ? __pfx_kthread+0x10/0x10
[   28.206312]  ret_from_fork+0x116/0x1d0
[   28.206332]  ? __pfx_kthread+0x10/0x10
[   28.206353]  ret_from_fork_asm+0x1a/0x30
[   28.206385]  </TASK>
[   28.206397] 
[   28.213849] Allocated by task 314:
[   28.214022]  kasan_save_stack+0x45/0x70
[   28.214213]  kasan_save_track+0x18/0x40
[   28.214555]  kasan_save_alloc_info+0x3b/0x50
[   28.214770]  __kasan_kmalloc+0xb7/0xc0
[   28.214921]  __kmalloc_cache_noprof+0x189/0x420
[   28.215129]  kasan_atomics+0x95/0x310
[   28.215396]  kunit_try_run_case+0x1a5/0x480
[   28.215561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.215818]  kthread+0x337/0x6f0
[   28.215958]  ret_from_fork+0x116/0x1d0
[   28.216125]  ret_from_fork_asm+0x1a/0x30
[   28.216392] 
[   28.216487] The buggy address belongs to the object at ffff88810458d180
[   28.216487]  which belongs to the cache kmalloc-64 of size 64
[   28.216891] The buggy address is located 0 bytes to the right of
[   28.216891]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.217354] 
[   28.217451] The buggy address belongs to the physical page:
[   28.217696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.218053] flags: 0x200000000000000(node=0|zone=2)
[   28.218457] page_type: f5(slab)
[   28.218631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.218931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.219194] page dumped because: kasan: bad access detected
[   28.219467] 
[   28.219545] Memory state around the buggy address:
[   28.219765]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.220094]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.220482] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.220786]                                      ^
[   28.220980]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.221345]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.221637] ==================================================================
[   29.018098] ==================================================================
[   29.018327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   29.018934] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.019318] 
[   29.019478] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.019558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.019594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.019615] Call Trace:
[   29.019629]  <TASK>
[   29.019644]  dump_stack_lvl+0x73/0xb0
[   29.019672]  print_report+0xd1/0x610
[   29.019694]  ? __virt_addr_valid+0x1db/0x2d0
[   29.019717]  ? kasan_atomics_helper+0x18b1/0x5450
[   29.019738]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.019765]  ? kasan_atomics_helper+0x18b1/0x5450
[   29.019787]  kasan_report+0x141/0x180
[   29.019809]  ? kasan_atomics_helper+0x18b1/0x5450
[   29.019835]  kasan_check_range+0x10c/0x1c0
[   29.019859]  __kasan_check_write+0x18/0x20
[   29.019882]  kasan_atomics_helper+0x18b1/0x5450
[   29.019938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.019960]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.019985]  ? kasan_atomics+0x152/0x310
[   29.020013]  kasan_atomics+0x1dc/0x310
[   29.020036]  ? __pfx_kasan_atomics+0x10/0x10
[   29.020101]  ? __pfx_read_tsc+0x10/0x10
[   29.020123]  ? ktime_get_ts64+0x86/0x230
[   29.020147]  kunit_try_run_case+0x1a5/0x480
[   29.020171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.020194]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.020250]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.020274]  ? __kthread_parkme+0x82/0x180
[   29.020302]  ? preempt_count_sub+0x50/0x80
[   29.020334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.020359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.020413]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.020440]  kthread+0x337/0x6f0
[   29.020460]  ? trace_preempt_on+0x20/0xc0
[   29.020483]  ? __pfx_kthread+0x10/0x10
[   29.020505]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.020527]  ? calculate_sigpending+0x7b/0xa0
[   29.020584]  ? __pfx_kthread+0x10/0x10
[   29.020606]  ret_from_fork+0x116/0x1d0
[   29.020625]  ? __pfx_kthread+0x10/0x10
[   29.020645]  ret_from_fork_asm+0x1a/0x30
[   29.020678]  </TASK>
[   29.020688] 
[   29.028570] Allocated by task 314:
[   29.028805]  kasan_save_stack+0x45/0x70
[   29.029264]  kasan_save_track+0x18/0x40
[   29.029524]  kasan_save_alloc_info+0x3b/0x50
[   29.029751]  __kasan_kmalloc+0xb7/0xc0
[   29.029896]  __kmalloc_cache_noprof+0x189/0x420
[   29.030051]  kasan_atomics+0x95/0x310
[   29.030189]  kunit_try_run_case+0x1a5/0x480
[   29.030528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.030842]  kthread+0x337/0x6f0
[   29.031008]  ret_from_fork+0x116/0x1d0
[   29.031204]  ret_from_fork_asm+0x1a/0x30
[   29.031422] 
[   29.031488] The buggy address belongs to the object at ffff88810458d180
[   29.031488]  which belongs to the cache kmalloc-64 of size 64
[   29.032016] The buggy address is located 0 bytes to the right of
[   29.032016]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.032673] 
[   29.032758] The buggy address belongs to the physical page:
[   29.033015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.033414] flags: 0x200000000000000(node=0|zone=2)
[   29.033639] page_type: f5(slab)
[   29.033836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.034194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.034547] page dumped because: kasan: bad access detected
[   29.034801] 
[   29.034885] Memory state around the buggy address:
[   29.035118]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.035465]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.035823] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.036384]                                      ^
[   29.036764]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.037075]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.037389] ==================================================================
[   29.453170] ==================================================================
[   29.453864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   29.454211] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.454496] 
[   29.454575] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.454622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.454634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.454656] Call Trace:
[   29.454671]  <TASK>
[   29.454686]  dump_stack_lvl+0x73/0xb0
[   29.454715]  print_report+0xd1/0x610
[   29.454737]  ? __virt_addr_valid+0x1db/0x2d0
[   29.454784]  ? kasan_atomics_helper+0x5115/0x5450
[   29.454805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.454832]  ? kasan_atomics_helper+0x5115/0x5450
[   29.454854]  kasan_report+0x141/0x180
[   29.454876]  ? kasan_atomics_helper+0x5115/0x5450
[   29.454903]  __asan_report_load8_noabort+0x18/0x20
[   29.454928]  kasan_atomics_helper+0x5115/0x5450
[   29.454951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.454991]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.455015]  ? kasan_atomics+0x152/0x310
[   29.455044]  kasan_atomics+0x1dc/0x310
[   29.455067]  ? __pfx_kasan_atomics+0x10/0x10
[   29.455102]  ? __pfx_read_tsc+0x10/0x10
[   29.455125]  ? ktime_get_ts64+0x86/0x230
[   29.455151]  kunit_try_run_case+0x1a5/0x480
[   29.455177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.455202]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.455227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.455274]  ? __kthread_parkme+0x82/0x180
[   29.455300]  ? preempt_count_sub+0x50/0x80
[   29.455325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.455351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.455378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.455403]  kthread+0x337/0x6f0
[   29.455424]  ? trace_preempt_on+0x20/0xc0
[   29.455448]  ? __pfx_kthread+0x10/0x10
[   29.455469]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.455492]  ? calculate_sigpending+0x7b/0xa0
[   29.455516]  ? __pfx_kthread+0x10/0x10
[   29.455546]  ret_from_fork+0x116/0x1d0
[   29.455567]  ? __pfx_kthread+0x10/0x10
[   29.455588]  ret_from_fork_asm+0x1a/0x30
[   29.455620]  </TASK>
[   29.455631] 
[   29.464138] Allocated by task 314:
[   29.464715]  kasan_save_stack+0x45/0x70
[   29.464980]  kasan_save_track+0x18/0x40
[   29.465279]  kasan_save_alloc_info+0x3b/0x50
[   29.465676]  __kasan_kmalloc+0xb7/0xc0
[   29.465980]  __kmalloc_cache_noprof+0x189/0x420
[   29.466380]  kasan_atomics+0x95/0x310
[   29.466675]  kunit_try_run_case+0x1a5/0x480
[   29.466883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.467124]  kthread+0x337/0x6f0
[   29.467271]  ret_from_fork+0x116/0x1d0
[   29.467728]  ret_from_fork_asm+0x1a/0x30
[   29.468019] 
[   29.468240] The buggy address belongs to the object at ffff88810458d180
[   29.468240]  which belongs to the cache kmalloc-64 of size 64
[   29.468857] The buggy address is located 0 bytes to the right of
[   29.468857]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.469561] 
[   29.469774] The buggy address belongs to the physical page:
[   29.470241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.470727] flags: 0x200000000000000(node=0|zone=2)
[   29.471061] page_type: f5(slab)
[   29.471234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.471857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.472369] page dumped because: kasan: bad access detected
[   29.472607] 
[   29.472690] Memory state around the buggy address:
[   29.472893]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.473189]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.473799] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.474299]                                      ^
[   29.474633]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.475202]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.475508] ==================================================================
[   28.353759] ==================================================================
[   28.354170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   28.354678] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.354937] 
[   28.355017] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.355063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.355075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.355107] Call Trace:
[   28.355124]  <TASK>
[   28.355140]  dump_stack_lvl+0x73/0xb0
[   28.355168]  print_report+0xd1/0x610
[   28.355191]  ? __virt_addr_valid+0x1db/0x2d0
[   28.355214]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.355235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.355261]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.355294]  kasan_report+0x141/0x180
[   28.355316]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.355343]  kasan_check_range+0x10c/0x1c0
[   28.355401]  __kasan_check_write+0x18/0x20
[   28.355425]  kasan_atomics_helper+0x8f9/0x5450
[   28.355459]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.355481]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.355506]  ? kasan_atomics+0x152/0x310
[   28.355533]  kasan_atomics+0x1dc/0x310
[   28.355555]  ? __pfx_kasan_atomics+0x10/0x10
[   28.355607]  ? __pfx_read_tsc+0x10/0x10
[   28.355630]  ? ktime_get_ts64+0x86/0x230
[   28.355654]  kunit_try_run_case+0x1a5/0x480
[   28.355689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.355712]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.355735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.355760]  ? __kthread_parkme+0x82/0x180
[   28.355784]  ? preempt_count_sub+0x50/0x80
[   28.355809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.355833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.355856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.355880]  kthread+0x337/0x6f0
[   28.355900]  ? trace_preempt_on+0x20/0xc0
[   28.355952]  ? __pfx_kthread+0x10/0x10
[   28.355974]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.356008]  ? calculate_sigpending+0x7b/0xa0
[   28.356042]  ? __pfx_kthread+0x10/0x10
[   28.356063]  ret_from_fork+0x116/0x1d0
[   28.356092]  ? __pfx_kthread+0x10/0x10
[   28.356113]  ret_from_fork_asm+0x1a/0x30
[   28.356145]  </TASK>
[   28.356156] 
[   28.364116] Allocated by task 314:
[   28.364390]  kasan_save_stack+0x45/0x70
[   28.364598]  kasan_save_track+0x18/0x40
[   28.364783]  kasan_save_alloc_info+0x3b/0x50
[   28.364955]  __kasan_kmalloc+0xb7/0xc0
[   28.365090]  __kmalloc_cache_noprof+0x189/0x420
[   28.365239]  kasan_atomics+0x95/0x310
[   28.365625]  kunit_try_run_case+0x1a5/0x480
[   28.365829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.366164]  kthread+0x337/0x6f0
[   28.366435]  ret_from_fork+0x116/0x1d0
[   28.366662]  ret_from_fork_asm+0x1a/0x30
[   28.366799] 
[   28.366863] The buggy address belongs to the object at ffff88810458d180
[   28.366863]  which belongs to the cache kmalloc-64 of size 64
[   28.367530] The buggy address is located 0 bytes to the right of
[   28.367530]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.368099] 
[   28.368166] The buggy address belongs to the physical page:
[   28.368488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.368898] flags: 0x200000000000000(node=0|zone=2)
[   28.369115] page_type: f5(slab)
[   28.369251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.369571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.369799] page dumped because: kasan: bad access detected
[   28.369971] 
[   28.370034] Memory state around the buggy address:
[   28.370261]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.370622]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.370951] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.371336]                                      ^
[   28.371489]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.371910]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.372156] ==================================================================
[   28.315975] ==================================================================
[   28.316354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   28.316756] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.317075] 
[   28.317163] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.317241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.317255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.317287] Call Trace:
[   28.317301]  <TASK>
[   28.317316]  dump_stack_lvl+0x73/0xb0
[   28.317344]  print_report+0xd1/0x610
[   28.317366]  ? __virt_addr_valid+0x1db/0x2d0
[   28.317389]  ? kasan_atomics_helper+0x7c7/0x5450
[   28.317410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.317491]  ? kasan_atomics_helper+0x7c7/0x5450
[   28.317518]  kasan_report+0x141/0x180
[   28.317542]  ? kasan_atomics_helper+0x7c7/0x5450
[   28.317604]  kasan_check_range+0x10c/0x1c0
[   28.317652]  __kasan_check_write+0x18/0x20
[   28.317676]  kasan_atomics_helper+0x7c7/0x5450
[   28.317698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.317721]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.317746]  ? kasan_atomics+0x152/0x310
[   28.317773]  kasan_atomics+0x1dc/0x310
[   28.317796]  ? __pfx_kasan_atomics+0x10/0x10
[   28.317820]  ? __pfx_read_tsc+0x10/0x10
[   28.317842]  ? ktime_get_ts64+0x86/0x230
[   28.317895]  kunit_try_run_case+0x1a5/0x480
[   28.317925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.317970]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.317994]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.318018]  ? __kthread_parkme+0x82/0x180
[   28.318043]  ? preempt_count_sub+0x50/0x80
[   28.318067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.318099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.318123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.318148]  kthread+0x337/0x6f0
[   28.318168]  ? trace_preempt_on+0x20/0xc0
[   28.318191]  ? __pfx_kthread+0x10/0x10
[   28.318211]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.318234]  ? calculate_sigpending+0x7b/0xa0
[   28.318398]  ? __pfx_kthread+0x10/0x10
[   28.318422]  ret_from_fork+0x116/0x1d0
[   28.318442]  ? __pfx_kthread+0x10/0x10
[   28.318463]  ret_from_fork_asm+0x1a/0x30
[   28.318496]  </TASK>
[   28.318509] 
[   28.326963] Allocated by task 314:
[   28.327173]  kasan_save_stack+0x45/0x70
[   28.327433]  kasan_save_track+0x18/0x40
[   28.327619]  kasan_save_alloc_info+0x3b/0x50
[   28.327771]  __kasan_kmalloc+0xb7/0xc0
[   28.327900]  __kmalloc_cache_noprof+0x189/0x420
[   28.328075]  kasan_atomics+0x95/0x310
[   28.328267]  kunit_try_run_case+0x1a5/0x480
[   28.328531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.328783]  kthread+0x337/0x6f0
[   28.328984]  ret_from_fork+0x116/0x1d0
[   28.329176]  ret_from_fork_asm+0x1a/0x30
[   28.329313] 
[   28.329378] The buggy address belongs to the object at ffff88810458d180
[   28.329378]  which belongs to the cache kmalloc-64 of size 64
[   28.330190] The buggy address is located 0 bytes to the right of
[   28.330190]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.330879] 
[   28.330980] The buggy address belongs to the physical page:
[   28.331284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.331523] flags: 0x200000000000000(node=0|zone=2)
[   28.331679] page_type: f5(slab)
[   28.331796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.332219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.332611] page dumped because: kasan: bad access detected
[   28.332868] 
[   28.332960] Memory state around the buggy address:
[   28.333191]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.333486]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.333836] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.334151]                                      ^
[   28.334376]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.334599]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.334807] ==================================================================
[   28.687357] ==================================================================
[   28.687655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   28.687943] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.688179] 
[   28.688303] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.688350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.688363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.688385] Call Trace:
[   28.688402]  <TASK>
[   28.688417]  dump_stack_lvl+0x73/0xb0
[   28.688445]  print_report+0xd1/0x610
[   28.688467]  ? __virt_addr_valid+0x1db/0x2d0
[   28.688490]  ? kasan_atomics_helper+0x1148/0x5450
[   28.688511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.688537]  ? kasan_atomics_helper+0x1148/0x5450
[   28.688559]  kasan_report+0x141/0x180
[   28.688583]  ? kasan_atomics_helper+0x1148/0x5450
[   28.688610]  kasan_check_range+0x10c/0x1c0
[   28.688634]  __kasan_check_write+0x18/0x20
[   28.688658]  kasan_atomics_helper+0x1148/0x5450
[   28.688681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.688703]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.688727]  ? kasan_atomics+0x152/0x310
[   28.688754]  kasan_atomics+0x1dc/0x310
[   28.688777]  ? __pfx_kasan_atomics+0x10/0x10
[   28.688801]  ? __pfx_read_tsc+0x10/0x10
[   28.688822]  ? ktime_get_ts64+0x86/0x230
[   28.688846]  kunit_try_run_case+0x1a5/0x480
[   28.688870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.688892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.688916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.688940]  ? __kthread_parkme+0x82/0x180
[   28.688964]  ? preempt_count_sub+0x50/0x80
[   28.688988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.689012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.689035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.689060]  kthread+0x337/0x6f0
[   28.689090]  ? trace_preempt_on+0x20/0xc0
[   28.689114]  ? __pfx_kthread+0x10/0x10
[   28.689136]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.689158]  ? calculate_sigpending+0x7b/0xa0
[   28.689182]  ? __pfx_kthread+0x10/0x10
[   28.689203]  ret_from_fork+0x116/0x1d0
[   28.689223]  ? __pfx_kthread+0x10/0x10
[   28.689243]  ret_from_fork_asm+0x1a/0x30
[   28.689276]  </TASK>
[   28.689288] 
[   28.698543] Allocated by task 314:
[   28.698867]  kasan_save_stack+0x45/0x70
[   28.699045]  kasan_save_track+0x18/0x40
[   28.699236]  kasan_save_alloc_info+0x3b/0x50
[   28.699490]  __kasan_kmalloc+0xb7/0xc0
[   28.699930]  __kmalloc_cache_noprof+0x189/0x420
[   28.700148]  kasan_atomics+0x95/0x310
[   28.700491]  kunit_try_run_case+0x1a5/0x480
[   28.700649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.701009]  kthread+0x337/0x6f0
[   28.701193]  ret_from_fork+0x116/0x1d0
[   28.701348]  ret_from_fork_asm+0x1a/0x30
[   28.701689] 
[   28.701761] The buggy address belongs to the object at ffff88810458d180
[   28.701761]  which belongs to the cache kmalloc-64 of size 64
[   28.702398] The buggy address is located 0 bytes to the right of
[   28.702398]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.703003] 
[   28.703119] The buggy address belongs to the physical page:
[   28.703478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.703920] flags: 0x200000000000000(node=0|zone=2)
[   28.704149] page_type: f5(slab)
[   28.704285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.704755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.705137] page dumped because: kasan: bad access detected
[   28.705417] 
[   28.705492] Memory state around the buggy address:
[   28.705809]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.706117]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.706438] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.706724]                                      ^
[   28.706925]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.707534]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.707787] ==================================================================
[   28.858482] ==================================================================
[   28.859224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   28.860331] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.860628] 
[   28.860717] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.860764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.860777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.860799] Call Trace:
[   28.860814]  <TASK>
[   28.860830]  dump_stack_lvl+0x73/0xb0
[   28.860859]  print_report+0xd1/0x610
[   28.860882]  ? __virt_addr_valid+0x1db/0x2d0
[   28.860905]  ? kasan_atomics_helper+0x1467/0x5450
[   28.860926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.860953]  ? kasan_atomics_helper+0x1467/0x5450
[   28.860975]  kasan_report+0x141/0x180
[   28.860997]  ? kasan_atomics_helper+0x1467/0x5450
[   28.861024]  kasan_check_range+0x10c/0x1c0
[   28.861048]  __kasan_check_write+0x18/0x20
[   28.861071]  kasan_atomics_helper+0x1467/0x5450
[   28.861105]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.861129]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.861154]  ? kasan_atomics+0x152/0x310
[   28.861180]  kasan_atomics+0x1dc/0x310
[   28.861204]  ? __pfx_kasan_atomics+0x10/0x10
[   28.861228]  ? __pfx_read_tsc+0x10/0x10
[   28.861250]  ? ktime_get_ts64+0x86/0x230
[   28.861274]  kunit_try_run_case+0x1a5/0x480
[   28.861771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.861796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.861820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.861845]  ? __kthread_parkme+0x82/0x180
[   28.861869]  ? preempt_count_sub+0x50/0x80
[   28.861892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.861916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.861948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.861972]  kthread+0x337/0x6f0
[   28.861992]  ? trace_preempt_on+0x20/0xc0
[   28.862014]  ? __pfx_kthread+0x10/0x10
[   28.862035]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.862058]  ? calculate_sigpending+0x7b/0xa0
[   28.862092]  ? __pfx_kthread+0x10/0x10
[   28.862113]  ret_from_fork+0x116/0x1d0
[   28.862133]  ? __pfx_kthread+0x10/0x10
[   28.862153]  ret_from_fork_asm+0x1a/0x30
[   28.862185]  </TASK>
[   28.862197] 
[   28.871684] Allocated by task 314:
[   28.871853]  kasan_save_stack+0x45/0x70
[   28.872029]  kasan_save_track+0x18/0x40
[   28.872203]  kasan_save_alloc_info+0x3b/0x50
[   28.872736]  __kasan_kmalloc+0xb7/0xc0
[   28.872921]  __kmalloc_cache_noprof+0x189/0x420
[   28.873135]  kasan_atomics+0x95/0x310
[   28.873406]  kunit_try_run_case+0x1a5/0x480
[   28.873840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.874073]  kthread+0x337/0x6f0
[   28.874406]  ret_from_fork+0x116/0x1d0
[   28.874583]  ret_from_fork_asm+0x1a/0x30
[   28.874751] 
[   28.874848] The buggy address belongs to the object at ffff88810458d180
[   28.874848]  which belongs to the cache kmalloc-64 of size 64
[   28.875350] The buggy address is located 0 bytes to the right of
[   28.875350]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.876182] 
[   28.876459] The buggy address belongs to the physical page:
[   28.876675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.877150] flags: 0x200000000000000(node=0|zone=2)
[   28.877337] page_type: f5(slab)
[   28.877608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.878026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.878554] page dumped because: kasan: bad access detected
[   28.878880] 
[   28.878970] Memory state around the buggy address:
[   28.879299]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.879615]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.880017] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.880582]                                      ^
[   28.880867]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.881288]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.881628] ==================================================================
[   28.998021] ==================================================================
[   28.998510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   28.999227] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.999636] 
[   28.999718] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.999763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.999775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.999829] Call Trace:
[   28.999844]  <TASK>
[   28.999858]  dump_stack_lvl+0x73/0xb0
[   28.999887]  print_report+0xd1/0x610
[   28.999909]  ? __virt_addr_valid+0x1db/0x2d0
[   28.999931]  ? kasan_atomics_helper+0x1818/0x5450
[   28.999953]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.999979]  ? kasan_atomics_helper+0x1818/0x5450
[   29.000001]  kasan_report+0x141/0x180
[   29.000023]  ? kasan_atomics_helper+0x1818/0x5450
[   29.000049]  kasan_check_range+0x10c/0x1c0
[   29.000073]  __kasan_check_write+0x18/0x20
[   29.000107]  kasan_atomics_helper+0x1818/0x5450
[   29.000129]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.000152]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.000176]  ? kasan_atomics+0x152/0x310
[   29.000237]  kasan_atomics+0x1dc/0x310
[   29.000260]  ? __pfx_kasan_atomics+0x10/0x10
[   29.000284]  ? __pfx_read_tsc+0x10/0x10
[   29.000315]  ? ktime_get_ts64+0x86/0x230
[   29.000340]  kunit_try_run_case+0x1a5/0x480
[   29.000396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.000418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.000442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.000467]  ? __kthread_parkme+0x82/0x180
[   29.000490]  ? preempt_count_sub+0x50/0x80
[   29.000544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.000569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.000592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.000616]  kthread+0x337/0x6f0
[   29.000636]  ? trace_preempt_on+0x20/0xc0
[   29.000689]  ? __pfx_kthread+0x10/0x10
[   29.000713]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.000735]  ? calculate_sigpending+0x7b/0xa0
[   29.000759]  ? __pfx_kthread+0x10/0x10
[   29.000781]  ret_from_fork+0x116/0x1d0
[   29.000831]  ? __pfx_kthread+0x10/0x10
[   29.000853]  ret_from_fork_asm+0x1a/0x30
[   29.000885]  </TASK>
[   29.000897] 
[   29.008716] Allocated by task 314:
[   29.008851]  kasan_save_stack+0x45/0x70
[   29.009074]  kasan_save_track+0x18/0x40
[   29.009254]  kasan_save_alloc_info+0x3b/0x50
[   29.009475]  __kasan_kmalloc+0xb7/0xc0
[   29.009680]  __kmalloc_cache_noprof+0x189/0x420
[   29.009864]  kasan_atomics+0x95/0x310
[   29.010089]  kunit_try_run_case+0x1a5/0x480
[   29.010331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.010653]  kthread+0x337/0x6f0
[   29.010975]  ret_from_fork+0x116/0x1d0
[   29.011140]  ret_from_fork_asm+0x1a/0x30
[   29.011329] 
[   29.011420] The buggy address belongs to the object at ffff88810458d180
[   29.011420]  which belongs to the cache kmalloc-64 of size 64
[   29.011936] The buggy address is located 0 bytes to the right of
[   29.011936]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.012383] 
[   29.012449] The buggy address belongs to the physical page:
[   29.012813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.013170] flags: 0x200000000000000(node=0|zone=2)
[   29.013500] page_type: f5(slab)
[   29.013651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.014032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.014776] page dumped because: kasan: bad access detected
[   29.014978] 
[   29.015044] Memory state around the buggy address:
[   29.015208]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.015795]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.016047] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.016267]                                      ^
[   29.016643]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.016973]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.017296] ==================================================================
[   28.546119] ==================================================================
[   28.546349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   28.546570] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.547047] 
[   28.547147] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.547210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.547224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.547246] Call Trace:
[   28.547261]  <TASK>
[   28.547289]  dump_stack_lvl+0x73/0xb0
[   28.547320]  print_report+0xd1/0x610
[   28.547343]  ? __virt_addr_valid+0x1db/0x2d0
[   28.547367]  ? kasan_atomics_helper+0xe78/0x5450
[   28.547409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.547436]  ? kasan_atomics_helper+0xe78/0x5450
[   28.547469]  kasan_report+0x141/0x180
[   28.547493]  ? kasan_atomics_helper+0xe78/0x5450
[   28.547521]  kasan_check_range+0x10c/0x1c0
[   28.547547]  __kasan_check_write+0x18/0x20
[   28.547572]  kasan_atomics_helper+0xe78/0x5450
[   28.547596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.547619]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.547645]  ? kasan_atomics+0x152/0x310
[   28.547673]  kasan_atomics+0x1dc/0x310
[   28.547696]  ? __pfx_kasan_atomics+0x10/0x10
[   28.547721]  ? __pfx_read_tsc+0x10/0x10
[   28.547743]  ? ktime_get_ts64+0x86/0x230
[   28.547769]  kunit_try_run_case+0x1a5/0x480
[   28.547794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.547818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.547843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.547868]  ? __kthread_parkme+0x82/0x180
[   28.547892]  ? preempt_count_sub+0x50/0x80
[   28.547916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.547941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.547974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.547998]  kthread+0x337/0x6f0
[   28.548018]  ? trace_preempt_on+0x20/0xc0
[   28.548053]  ? __pfx_kthread+0x10/0x10
[   28.548074]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.548105]  ? calculate_sigpending+0x7b/0xa0
[   28.548129]  ? __pfx_kthread+0x10/0x10
[   28.548151]  ret_from_fork+0x116/0x1d0
[   28.548171]  ? __pfx_kthread+0x10/0x10
[   28.548192]  ret_from_fork_asm+0x1a/0x30
[   28.548224]  </TASK>
[   28.548235] 
[   28.556223] Allocated by task 314:
[   28.556441]  kasan_save_stack+0x45/0x70
[   28.556633]  kasan_save_track+0x18/0x40
[   28.556763]  kasan_save_alloc_info+0x3b/0x50
[   28.556904]  __kasan_kmalloc+0xb7/0xc0
[   28.557030]  __kmalloc_cache_noprof+0x189/0x420
[   28.557270]  kasan_atomics+0x95/0x310
[   28.557615]  kunit_try_run_case+0x1a5/0x480
[   28.557818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.558067]  kthread+0x337/0x6f0
[   28.558276]  ret_from_fork+0x116/0x1d0
[   28.558406]  ret_from_fork_asm+0x1a/0x30
[   28.558539] 
[   28.558602] The buggy address belongs to the object at ffff88810458d180
[   28.558602]  which belongs to the cache kmalloc-64 of size 64
[   28.559121] The buggy address is located 0 bytes to the right of
[   28.559121]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.559695] 
[   28.559809] The buggy address belongs to the physical page:
[   28.560074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.560474] flags: 0x200000000000000(node=0|zone=2)
[   28.560670] page_type: f5(slab)
[   28.560829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.561143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.561511] page dumped because: kasan: bad access detected
[   28.561677] 
[   28.561741] Memory state around the buggy address:
[   28.561890]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.562116]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.562326] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.562600]                                      ^
[   28.562815]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.563354]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.563655] ==================================================================
[   29.144456] ==================================================================
[   29.144780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   29.145068] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.145299] 
[   29.145374] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.145424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.145437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.145457] Call Trace:
[   29.145472]  <TASK>
[   29.145512]  dump_stack_lvl+0x73/0xb0
[   29.145539]  print_report+0xd1/0x610
[   29.145560]  ? __virt_addr_valid+0x1db/0x2d0
[   29.145583]  ? kasan_atomics_helper+0x4f30/0x5450
[   29.145603]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.145665]  ? kasan_atomics_helper+0x4f30/0x5450
[   29.145689]  kasan_report+0x141/0x180
[   29.145711]  ? kasan_atomics_helper+0x4f30/0x5450
[   29.145738]  __asan_report_load8_noabort+0x18/0x20
[   29.145762]  kasan_atomics_helper+0x4f30/0x5450
[   29.145785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.145808]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.145833]  ? kasan_atomics+0x152/0x310
[   29.145859]  kasan_atomics+0x1dc/0x310
[   29.145896]  ? __pfx_kasan_atomics+0x10/0x10
[   29.145927]  ? __pfx_read_tsc+0x10/0x10
[   29.145949]  ? ktime_get_ts64+0x86/0x230
[   29.145973]  kunit_try_run_case+0x1a5/0x480
[   29.145997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.146020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.146043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.146091]  ? __kthread_parkme+0x82/0x180
[   29.146115]  ? preempt_count_sub+0x50/0x80
[   29.146139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.146162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.146186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.146210]  kthread+0x337/0x6f0
[   29.146229]  ? trace_preempt_on+0x20/0xc0
[   29.146252]  ? __pfx_kthread+0x10/0x10
[   29.146272]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.146306]  ? calculate_sigpending+0x7b/0xa0
[   29.146328]  ? __pfx_kthread+0x10/0x10
[   29.146349]  ret_from_fork+0x116/0x1d0
[   29.146369]  ? __pfx_kthread+0x10/0x10
[   29.146390]  ret_from_fork_asm+0x1a/0x30
[   29.146421]  </TASK>
[   29.146431] 
[   29.155009] Allocated by task 314:
[   29.155185]  kasan_save_stack+0x45/0x70
[   29.155642]  kasan_save_track+0x18/0x40
[   29.155953]  kasan_save_alloc_info+0x3b/0x50
[   29.156367]  __kasan_kmalloc+0xb7/0xc0
[   29.156657]  __kmalloc_cache_noprof+0x189/0x420
[   29.156986]  kasan_atomics+0x95/0x310
[   29.157184]  kunit_try_run_case+0x1a5/0x480
[   29.157575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.158022]  kthread+0x337/0x6f0
[   29.158262]  ret_from_fork+0x116/0x1d0
[   29.158455]  ret_from_fork_asm+0x1a/0x30
[   29.158631] 
[   29.158711] The buggy address belongs to the object at ffff88810458d180
[   29.158711]  which belongs to the cache kmalloc-64 of size 64
[   29.159183] The buggy address is located 0 bytes to the right of
[   29.159183]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.160112] 
[   29.160332] The buggy address belongs to the physical page:
[   29.160808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.161323] flags: 0x200000000000000(node=0|zone=2)
[   29.161549] page_type: f5(slab)
[   29.162344] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.162590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.162819] page dumped because: kasan: bad access detected
[   29.162988] 
[   29.163053] Memory state around the buggy address:
[   29.163215]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.163435]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.163644] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.163850]                                      ^
[   29.163998]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.165172]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.165824] ==================================================================
[   29.273192] ==================================================================
[   29.273653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   29.273966] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.274308] 
[   29.274423] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.274471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.274484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.274506] Call Trace:
[   29.274522]  <TASK>
[   29.274538]  dump_stack_lvl+0x73/0xb0
[   29.274567]  print_report+0xd1/0x610
[   29.274590]  ? __virt_addr_valid+0x1db/0x2d0
[   29.274613]  ? kasan_atomics_helper+0x1f43/0x5450
[   29.274634]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.274661]  ? kasan_atomics_helper+0x1f43/0x5450
[   29.274683]  kasan_report+0x141/0x180
[   29.274705]  ? kasan_atomics_helper+0x1f43/0x5450
[   29.274732]  kasan_check_range+0x10c/0x1c0
[   29.274755]  __kasan_check_write+0x18/0x20
[   29.274779]  kasan_atomics_helper+0x1f43/0x5450
[   29.274802]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.274825]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.274850]  ? kasan_atomics+0x152/0x310
[   29.274877]  kasan_atomics+0x1dc/0x310
[   29.274899]  ? __pfx_kasan_atomics+0x10/0x10
[   29.274923]  ? __pfx_read_tsc+0x10/0x10
[   29.274944]  ? ktime_get_ts64+0x86/0x230
[   29.274968]  kunit_try_run_case+0x1a5/0x480
[   29.274992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.275015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.275040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.275063]  ? __kthread_parkme+0x82/0x180
[   29.275099]  ? preempt_count_sub+0x50/0x80
[   29.275123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.275147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.275170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.275193]  kthread+0x337/0x6f0
[   29.275213]  ? trace_preempt_on+0x20/0xc0
[   29.275236]  ? __pfx_kthread+0x10/0x10
[   29.275257]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.275290]  ? calculate_sigpending+0x7b/0xa0
[   29.275314]  ? __pfx_kthread+0x10/0x10
[   29.275335]  ret_from_fork+0x116/0x1d0
[   29.275354]  ? __pfx_kthread+0x10/0x10
[   29.275375]  ret_from_fork_asm+0x1a/0x30
[   29.275407]  </TASK>
[   29.275418] 
[   29.282358] Allocated by task 314:
[   29.282478]  kasan_save_stack+0x45/0x70
[   29.282640]  kasan_save_track+0x18/0x40
[   29.282827]  kasan_save_alloc_info+0x3b/0x50
[   29.283035]  __kasan_kmalloc+0xb7/0xc0
[   29.283227]  __kmalloc_cache_noprof+0x189/0x420
[   29.283446]  kasan_atomics+0x95/0x310
[   29.283635]  kunit_try_run_case+0x1a5/0x480
[   29.283838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.284094]  kthread+0x337/0x6f0
[   29.284255]  ret_from_fork+0x116/0x1d0
[   29.284435]  ret_from_fork_asm+0x1a/0x30
[   29.284583] 
[   29.284646] The buggy address belongs to the object at ffff88810458d180
[   29.284646]  which belongs to the cache kmalloc-64 of size 64
[   29.284989] The buggy address is located 0 bytes to the right of
[   29.284989]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.285656] 
[   29.285759] The buggy address belongs to the physical page:
[   29.285927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.286168] flags: 0x200000000000000(node=0|zone=2)
[   29.286321] page_type: f5(slab)
[   29.286434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.286665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.286995] page dumped because: kasan: bad access detected
[   29.287252] 
[   29.287339] Memory state around the buggy address:
[   29.287557]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.287874]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.288199] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.288562]                                      ^
[   29.288761]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.288972]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.289304] ==================================================================
[   28.165369] ==================================================================
[   28.165716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   28.166054] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.166622] 
[   28.166732] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.166781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.166794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.166817] Call Trace:
[   28.166831]  <TASK>
[   28.166847]  dump_stack_lvl+0x73/0xb0
[   28.166878]  print_report+0xd1/0x610
[   28.166900]  ? __virt_addr_valid+0x1db/0x2d0
[   28.166923]  ? kasan_atomics_helper+0x4b54/0x5450
[   28.166945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.166971]  ? kasan_atomics_helper+0x4b54/0x5450
[   28.166993]  kasan_report+0x141/0x180
[   28.167016]  ? kasan_atomics_helper+0x4b54/0x5450
[   28.167043]  __asan_report_load4_noabort+0x18/0x20
[   28.167067]  kasan_atomics_helper+0x4b54/0x5450
[   28.167105]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.167127]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.167152]  ? kasan_atomics+0x152/0x310
[   28.167178]  kasan_atomics+0x1dc/0x310
[   28.167202]  ? __pfx_kasan_atomics+0x10/0x10
[   28.167308]  ? __pfx_read_tsc+0x10/0x10
[   28.167336]  ? ktime_get_ts64+0x86/0x230
[   28.167361]  kunit_try_run_case+0x1a5/0x480
[   28.167386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.167409]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.167433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.167457]  ? __kthread_parkme+0x82/0x180
[   28.167481]  ? preempt_count_sub+0x50/0x80
[   28.167505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.167529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.167552]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.167576]  kthread+0x337/0x6f0
[   28.167596]  ? trace_preempt_on+0x20/0xc0
[   28.167619]  ? __pfx_kthread+0x10/0x10
[   28.167640]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.167661]  ? calculate_sigpending+0x7b/0xa0
[   28.167685]  ? __pfx_kthread+0x10/0x10
[   28.167707]  ret_from_fork+0x116/0x1d0
[   28.167727]  ? __pfx_kthread+0x10/0x10
[   28.167747]  ret_from_fork_asm+0x1a/0x30
[   28.167780]  </TASK>
[   28.167792] 
[   28.175440] Allocated by task 314:
[   28.175567]  kasan_save_stack+0x45/0x70
[   28.175759]  kasan_save_track+0x18/0x40
[   28.175945]  kasan_save_alloc_info+0x3b/0x50
[   28.176183]  __kasan_kmalloc+0xb7/0xc0
[   28.176475]  __kmalloc_cache_noprof+0x189/0x420
[   28.176726]  kasan_atomics+0x95/0x310
[   28.176921]  kunit_try_run_case+0x1a5/0x480
[   28.177120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.177469]  kthread+0x337/0x6f0
[   28.177629]  ret_from_fork+0x116/0x1d0
[   28.177811]  ret_from_fork_asm+0x1a/0x30
[   28.177999] 
[   28.178096] The buggy address belongs to the object at ffff88810458d180
[   28.178096]  which belongs to the cache kmalloc-64 of size 64
[   28.178793] The buggy address is located 0 bytes to the right of
[   28.178793]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.179385] 
[   28.179459] The buggy address belongs to the physical page:
[   28.179626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.179959] flags: 0x200000000000000(node=0|zone=2)
[   28.180195] page_type: f5(slab)
[   28.180444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.180806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.181149] page dumped because: kasan: bad access detected
[   28.181455] 
[   28.181571] Memory state around the buggy address:
[   28.181736]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.181971]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.182508] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.182821]                                      ^
[   28.183019]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.183418]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.183629] ==================================================================
[   28.184001] ==================================================================
[   28.184445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   28.184795] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.185124] 
[   28.185319] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.185370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.185383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.185405] Call Trace:
[   28.185421]  <TASK>
[   28.185437]  dump_stack_lvl+0x73/0xb0
[   28.185467]  print_report+0xd1/0x610
[   28.185491]  ? __virt_addr_valid+0x1db/0x2d0
[   28.185514]  ? kasan_atomics_helper+0x4a0/0x5450
[   28.185558]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.185586]  ? kasan_atomics_helper+0x4a0/0x5450
[   28.185608]  kasan_report+0x141/0x180
[   28.185631]  ? kasan_atomics_helper+0x4a0/0x5450
[   28.185658]  kasan_check_range+0x10c/0x1c0
[   28.185683]  __kasan_check_write+0x18/0x20
[   28.185707]  kasan_atomics_helper+0x4a0/0x5450
[   28.185730]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.185752]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.185778]  ? kasan_atomics+0x152/0x310
[   28.185805]  kasan_atomics+0x1dc/0x310
[   28.185828]  ? __pfx_kasan_atomics+0x10/0x10
[   28.185853]  ? __pfx_read_tsc+0x10/0x10
[   28.185874]  ? ktime_get_ts64+0x86/0x230
[   28.185899]  kunit_try_run_case+0x1a5/0x480
[   28.185928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.185952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.185976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.186000]  ? __kthread_parkme+0x82/0x180
[   28.186025]  ? preempt_count_sub+0x50/0x80
[   28.186048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.186073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.186108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.186132]  kthread+0x337/0x6f0
[   28.186152]  ? trace_preempt_on+0x20/0xc0
[   28.186175]  ? __pfx_kthread+0x10/0x10
[   28.186196]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.186219]  ? calculate_sigpending+0x7b/0xa0
[   28.186451]  ? __pfx_kthread+0x10/0x10
[   28.186474]  ret_from_fork+0x116/0x1d0
[   28.186495]  ? __pfx_kthread+0x10/0x10
[   28.186516]  ret_from_fork_asm+0x1a/0x30
[   28.186548]  </TASK>
[   28.186559] 
[   28.195488] Allocated by task 314:
[   28.195667]  kasan_save_stack+0x45/0x70
[   28.195820]  kasan_save_track+0x18/0x40
[   28.195949]  kasan_save_alloc_info+0x3b/0x50
[   28.196103]  __kasan_kmalloc+0xb7/0xc0
[   28.196375]  __kmalloc_cache_noprof+0x189/0x420
[   28.196625]  kasan_atomics+0x95/0x310
[   28.196827]  kunit_try_run_case+0x1a5/0x480
[   28.197045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.197391]  kthread+0x337/0x6f0
[   28.197562]  ret_from_fork+0x116/0x1d0
[   28.197738]  ret_from_fork_asm+0x1a/0x30
[   28.197949] 
[   28.198032] The buggy address belongs to the object at ffff88810458d180
[   28.198032]  which belongs to the cache kmalloc-64 of size 64
[   28.198654] The buggy address is located 0 bytes to the right of
[   28.198654]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.199200] 
[   28.199320] The buggy address belongs to the physical page:
[   28.199528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.199964] flags: 0x200000000000000(node=0|zone=2)
[   28.200294] page_type: f5(slab)
[   28.200468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.200730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.201065] page dumped because: kasan: bad access detected
[   28.201344] 
[   28.201414] Memory state around the buggy address:
[   28.201616]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.201967]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.202480] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.202791]                                      ^
[   28.203004]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.203409]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.203677] ==================================================================
[   28.269689] ==================================================================
[   28.270123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   28.270685] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.271041] 
[   28.271134] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.271193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.271205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.271237] Call Trace:
[   28.271255]  <TASK>
[   28.271271]  dump_stack_lvl+0x73/0xb0
[   28.271300]  print_report+0xd1/0x610
[   28.271322]  ? __virt_addr_valid+0x1db/0x2d0
[   28.271345]  ? kasan_atomics_helper+0x697/0x5450
[   28.271367]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.271393]  ? kasan_atomics_helper+0x697/0x5450
[   28.271415]  kasan_report+0x141/0x180
[   28.271438]  ? kasan_atomics_helper+0x697/0x5450
[   28.271535]  kasan_check_range+0x10c/0x1c0
[   28.271560]  __kasan_check_write+0x18/0x20
[   28.271595]  kasan_atomics_helper+0x697/0x5450
[   28.271618]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.271641]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.271685]  ? kasan_atomics+0x152/0x310
[   28.271712]  kasan_atomics+0x1dc/0x310
[   28.271735]  ? __pfx_kasan_atomics+0x10/0x10
[   28.271770]  ? __pfx_read_tsc+0x10/0x10
[   28.271792]  ? ktime_get_ts64+0x86/0x230
[   28.271816]  kunit_try_run_case+0x1a5/0x480
[   28.271840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.271863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.271887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.271911]  ? __kthread_parkme+0x82/0x180
[   28.271945]  ? preempt_count_sub+0x50/0x80
[   28.271968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.271993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.272026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.272050]  kthread+0x337/0x6f0
[   28.272070]  ? trace_preempt_on+0x20/0xc0
[   28.272102]  ? __pfx_kthread+0x10/0x10
[   28.272132]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.272153]  ? calculate_sigpending+0x7b/0xa0
[   28.272178]  ? __pfx_kthread+0x10/0x10
[   28.272210]  ret_from_fork+0x116/0x1d0
[   28.272230]  ? __pfx_kthread+0x10/0x10
[   28.272261]  ret_from_fork_asm+0x1a/0x30
[   28.272303]  </TASK>
[   28.272314] 
[   28.280585] Allocated by task 314:
[   28.280750]  kasan_save_stack+0x45/0x70
[   28.281071]  kasan_save_track+0x18/0x40
[   28.281393]  kasan_save_alloc_info+0x3b/0x50
[   28.281624]  __kasan_kmalloc+0xb7/0xc0
[   28.281823]  __kmalloc_cache_noprof+0x189/0x420
[   28.281983]  kasan_atomics+0x95/0x310
[   28.282120]  kunit_try_run_case+0x1a5/0x480
[   28.282332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.282584]  kthread+0x337/0x6f0
[   28.282746]  ret_from_fork+0x116/0x1d0
[   28.282928]  ret_from_fork_asm+0x1a/0x30
[   28.283132] 
[   28.283223] The buggy address belongs to the object at ffff88810458d180
[   28.283223]  which belongs to the cache kmalloc-64 of size 64
[   28.283953] The buggy address is located 0 bytes to the right of
[   28.283953]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.284779] 
[   28.284854] The buggy address belongs to the physical page:
[   28.285020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.285455] flags: 0x200000000000000(node=0|zone=2)
[   28.285876] page_type: f5(slab)
[   28.286068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.286421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.286756] page dumped because: kasan: bad access detected
[   28.287102] 
[   28.287180] Memory state around the buggy address:
[   28.287385]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.287913]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.288146] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.288541]                                      ^
[   28.288765]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.289396]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.289717] ==================================================================
[   28.093998] ==================================================================
[   28.094389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   28.094617] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.094887] 
[   28.094983] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.095031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.095042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.095062] Call Trace:
[   28.095084]  <TASK>
[   28.095099]  dump_stack_lvl+0x73/0xb0
[   28.095125]  print_report+0xd1/0x610
[   28.095145]  ? __virt_addr_valid+0x1db/0x2d0
[   28.095168]  ? kasan_atomics_helper+0x4b88/0x5450
[   28.095188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.095213]  ? kasan_atomics_helper+0x4b88/0x5450
[   28.095234]  kasan_report+0x141/0x180
[   28.095257]  ? kasan_atomics_helper+0x4b88/0x5450
[   28.095283]  __asan_report_load4_noabort+0x18/0x20
[   28.095306]  kasan_atomics_helper+0x4b88/0x5450
[   28.095328]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.095349]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.095372]  ? kasan_atomics+0x152/0x310
[   28.095397]  kasan_atomics+0x1dc/0x310
[   28.095418]  ? __pfx_kasan_atomics+0x10/0x10
[   28.095442]  ? __pfx_read_tsc+0x10/0x10
[   28.095463]  ? ktime_get_ts64+0x86/0x230
[   28.095486]  kunit_try_run_case+0x1a5/0x480
[   28.095525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.095560]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.095593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.095616]  ? __kthread_parkme+0x82/0x180
[   28.095639]  ? preempt_count_sub+0x50/0x80
[   28.095661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.095684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.095707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.095730]  kthread+0x337/0x6f0
[   28.095752]  ? trace_preempt_on+0x20/0xc0
[   28.095775]  ? __pfx_kthread+0x10/0x10
[   28.095797]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.095819]  ? calculate_sigpending+0x7b/0xa0
[   28.095853]  ? __pfx_kthread+0x10/0x10
[   28.095875]  ret_from_fork+0x116/0x1d0
[   28.095894]  ? __pfx_kthread+0x10/0x10
[   28.095926]  ret_from_fork_asm+0x1a/0x30
[   28.095957]  </TASK>
[   28.095969] 
[   28.104137] Allocated by task 314:
[   28.104414]  kasan_save_stack+0x45/0x70
[   28.104629]  kasan_save_track+0x18/0x40
[   28.104760]  kasan_save_alloc_info+0x3b/0x50
[   28.104902]  __kasan_kmalloc+0xb7/0xc0
[   28.105028]  __kmalloc_cache_noprof+0x189/0x420
[   28.105236]  kasan_atomics+0x95/0x310
[   28.105416]  kunit_try_run_case+0x1a5/0x480
[   28.105614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.105884]  kthread+0x337/0x6f0
[   28.106180]  ret_from_fork+0x116/0x1d0
[   28.106434]  ret_from_fork_asm+0x1a/0x30
[   28.106573] 
[   28.106637] The buggy address belongs to the object at ffff88810458d180
[   28.106637]  which belongs to the cache kmalloc-64 of size 64
[   28.107117] The buggy address is located 0 bytes to the right of
[   28.107117]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.108033] 
[   28.108146] The buggy address belongs to the physical page:
[   28.108502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.108839] flags: 0x200000000000000(node=0|zone=2)
[   28.109071] page_type: f5(slab)
[   28.109227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.109660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.109987] page dumped because: kasan: bad access detected
[   28.110203] 
[   28.110377] Memory state around the buggy address:
[   28.110676]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.110987]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.111476] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.111783]                                      ^
[   28.112023]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.112402]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.112752] ==================================================================
[   28.585410] ==================================================================
[   28.585725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   28.586029] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.586585] 
[   28.586933] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.586988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.587001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.587022] Call Trace:
[   28.587038]  <TASK>
[   28.587052]  dump_stack_lvl+0x73/0xb0
[   28.587094]  print_report+0xd1/0x610
[   28.587117]  ? __virt_addr_valid+0x1db/0x2d0
[   28.587140]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.587161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.587188]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.587210]  kasan_report+0x141/0x180
[   28.587233]  ? kasan_atomics_helper+0xfa9/0x5450
[   28.587259]  kasan_check_range+0x10c/0x1c0
[   28.587657]  __kasan_check_write+0x18/0x20
[   28.587702]  kasan_atomics_helper+0xfa9/0x5450
[   28.587727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.587750]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.587775]  ? kasan_atomics+0x152/0x310
[   28.587842]  kasan_atomics+0x1dc/0x310
[   28.587865]  ? __pfx_kasan_atomics+0x10/0x10
[   28.587889]  ? __pfx_read_tsc+0x10/0x10
[   28.587911]  ? ktime_get_ts64+0x86/0x230
[   28.587935]  kunit_try_run_case+0x1a5/0x480
[   28.587961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.587983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.588007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.588031]  ? __kthread_parkme+0x82/0x180
[   28.588056]  ? preempt_count_sub+0x50/0x80
[   28.588090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.588114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.588139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.588162]  kthread+0x337/0x6f0
[   28.588183]  ? trace_preempt_on+0x20/0xc0
[   28.588206]  ? __pfx_kthread+0x10/0x10
[   28.588227]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.588249]  ? calculate_sigpending+0x7b/0xa0
[   28.588273]  ? __pfx_kthread+0x10/0x10
[   28.588296]  ret_from_fork+0x116/0x1d0
[   28.588316]  ? __pfx_kthread+0x10/0x10
[   28.588337]  ret_from_fork_asm+0x1a/0x30
[   28.588369]  </TASK>
[   28.588380] 
[   28.599214] Allocated by task 314:
[   28.599712]  kasan_save_stack+0x45/0x70
[   28.600166]  kasan_save_track+0x18/0x40
[   28.600404]  kasan_save_alloc_info+0x3b/0x50
[   28.600605]  __kasan_kmalloc+0xb7/0xc0
[   28.600772]  __kmalloc_cache_noprof+0x189/0x420
[   28.600965]  kasan_atomics+0x95/0x310
[   28.601148]  kunit_try_run_case+0x1a5/0x480
[   28.601685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.602011]  kthread+0x337/0x6f0
[   28.602322]  ret_from_fork+0x116/0x1d0
[   28.602709]  ret_from_fork_asm+0x1a/0x30
[   28.602902] 
[   28.602991] The buggy address belongs to the object at ffff88810458d180
[   28.602991]  which belongs to the cache kmalloc-64 of size 64
[   28.603755] The buggy address is located 0 bytes to the right of
[   28.603755]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.604682] 
[   28.604776] The buggy address belongs to the physical page:
[   28.604996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.605525] flags: 0x200000000000000(node=0|zone=2)
[   28.605950] page_type: f5(slab)
[   28.606270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.606896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.607242] page dumped because: kasan: bad access detected
[   28.607845] 
[   28.607949] Memory state around the buggy address:
[   28.608167]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.608928]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.609339] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.609631]                                      ^
[   28.609830]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.610123]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.610553] ==================================================================
[   28.222039] ==================================================================
[   28.222539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   28.222822] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.223134] 
[   28.223248] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.223311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.223324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.223346] Call Trace:
[   28.223360]  <TASK>
[   28.223374]  dump_stack_lvl+0x73/0xb0
[   28.223401]  print_report+0xd1/0x610
[   28.223424]  ? __virt_addr_valid+0x1db/0x2d0
[   28.223447]  ? kasan_atomics_helper+0x565/0x5450
[   28.223468]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.223494]  ? kasan_atomics_helper+0x565/0x5450
[   28.223516]  kasan_report+0x141/0x180
[   28.223539]  ? kasan_atomics_helper+0x565/0x5450
[   28.223566]  kasan_check_range+0x10c/0x1c0
[   28.223590]  __kasan_check_write+0x18/0x20
[   28.223613]  kasan_atomics_helper+0x565/0x5450
[   28.223636]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.223659]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.223683]  ? kasan_atomics+0x152/0x310
[   28.223710]  kasan_atomics+0x1dc/0x310
[   28.223733]  ? __pfx_kasan_atomics+0x10/0x10
[   28.223757]  ? __pfx_read_tsc+0x10/0x10
[   28.223778]  ? ktime_get_ts64+0x86/0x230
[   28.223802]  kunit_try_run_case+0x1a5/0x480
[   28.223826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.223849]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.223872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.223896]  ? __kthread_parkme+0x82/0x180
[   28.223920]  ? preempt_count_sub+0x50/0x80
[   28.223943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.223967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.223991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.224015]  kthread+0x337/0x6f0
[   28.224035]  ? trace_preempt_on+0x20/0xc0
[   28.224058]  ? __pfx_kthread+0x10/0x10
[   28.224153]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.224183]  ? calculate_sigpending+0x7b/0xa0
[   28.224207]  ? __pfx_kthread+0x10/0x10
[   28.224289]  ret_from_fork+0x116/0x1d0
[   28.224315]  ? __pfx_kthread+0x10/0x10
[   28.224337]  ret_from_fork_asm+0x1a/0x30
[   28.224369]  </TASK>
[   28.224380] 
[   28.231842] Allocated by task 314:
[   28.232016]  kasan_save_stack+0x45/0x70
[   28.232296]  kasan_save_track+0x18/0x40
[   28.232498]  kasan_save_alloc_info+0x3b/0x50
[   28.232649]  __kasan_kmalloc+0xb7/0xc0
[   28.232776]  __kmalloc_cache_noprof+0x189/0x420
[   28.232924]  kasan_atomics+0x95/0x310
[   28.233051]  kunit_try_run_case+0x1a5/0x480
[   28.233338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.233552]  kthread+0x337/0x6f0
[   28.233698]  ret_from_fork+0x116/0x1d0
[   28.233878]  ret_from_fork_asm+0x1a/0x30
[   28.234046] 
[   28.234146] The buggy address belongs to the object at ffff88810458d180
[   28.234146]  which belongs to the cache kmalloc-64 of size 64
[   28.234783] The buggy address is located 0 bytes to the right of
[   28.234783]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.235397] 
[   28.235485] The buggy address belongs to the physical page:
[   28.235690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.235924] flags: 0x200000000000000(node=0|zone=2)
[   28.236099] page_type: f5(slab)
[   28.236267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.236572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.236880] page dumped because: kasan: bad access detected
[   28.237115] 
[   28.237197] Memory state around the buggy address:
[   28.237392]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.237677]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.237960] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.239013]                                      ^
[   28.239205]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.240041]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.241011] ==================================================================
[   28.420532] ==================================================================
[   28.420832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   28.421401] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.421785] 
[   28.422178] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.422230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.422244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.422266] Call Trace:
[   28.422283]  <TASK>
[   28.422298]  dump_stack_lvl+0x73/0xb0
[   28.422327]  print_report+0xd1/0x610
[   28.422350]  ? __virt_addr_valid+0x1db/0x2d0
[   28.422373]  ? kasan_atomics_helper+0xac7/0x5450
[   28.422395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.422421]  ? kasan_atomics_helper+0xac7/0x5450
[   28.422442]  kasan_report+0x141/0x180
[   28.422465]  ? kasan_atomics_helper+0xac7/0x5450
[   28.422491]  kasan_check_range+0x10c/0x1c0
[   28.422515]  __kasan_check_write+0x18/0x20
[   28.422539]  kasan_atomics_helper+0xac7/0x5450
[   28.422562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.422585]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.422611]  ? kasan_atomics+0x152/0x310
[   28.422637]  kasan_atomics+0x1dc/0x310
[   28.422660]  ? __pfx_kasan_atomics+0x10/0x10
[   28.422684]  ? __pfx_read_tsc+0x10/0x10
[   28.422706]  ? ktime_get_ts64+0x86/0x230
[   28.422730]  kunit_try_run_case+0x1a5/0x480
[   28.422755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.422777]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.422802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.422826]  ? __kthread_parkme+0x82/0x180
[   28.422850]  ? preempt_count_sub+0x50/0x80
[   28.422874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.422899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.422922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.422946]  kthread+0x337/0x6f0
[   28.422966]  ? trace_preempt_on+0x20/0xc0
[   28.422989]  ? __pfx_kthread+0x10/0x10
[   28.423010]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.423032]  ? calculate_sigpending+0x7b/0xa0
[   28.423055]  ? __pfx_kthread+0x10/0x10
[   28.423089]  ret_from_fork+0x116/0x1d0
[   28.423109]  ? __pfx_kthread+0x10/0x10
[   28.423130]  ret_from_fork_asm+0x1a/0x30
[   28.423162]  </TASK>
[   28.423174] 
[   28.430747] Allocated by task 314:
[   28.430920]  kasan_save_stack+0x45/0x70
[   28.431143]  kasan_save_track+0x18/0x40
[   28.431270]  kasan_save_alloc_info+0x3b/0x50
[   28.431489]  __kasan_kmalloc+0xb7/0xc0
[   28.431685]  __kmalloc_cache_noprof+0x189/0x420
[   28.431901]  kasan_atomics+0x95/0x310
[   28.432095]  kunit_try_run_case+0x1a5/0x480
[   28.432268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.432556]  kthread+0x337/0x6f0
[   28.432714]  ret_from_fork+0x116/0x1d0
[   28.432933]  ret_from_fork_asm+0x1a/0x30
[   28.433218] 
[   28.433333] The buggy address belongs to the object at ffff88810458d180
[   28.433333]  which belongs to the cache kmalloc-64 of size 64
[   28.433708] The buggy address is located 0 bytes to the right of
[   28.433708]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.434251] 
[   28.434361] The buggy address belongs to the physical page:
[   28.434663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.434978] flags: 0x200000000000000(node=0|zone=2)
[   28.435256] page_type: f5(slab)
[   28.435439] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.435800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.436130] page dumped because: kasan: bad access detected
[   28.436368] 
[   28.436455] Memory state around the buggy address:
[   28.436703]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.437008]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.437255] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.437553]                                      ^
[   28.437695]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.437898]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.438138] ==================================================================
[   28.438999] ==================================================================
[   28.439469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   28.439750] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.440018] 
[   28.440150] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.440198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.440211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.440249] Call Trace:
[   28.440266]  <TASK>
[   28.440292]  dump_stack_lvl+0x73/0xb0
[   28.440321]  print_report+0xd1/0x610
[   28.440364]  ? __virt_addr_valid+0x1db/0x2d0
[   28.440387]  ? kasan_atomics_helper+0xb6a/0x5450
[   28.440408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.440434]  ? kasan_atomics_helper+0xb6a/0x5450
[   28.440456]  kasan_report+0x141/0x180
[   28.440478]  ? kasan_atomics_helper+0xb6a/0x5450
[   28.440521]  kasan_check_range+0x10c/0x1c0
[   28.440546]  __kasan_check_write+0x18/0x20
[   28.440571]  kasan_atomics_helper+0xb6a/0x5450
[   28.440595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.440617]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.440642]  ? kasan_atomics+0x152/0x310
[   28.440686]  kasan_atomics+0x1dc/0x310
[   28.440709]  ? __pfx_kasan_atomics+0x10/0x10
[   28.440734]  ? __pfx_read_tsc+0x10/0x10
[   28.440756]  ? ktime_get_ts64+0x86/0x230
[   28.440780]  kunit_try_run_case+0x1a5/0x480
[   28.440804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.440843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.440868]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.440892]  ? __kthread_parkme+0x82/0x180
[   28.440916]  ? preempt_count_sub+0x50/0x80
[   28.440939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.440963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.440987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.441011]  kthread+0x337/0x6f0
[   28.441031]  ? trace_preempt_on+0x20/0xc0
[   28.441053]  ? __pfx_kthread+0x10/0x10
[   28.441073]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.441106]  ? calculate_sigpending+0x7b/0xa0
[   28.441129]  ? __pfx_kthread+0x10/0x10
[   28.441150]  ret_from_fork+0x116/0x1d0
[   28.441170]  ? __pfx_kthread+0x10/0x10
[   28.441191]  ret_from_fork_asm+0x1a/0x30
[   28.441241]  </TASK>
[   28.441252] 
[   28.449151] Allocated by task 314:
[   28.449269]  kasan_save_stack+0x45/0x70
[   28.449470]  kasan_save_track+0x18/0x40
[   28.449656]  kasan_save_alloc_info+0x3b/0x50
[   28.449881]  __kasan_kmalloc+0xb7/0xc0
[   28.450102]  __kmalloc_cache_noprof+0x189/0x420
[   28.450322]  kasan_atomics+0x95/0x310
[   28.450501]  kunit_try_run_case+0x1a5/0x480
[   28.450658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.450818]  kthread+0x337/0x6f0
[   28.450929]  ret_from_fork+0x116/0x1d0
[   28.451101]  ret_from_fork_asm+0x1a/0x30
[   28.451364] 
[   28.451452] The buggy address belongs to the object at ffff88810458d180
[   28.451452]  which belongs to the cache kmalloc-64 of size 64
[   28.451993] The buggy address is located 0 bytes to the right of
[   28.451993]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.452511] 
[   28.452601] The buggy address belongs to the physical page:
[   28.452846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.453175] flags: 0x200000000000000(node=0|zone=2)
[   28.453415] page_type: f5(slab)
[   28.453626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.454012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.454381] page dumped because: kasan: bad access detected
[   28.454624] 
[   28.454712] Memory state around the buggy address:
[   28.454934]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.455585]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.455846] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.456043]                                      ^
[   28.456196]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.456731]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.457035] ==================================================================
[   29.075967] ==================================================================
[   29.076761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   29.077101] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.077815] 
[   29.078459] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.078513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.078525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.078547] Call Trace:
[   29.078708]  <TASK>
[   29.078733]  dump_stack_lvl+0x73/0xb0
[   29.078817]  print_report+0xd1/0x610
[   29.078842]  ? __virt_addr_valid+0x1db/0x2d0
[   29.078880]  ? kasan_atomics_helper+0x1a7f/0x5450
[   29.078901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.078929]  ? kasan_atomics_helper+0x1a7f/0x5450
[   29.078963]  kasan_report+0x141/0x180
[   29.078986]  ? kasan_atomics_helper+0x1a7f/0x5450
[   29.079013]  kasan_check_range+0x10c/0x1c0
[   29.079047]  __kasan_check_write+0x18/0x20
[   29.079070]  kasan_atomics_helper+0x1a7f/0x5450
[   29.079109]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.079131]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.079157]  ? kasan_atomics+0x152/0x310
[   29.079194]  kasan_atomics+0x1dc/0x310
[   29.079217]  ? __pfx_kasan_atomics+0x10/0x10
[   29.079254]  ? __pfx_read_tsc+0x10/0x10
[   29.079276]  ? ktime_get_ts64+0x86/0x230
[   29.079302]  kunit_try_run_case+0x1a5/0x480
[   29.079336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.079359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.079383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.079418]  ? __kthread_parkme+0x82/0x180
[   29.079442]  ? preempt_count_sub+0x50/0x80
[   29.079466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.079501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.079524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.079548]  kthread+0x337/0x6f0
[   29.079579]  ? trace_preempt_on+0x20/0xc0
[   29.079602]  ? __pfx_kthread+0x10/0x10
[   29.079623]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.079658]  ? calculate_sigpending+0x7b/0xa0
[   29.079681]  ? __pfx_kthread+0x10/0x10
[   29.079703]  ret_from_fork+0x116/0x1d0
[   29.079755]  ? __pfx_kthread+0x10/0x10
[   29.079776]  ret_from_fork_asm+0x1a/0x30
[   29.079819]  </TASK>
[   29.079831] 
[   29.092820] Allocated by task 314:
[   29.093164]  kasan_save_stack+0x45/0x70
[   29.093692]  kasan_save_track+0x18/0x40
[   29.093953]  kasan_save_alloc_info+0x3b/0x50
[   29.094534]  __kasan_kmalloc+0xb7/0xc0
[   29.094933]  __kmalloc_cache_noprof+0x189/0x420
[   29.095602]  kasan_atomics+0x95/0x310
[   29.095874]  kunit_try_run_case+0x1a5/0x480
[   29.096328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.096577]  kthread+0x337/0x6f0
[   29.096727]  ret_from_fork+0x116/0x1d0
[   29.096896]  ret_from_fork_asm+0x1a/0x30
[   29.097071] 
[   29.097165] The buggy address belongs to the object at ffff88810458d180
[   29.097165]  which belongs to the cache kmalloc-64 of size 64
[   29.098474] The buggy address is located 0 bytes to the right of
[   29.098474]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.099488] 
[   29.099582] The buggy address belongs to the physical page:
[   29.099756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.099996] flags: 0x200000000000000(node=0|zone=2)
[   29.100468] page_type: f5(slab)
[   29.100882] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.101128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.101584] page dumped because: kasan: bad access detected
[   29.102053] 
[   29.102214] Memory state around the buggy address:
[   29.102637]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.103173]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.103667] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.104050]                                      ^
[   29.104216]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.104823]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.105440] ==================================================================
[   29.391220] ==================================================================
[   29.392017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   29.392628] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.392937] 
[   29.393036] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.393098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.393111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.393133] Call Trace:
[   29.393148]  <TASK>
[   29.393165]  dump_stack_lvl+0x73/0xb0
[   29.393194]  print_report+0xd1/0x610
[   29.393217]  ? __virt_addr_valid+0x1db/0x2d0
[   29.393241]  ? kasan_atomics_helper+0x218a/0x5450
[   29.393262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.393290]  ? kasan_atomics_helper+0x218a/0x5450
[   29.393312]  kasan_report+0x141/0x180
[   29.393335]  ? kasan_atomics_helper+0x218a/0x5450
[   29.393361]  kasan_check_range+0x10c/0x1c0
[   29.393386]  __kasan_check_write+0x18/0x20
[   29.393432]  kasan_atomics_helper+0x218a/0x5450
[   29.393455]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.393491]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.393515]  ? kasan_atomics+0x152/0x310
[   29.393555]  kasan_atomics+0x1dc/0x310
[   29.393578]  ? __pfx_kasan_atomics+0x10/0x10
[   29.393604]  ? __pfx_read_tsc+0x10/0x10
[   29.393625]  ? ktime_get_ts64+0x86/0x230
[   29.393650]  kunit_try_run_case+0x1a5/0x480
[   29.393674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.393696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.393720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.393744]  ? __kthread_parkme+0x82/0x180
[   29.393768]  ? preempt_count_sub+0x50/0x80
[   29.393792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.393815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.393839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.393863]  kthread+0x337/0x6f0
[   29.393882]  ? trace_preempt_on+0x20/0xc0
[   29.393906]  ? __pfx_kthread+0x10/0x10
[   29.393934]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.393956]  ? calculate_sigpending+0x7b/0xa0
[   29.393980]  ? __pfx_kthread+0x10/0x10
[   29.394002]  ret_from_fork+0x116/0x1d0
[   29.394021]  ? __pfx_kthread+0x10/0x10
[   29.394042]  ret_from_fork_asm+0x1a/0x30
[   29.394074]  </TASK>
[   29.394095] 
[   29.401622] Allocated by task 314:
[   29.401764]  kasan_save_stack+0x45/0x70
[   29.401894]  kasan_save_track+0x18/0x40
[   29.402021]  kasan_save_alloc_info+0x3b/0x50
[   29.402169]  __kasan_kmalloc+0xb7/0xc0
[   29.402425]  __kmalloc_cache_noprof+0x189/0x420
[   29.402641]  kasan_atomics+0x95/0x310
[   29.402835]  kunit_try_run_case+0x1a5/0x480
[   29.403037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.403355]  kthread+0x337/0x6f0
[   29.403541]  ret_from_fork+0x116/0x1d0
[   29.403732]  ret_from_fork_asm+0x1a/0x30
[   29.403911] 
[   29.404014] The buggy address belongs to the object at ffff88810458d180
[   29.404014]  which belongs to the cache kmalloc-64 of size 64
[   29.404523] The buggy address is located 0 bytes to the right of
[   29.404523]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.405088] 
[   29.405183] The buggy address belongs to the physical page:
[   29.405445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.405729] flags: 0x200000000000000(node=0|zone=2)
[   29.405978] page_type: f5(slab)
[   29.406149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.406511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.406749] page dumped because: kasan: bad access detected
[   29.406994] 
[   29.407115] Memory state around the buggy address:
[   29.407346]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.407587]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.407893] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.408169]                                      ^
[   29.408495]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.408807]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.409149] ==================================================================
[   28.500821] ==================================================================
[   28.501662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   28.502313] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.503035] 
[   28.503237] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.503294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.503306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.503328] Call Trace:
[   28.503344]  <TASK>
[   28.503359]  dump_stack_lvl+0x73/0xb0
[   28.503401]  print_report+0xd1/0x610
[   28.503423]  ? __virt_addr_valid+0x1db/0x2d0
[   28.503447]  ? kasan_atomics_helper+0xd47/0x5450
[   28.503479]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.503506]  ? kasan_atomics_helper+0xd47/0x5450
[   28.503527]  kasan_report+0x141/0x180
[   28.503550]  ? kasan_atomics_helper+0xd47/0x5450
[   28.503577]  kasan_check_range+0x10c/0x1c0
[   28.503601]  __kasan_check_write+0x18/0x20
[   28.503624]  kasan_atomics_helper+0xd47/0x5450
[   28.503647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.503669]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.503695]  ? kasan_atomics+0x152/0x310
[   28.503721]  kasan_atomics+0x1dc/0x310
[   28.503744]  ? __pfx_kasan_atomics+0x10/0x10
[   28.503769]  ? __pfx_read_tsc+0x10/0x10
[   28.503790]  ? ktime_get_ts64+0x86/0x230
[   28.503814]  kunit_try_run_case+0x1a5/0x480
[   28.503839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.503861]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.503885]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.503909]  ? __kthread_parkme+0x82/0x180
[   28.503932]  ? preempt_count_sub+0x50/0x80
[   28.503955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.503979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.504003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.504026]  kthread+0x337/0x6f0
[   28.504046]  ? trace_preempt_on+0x20/0xc0
[   28.504069]  ? __pfx_kthread+0x10/0x10
[   28.504100]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.504122]  ? calculate_sigpending+0x7b/0xa0
[   28.504147]  ? __pfx_kthread+0x10/0x10
[   28.504169]  ret_from_fork+0x116/0x1d0
[   28.504189]  ? __pfx_kthread+0x10/0x10
[   28.504210]  ret_from_fork_asm+0x1a/0x30
[   28.504242]  </TASK>
[   28.504253] 
[   28.516398] Allocated by task 314:
[   28.516826]  kasan_save_stack+0x45/0x70
[   28.517193]  kasan_save_track+0x18/0x40
[   28.517571]  kasan_save_alloc_info+0x3b/0x50
[   28.517969]  __kasan_kmalloc+0xb7/0xc0
[   28.518323]  __kmalloc_cache_noprof+0x189/0x420
[   28.518813]  kasan_atomics+0x95/0x310
[   28.519168]  kunit_try_run_case+0x1a5/0x480
[   28.519589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.519988]  kthread+0x337/0x6f0
[   28.520114]  ret_from_fork+0x116/0x1d0
[   28.520241]  ret_from_fork_asm+0x1a/0x30
[   28.520435] 
[   28.520602] The buggy address belongs to the object at ffff88810458d180
[   28.520602]  which belongs to the cache kmalloc-64 of size 64
[   28.521662] The buggy address is located 0 bytes to the right of
[   28.521662]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.522757] 
[   28.522930] The buggy address belongs to the physical page:
[   28.523427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.523758] flags: 0x200000000000000(node=0|zone=2)
[   28.523917] page_type: f5(slab)
[   28.524033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.524364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.524660] page dumped because: kasan: bad access detected
[   28.524870] 
[   28.524958] Memory state around the buggy address:
[   28.525176]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.525510]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.525798] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.526073]                                      ^
[   28.526278]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.526584]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.526817] ==================================================================
[   29.056630] ==================================================================
[   29.057049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   29.057516] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.057739] 
[   29.057814] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.057860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.057873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.057894] Call Trace:
[   29.057907]  <TASK>
[   29.057929]  dump_stack_lvl+0x73/0xb0
[   29.057957]  print_report+0xd1/0x610
[   29.057979]  ? __virt_addr_valid+0x1db/0x2d0
[   29.058002]  ? kasan_atomics_helper+0x19e3/0x5450
[   29.058063]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.058104]  ? kasan_atomics_helper+0x19e3/0x5450
[   29.058125]  kasan_report+0x141/0x180
[   29.058148]  ? kasan_atomics_helper+0x19e3/0x5450
[   29.058175]  kasan_check_range+0x10c/0x1c0
[   29.058199]  __kasan_check_write+0x18/0x20
[   29.058222]  kasan_atomics_helper+0x19e3/0x5450
[   29.058245]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.058267]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.058305]  ? kasan_atomics+0x152/0x310
[   29.058332]  kasan_atomics+0x1dc/0x310
[   29.058354]  ? __pfx_kasan_atomics+0x10/0x10
[   29.058378]  ? __pfx_read_tsc+0x10/0x10
[   29.058399]  ? ktime_get_ts64+0x86/0x230
[   29.058424]  kunit_try_run_case+0x1a5/0x480
[   29.058447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.058469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.058493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.058516]  ? __kthread_parkme+0x82/0x180
[   29.058539]  ? preempt_count_sub+0x50/0x80
[   29.058562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.058586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.058609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.058633]  kthread+0x337/0x6f0
[   29.058652]  ? trace_preempt_on+0x20/0xc0
[   29.058676]  ? __pfx_kthread+0x10/0x10
[   29.058696]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.058718]  ? calculate_sigpending+0x7b/0xa0
[   29.058741]  ? __pfx_kthread+0x10/0x10
[   29.058764]  ret_from_fork+0x116/0x1d0
[   29.058783]  ? __pfx_kthread+0x10/0x10
[   29.058803]  ret_from_fork_asm+0x1a/0x30
[   29.058836]  </TASK>
[   29.058846] 
[   29.066958] Allocated by task 314:
[   29.067205]  kasan_save_stack+0x45/0x70
[   29.067631]  kasan_save_track+0x18/0x40
[   29.067851]  kasan_save_alloc_info+0x3b/0x50
[   29.068020]  __kasan_kmalloc+0xb7/0xc0
[   29.068192]  __kmalloc_cache_noprof+0x189/0x420
[   29.068522]  kasan_atomics+0x95/0x310
[   29.068703]  kunit_try_run_case+0x1a5/0x480
[   29.068893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.069162]  kthread+0x337/0x6f0
[   29.069278]  ret_from_fork+0x116/0x1d0
[   29.069415]  ret_from_fork_asm+0x1a/0x30
[   29.069712] 
[   29.069832] The buggy address belongs to the object at ffff88810458d180
[   29.069832]  which belongs to the cache kmalloc-64 of size 64
[   29.070349] The buggy address is located 0 bytes to the right of
[   29.070349]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.070927] 
[   29.071012] The buggy address belongs to the physical page:
[   29.071260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.071614] flags: 0x200000000000000(node=0|zone=2)
[   29.071836] page_type: f5(slab)
[   29.071971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.072342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.072698] page dumped because: kasan: bad access detected
[   29.072946] 
[   29.073034] Memory state around the buggy address:
[   29.073279]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.073690]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.074025] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.074312]                                      ^
[   29.074592]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.074799]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.075002] ==================================================================
[   29.166915] ==================================================================
[   29.167576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   29.168469] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.169478] 
[   29.169836] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.169888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.169901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.169929] Call Trace:
[   29.169944]  <TASK>
[   29.169961]  dump_stack_lvl+0x73/0xb0
[   29.169991]  print_report+0xd1/0x610
[   29.170013]  ? __virt_addr_valid+0x1db/0x2d0
[   29.170035]  ? kasan_atomics_helper+0x1ce1/0x5450
[   29.170056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.170148]  ? kasan_atomics_helper+0x1ce1/0x5450
[   29.170172]  kasan_report+0x141/0x180
[   29.170195]  ? kasan_atomics_helper+0x1ce1/0x5450
[   29.170221]  kasan_check_range+0x10c/0x1c0
[   29.170245]  __kasan_check_write+0x18/0x20
[   29.170298]  kasan_atomics_helper+0x1ce1/0x5450
[   29.170321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.170344]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.170369]  ? kasan_atomics+0x152/0x310
[   29.170396]  kasan_atomics+0x1dc/0x310
[   29.170418]  ? __pfx_kasan_atomics+0x10/0x10
[   29.170443]  ? __pfx_read_tsc+0x10/0x10
[   29.170463]  ? ktime_get_ts64+0x86/0x230
[   29.170488]  kunit_try_run_case+0x1a5/0x480
[   29.170512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.170534]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.170557]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.170581]  ? __kthread_parkme+0x82/0x180
[   29.170605]  ? preempt_count_sub+0x50/0x80
[   29.170628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.170652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.170675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.170699]  kthread+0x337/0x6f0
[   29.170718]  ? trace_preempt_on+0x20/0xc0
[   29.170741]  ? __pfx_kthread+0x10/0x10
[   29.170761]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.170783]  ? calculate_sigpending+0x7b/0xa0
[   29.170807]  ? __pfx_kthread+0x10/0x10
[   29.170829]  ret_from_fork+0x116/0x1d0
[   29.170848]  ? __pfx_kthread+0x10/0x10
[   29.170944]  ret_from_fork_asm+0x1a/0x30
[   29.170989]  </TASK>
[   29.171001] 
[   29.184028] Allocated by task 314:
[   29.184339]  kasan_save_stack+0x45/0x70
[   29.184482]  kasan_save_track+0x18/0x40
[   29.184612]  kasan_save_alloc_info+0x3b/0x50
[   29.184755]  __kasan_kmalloc+0xb7/0xc0
[   29.184880]  __kmalloc_cache_noprof+0x189/0x420
[   29.185028]  kasan_atomics+0x95/0x310
[   29.185428]  kunit_try_run_case+0x1a5/0x480
[   29.185818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.186348]  kthread+0x337/0x6f0
[   29.186660]  ret_from_fork+0x116/0x1d0
[   29.187041]  ret_from_fork_asm+0x1a/0x30
[   29.187447] 
[   29.187624] The buggy address belongs to the object at ffff88810458d180
[   29.187624]  which belongs to the cache kmalloc-64 of size 64
[   29.188714] The buggy address is located 0 bytes to the right of
[   29.188714]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.189580] 
[   29.189650] The buggy address belongs to the physical page:
[   29.189815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.190065] flags: 0x200000000000000(node=0|zone=2)
[   29.190587] page_type: f5(slab)
[   29.190917] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.191592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.192252] page dumped because: kasan: bad access detected
[   29.192758] 
[   29.192907] Memory state around the buggy address:
[   29.193193]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.193757]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.194185] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.194725]                                      ^
[   29.195171]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.195539]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.195750] ==================================================================
[   28.475506] ==================================================================
[   28.475763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   28.476212] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.476530] 
[   28.476604] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.476648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.476660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.476681] Call Trace:
[   28.476712]  <TASK>
[   28.476725]  dump_stack_lvl+0x73/0xb0
[   28.476767]  print_report+0xd1/0x610
[   28.476789]  ? __virt_addr_valid+0x1db/0x2d0
[   28.476825]  ? kasan_atomics_helper+0x4a84/0x5450
[   28.476846]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.476873]  ? kasan_atomics_helper+0x4a84/0x5450
[   28.476895]  kasan_report+0x141/0x180
[   28.476917]  ? kasan_atomics_helper+0x4a84/0x5450
[   28.476959]  __asan_report_load4_noabort+0x18/0x20
[   28.476984]  kasan_atomics_helper+0x4a84/0x5450
[   28.477034]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.477071]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.477120]  ? kasan_atomics+0x152/0x310
[   28.477159]  kasan_atomics+0x1dc/0x310
[   28.477195]  ? __pfx_kasan_atomics+0x10/0x10
[   28.477245]  ? __pfx_read_tsc+0x10/0x10
[   28.477280]  ? ktime_get_ts64+0x86/0x230
[   28.477318]  kunit_try_run_case+0x1a5/0x480
[   28.477354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.477402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.477439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.477476]  ? __kthread_parkme+0x82/0x180
[   28.477526]  ? preempt_count_sub+0x50/0x80
[   28.477562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.477599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.477635]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.477685]  kthread+0x337/0x6f0
[   28.477718]  ? trace_preempt_on+0x20/0xc0
[   28.477754]  ? __pfx_kthread+0x10/0x10
[   28.477787]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.477822]  ? calculate_sigpending+0x7b/0xa0
[   28.477871]  ? __pfx_kthread+0x10/0x10
[   28.477906]  ret_from_fork+0x116/0x1d0
[   28.477929]  ? __pfx_kthread+0x10/0x10
[   28.477950]  ret_from_fork_asm+0x1a/0x30
[   28.477982]  </TASK>
[   28.477993] 
[   28.485817] Allocated by task 314:
[   28.485996]  kasan_save_stack+0x45/0x70
[   28.486186]  kasan_save_track+0x18/0x40
[   28.486389]  kasan_save_alloc_info+0x3b/0x50
[   28.486609]  __kasan_kmalloc+0xb7/0xc0
[   28.486785]  __kmalloc_cache_noprof+0x189/0x420
[   28.486978]  kasan_atomics+0x95/0x310
[   28.487169]  kunit_try_run_case+0x1a5/0x480
[   28.487521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.488200]  kthread+0x337/0x6f0
[   28.489099]  ret_from_fork+0x116/0x1d0
[   28.489452]  ret_from_fork_asm+0x1a/0x30
[   28.489895] 
[   28.490259] The buggy address belongs to the object at ffff88810458d180
[   28.490259]  which belongs to the cache kmalloc-64 of size 64
[   28.491453] The buggy address is located 0 bytes to the right of
[   28.491453]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.492030] 
[   28.492367] The buggy address belongs to the physical page:
[   28.493156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.494414] flags: 0x200000000000000(node=0|zone=2)
[   28.494712] page_type: f5(slab)
[   28.495150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.495908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.496151] page dumped because: kasan: bad access detected
[   28.496675] 
[   28.496983] Memory state around the buggy address:
[   28.497670]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.498567]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.499457] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.499685]                                      ^
[   28.499838]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.500052]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.500272] ==================================================================
[   28.611817] ==================================================================
[   28.612199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   28.612775] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.613240] 
[   28.613558] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.613635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.613649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.613671] Call Trace:
[   28.613722]  <TASK>
[   28.613739]  dump_stack_lvl+0x73/0xb0
[   28.613769]  print_report+0xd1/0x610
[   28.613792]  ? __virt_addr_valid+0x1db/0x2d0
[   28.613816]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.613838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.613864]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.613887]  kasan_report+0x141/0x180
[   28.613909]  ? kasan_atomics_helper+0x4a36/0x5450
[   28.613941]  __asan_report_load4_noabort+0x18/0x20
[   28.613966]  kasan_atomics_helper+0x4a36/0x5450
[   28.613991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.614013]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.614038]  ? kasan_atomics+0x152/0x310
[   28.614065]  kasan_atomics+0x1dc/0x310
[   28.614099]  ? __pfx_kasan_atomics+0x10/0x10
[   28.614124]  ? __pfx_read_tsc+0x10/0x10
[   28.614145]  ? ktime_get_ts64+0x86/0x230
[   28.614171]  kunit_try_run_case+0x1a5/0x480
[   28.614197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.614222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.614246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.614270]  ? __kthread_parkme+0x82/0x180
[   28.614305]  ? preempt_count_sub+0x50/0x80
[   28.614329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.614353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.614377]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.614401]  kthread+0x337/0x6f0
[   28.614421]  ? trace_preempt_on+0x20/0xc0
[   28.614446]  ? __pfx_kthread+0x10/0x10
[   28.614467]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.614490]  ? calculate_sigpending+0x7b/0xa0
[   28.614514]  ? __pfx_kthread+0x10/0x10
[   28.614536]  ret_from_fork+0x116/0x1d0
[   28.614556]  ? __pfx_kthread+0x10/0x10
[   28.614577]  ret_from_fork_asm+0x1a/0x30
[   28.614609]  </TASK>
[   28.614621] 
[   28.626569] Allocated by task 314:
[   28.626738]  kasan_save_stack+0x45/0x70
[   28.626923]  kasan_save_track+0x18/0x40
[   28.627106]  kasan_save_alloc_info+0x3b/0x50
[   28.627587]  __kasan_kmalloc+0xb7/0xc0
[   28.627756]  __kmalloc_cache_noprof+0x189/0x420
[   28.627950]  kasan_atomics+0x95/0x310
[   28.628128]  kunit_try_run_case+0x1a5/0x480
[   28.628604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.628905]  kthread+0x337/0x6f0
[   28.629060]  ret_from_fork+0x116/0x1d0
[   28.629232]  ret_from_fork_asm+0x1a/0x30
[   28.629777] 
[   28.629887] The buggy address belongs to the object at ffff88810458d180
[   28.629887]  which belongs to the cache kmalloc-64 of size 64
[   28.630617] The buggy address is located 0 bytes to the right of
[   28.630617]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.631641] 
[   28.631773] The buggy address belongs to the physical page:
[   28.632216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.632667] flags: 0x200000000000000(node=0|zone=2)
[   28.632888] page_type: f5(slab)
[   28.633040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.633670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.633985] page dumped because: kasan: bad access detected
[   28.634219] 
[   28.634518] Memory state around the buggy address:
[   28.634851]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.635424]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.635715] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.635996]                                      ^
[   28.636200]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.636763]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.637259] ==================================================================
[   28.564174] ==================================================================
[   28.564765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   28.564990] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.565224] 
[   28.565434] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.565498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.565511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.565532] Call Trace:
[   28.565558]  <TASK>
[   28.565574]  dump_stack_lvl+0x73/0xb0
[   28.565603]  print_report+0xd1/0x610
[   28.565625]  ? __virt_addr_valid+0x1db/0x2d0
[   28.565649]  ? kasan_atomics_helper+0xf10/0x5450
[   28.565682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.565709]  ? kasan_atomics_helper+0xf10/0x5450
[   28.565732]  kasan_report+0x141/0x180
[   28.565764]  ? kasan_atomics_helper+0xf10/0x5450
[   28.565791]  kasan_check_range+0x10c/0x1c0
[   28.565815]  __kasan_check_write+0x18/0x20
[   28.565839]  kasan_atomics_helper+0xf10/0x5450
[   28.565862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.565885]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.565909]  ? kasan_atomics+0x152/0x310
[   28.565940]  kasan_atomics+0x1dc/0x310
[   28.565963]  ? __pfx_kasan_atomics+0x10/0x10
[   28.565988]  ? __pfx_read_tsc+0x10/0x10
[   28.566010]  ? ktime_get_ts64+0x86/0x230
[   28.566034]  kunit_try_run_case+0x1a5/0x480
[   28.566058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.566090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.566114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.566138]  ? __kthread_parkme+0x82/0x180
[   28.566163]  ? preempt_count_sub+0x50/0x80
[   28.566187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.566211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.566235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.566259]  kthread+0x337/0x6f0
[   28.566290]  ? trace_preempt_on+0x20/0xc0
[   28.566314]  ? __pfx_kthread+0x10/0x10
[   28.566335]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.566357]  ? calculate_sigpending+0x7b/0xa0
[   28.566391]  ? __pfx_kthread+0x10/0x10
[   28.566412]  ret_from_fork+0x116/0x1d0
[   28.566432]  ? __pfx_kthread+0x10/0x10
[   28.566464]  ret_from_fork_asm+0x1a/0x30
[   28.566496]  </TASK>
[   28.566507] 
[   28.574351] Allocated by task 314:
[   28.574473]  kasan_save_stack+0x45/0x70
[   28.574666]  kasan_save_track+0x18/0x40
[   28.574847]  kasan_save_alloc_info+0x3b/0x50
[   28.575048]  __kasan_kmalloc+0xb7/0xc0
[   28.575230]  __kmalloc_cache_noprof+0x189/0x420
[   28.575493]  kasan_atomics+0x95/0x310
[   28.575660]  kunit_try_run_case+0x1a5/0x480
[   28.575862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.576072]  kthread+0x337/0x6f0
[   28.576196]  ret_from_fork+0x116/0x1d0
[   28.576321]  ret_from_fork_asm+0x1a/0x30
[   28.576454] 
[   28.576517] The buggy address belongs to the object at ffff88810458d180
[   28.576517]  which belongs to the cache kmalloc-64 of size 64
[   28.576860] The buggy address is located 0 bytes to the right of
[   28.576860]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.577496] 
[   28.577608] The buggy address belongs to the physical page:
[   28.577848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.578210] flags: 0x200000000000000(node=0|zone=2)
[   28.579153] page_type: f5(slab)
[   28.579702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.580045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.580756] page dumped because: kasan: bad access detected
[   28.581163] 
[   28.581257] Memory state around the buggy address:
[   28.581749]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.582016]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.582576] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.583016]                                      ^
[   28.583466]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.583969]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.584685] ==================================================================
[   28.927326] ==================================================================
[   28.927796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   28.928137] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.928528] 
[   28.928633] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.928703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.928716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.928737] Call Trace:
[   28.928752]  <TASK>
[   28.928767]  dump_stack_lvl+0x73/0xb0
[   28.928795]  print_report+0xd1/0x610
[   28.928817]  ? __virt_addr_valid+0x1db/0x2d0
[   28.928840]  ? kasan_atomics_helper+0x15b6/0x5450
[   28.928862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.928888]  ? kasan_atomics_helper+0x15b6/0x5450
[   28.928932]  kasan_report+0x141/0x180
[   28.928955]  ? kasan_atomics_helper+0x15b6/0x5450
[   28.928983]  kasan_check_range+0x10c/0x1c0
[   28.929006]  __kasan_check_write+0x18/0x20
[   28.929029]  kasan_atomics_helper+0x15b6/0x5450
[   28.929053]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.929075]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.929110]  ? kasan_atomics+0x152/0x310
[   28.929136]  kasan_atomics+0x1dc/0x310
[   28.929159]  ? __pfx_kasan_atomics+0x10/0x10
[   28.929184]  ? __pfx_read_tsc+0x10/0x10
[   28.929205]  ? ktime_get_ts64+0x86/0x230
[   28.929230]  kunit_try_run_case+0x1a5/0x480
[   28.929253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.929284]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.929327]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.929352]  ? __kthread_parkme+0x82/0x180
[   28.929378]  ? preempt_count_sub+0x50/0x80
[   28.929402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.929426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.929450]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.929474]  kthread+0x337/0x6f0
[   28.929495]  ? trace_preempt_on+0x20/0xc0
[   28.929517]  ? __pfx_kthread+0x10/0x10
[   28.929539]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.929562]  ? calculate_sigpending+0x7b/0xa0
[   28.929587]  ? __pfx_kthread+0x10/0x10
[   28.929609]  ret_from_fork+0x116/0x1d0
[   28.929628]  ? __pfx_kthread+0x10/0x10
[   28.929650]  ret_from_fork_asm+0x1a/0x30
[   28.929681]  </TASK>
[   28.929693] 
[   28.936934] Allocated by task 314:
[   28.937186]  kasan_save_stack+0x45/0x70
[   28.937390]  kasan_save_track+0x18/0x40
[   28.937521]  kasan_save_alloc_info+0x3b/0x50
[   28.937664]  __kasan_kmalloc+0xb7/0xc0
[   28.937804]  __kmalloc_cache_noprof+0x189/0x420
[   28.938029]  kasan_atomics+0x95/0x310
[   28.938243]  kunit_try_run_case+0x1a5/0x480
[   28.938463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.938733]  kthread+0x337/0x6f0
[   28.938899]  ret_from_fork+0x116/0x1d0
[   28.939059]  ret_from_fork_asm+0x1a/0x30
[   28.939260] 
[   28.939338] The buggy address belongs to the object at ffff88810458d180
[   28.939338]  which belongs to the cache kmalloc-64 of size 64
[   28.939756] The buggy address is located 0 bytes to the right of
[   28.939756]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.940126] 
[   28.940196] The buggy address belongs to the physical page:
[   28.940471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.940834] flags: 0x200000000000000(node=0|zone=2)
[   28.941058] page_type: f5(slab)
[   28.941228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.941540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.941761] page dumped because: kasan: bad access detected
[   28.941934] 
[   28.942021] Memory state around the buggy address:
[   28.942250]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.942596]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.942928] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.943248]                                      ^
[   28.943554]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.943787]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.943992] ==================================================================
[   28.708523] ==================================================================
[   28.709070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   28.709507] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.710166] 
[   28.710274] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.710338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.710350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.710372] Call Trace:
[   28.710386]  <TASK>
[   28.710402]  dump_stack_lvl+0x73/0xb0
[   28.710432]  print_report+0xd1/0x610
[   28.710454]  ? __virt_addr_valid+0x1db/0x2d0
[   28.710478]  ? kasan_atomics_helper+0x4a02/0x5450
[   28.710500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.710527]  ? kasan_atomics_helper+0x4a02/0x5450
[   28.710548]  kasan_report+0x141/0x180
[   28.710571]  ? kasan_atomics_helper+0x4a02/0x5450
[   28.710598]  __asan_report_load4_noabort+0x18/0x20
[   28.710915]  kasan_atomics_helper+0x4a02/0x5450
[   28.710940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.710962]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.710988]  ? kasan_atomics+0x152/0x310
[   28.711014]  kasan_atomics+0x1dc/0x310
[   28.711037]  ? __pfx_kasan_atomics+0x10/0x10
[   28.711062]  ? __pfx_read_tsc+0x10/0x10
[   28.711096]  ? ktime_get_ts64+0x86/0x230
[   28.711120]  kunit_try_run_case+0x1a5/0x480
[   28.711144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.711167]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.711190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.711216]  ? __kthread_parkme+0x82/0x180
[   28.711240]  ? preempt_count_sub+0x50/0x80
[   28.711263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.711296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.711319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.711343]  kthread+0x337/0x6f0
[   28.711362]  ? trace_preempt_on+0x20/0xc0
[   28.711386]  ? __pfx_kthread+0x10/0x10
[   28.711407]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.711429]  ? calculate_sigpending+0x7b/0xa0
[   28.711452]  ? __pfx_kthread+0x10/0x10
[   28.711474]  ret_from_fork+0x116/0x1d0
[   28.711493]  ? __pfx_kthread+0x10/0x10
[   28.711514]  ret_from_fork_asm+0x1a/0x30
[   28.711545]  </TASK>
[   28.711556] 
[   28.720779] Allocated by task 314:
[   28.720954]  kasan_save_stack+0x45/0x70
[   28.721128]  kasan_save_track+0x18/0x40
[   28.721614]  kasan_save_alloc_info+0x3b/0x50
[   28.721822]  __kasan_kmalloc+0xb7/0xc0
[   28.722066]  __kmalloc_cache_noprof+0x189/0x420
[   28.722357]  kasan_atomics+0x95/0x310
[   28.722603]  kunit_try_run_case+0x1a5/0x480
[   28.722772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.723021]  kthread+0x337/0x6f0
[   28.723260]  ret_from_fork+0x116/0x1d0
[   28.723394]  ret_from_fork_asm+0x1a/0x30
[   28.723589] 
[   28.723676] The buggy address belongs to the object at ffff88810458d180
[   28.723676]  which belongs to the cache kmalloc-64 of size 64
[   28.724480] The buggy address is located 0 bytes to the right of
[   28.724480]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.725096] 
[   28.725253] The buggy address belongs to the physical page:
[   28.725597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.725991] flags: 0x200000000000000(node=0|zone=2)
[   28.726226] page_type: f5(slab)
[   28.726384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.726865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.727299] page dumped because: kasan: bad access detected
[   28.727603] 
[   28.727692] Memory state around the buggy address:
[   28.727876]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.728194]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.728773] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.729141]                                      ^
[   28.729313]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.729811]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.730209] ==================================================================
[   28.242131] ==================================================================
[   28.242883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   28.243123] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.243364] 
[   28.243670] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.243720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.243733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.243754] Call Trace:
[   28.243770]  <TASK>
[   28.243786]  dump_stack_lvl+0x73/0xb0
[   28.243816]  print_report+0xd1/0x610
[   28.243839]  ? __virt_addr_valid+0x1db/0x2d0
[   28.243861]  ? kasan_atomics_helper+0x5fe/0x5450
[   28.243882]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.243908]  ? kasan_atomics_helper+0x5fe/0x5450
[   28.243930]  kasan_report+0x141/0x180
[   28.243953]  ? kasan_atomics_helper+0x5fe/0x5450
[   28.243980]  kasan_check_range+0x10c/0x1c0
[   28.244005]  __kasan_check_write+0x18/0x20
[   28.244028]  kasan_atomics_helper+0x5fe/0x5450
[   28.244051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.244073]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.244109]  ? kasan_atomics+0x152/0x310
[   28.244136]  kasan_atomics+0x1dc/0x310
[   28.244158]  ? __pfx_kasan_atomics+0x10/0x10
[   28.244183]  ? __pfx_read_tsc+0x10/0x10
[   28.244246]  ? ktime_get_ts64+0x86/0x230
[   28.244270]  kunit_try_run_case+0x1a5/0x480
[   28.244466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.244489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.244513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.244538]  ? __kthread_parkme+0x82/0x180
[   28.244562]  ? preempt_count_sub+0x50/0x80
[   28.244585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.244609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.244633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.244657]  kthread+0x337/0x6f0
[   28.244676]  ? trace_preempt_on+0x20/0xc0
[   28.244699]  ? __pfx_kthread+0x10/0x10
[   28.244720]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.244742]  ? calculate_sigpending+0x7b/0xa0
[   28.244766]  ? __pfx_kthread+0x10/0x10
[   28.244788]  ret_from_fork+0x116/0x1d0
[   28.244807]  ? __pfx_kthread+0x10/0x10
[   28.244828]  ret_from_fork_asm+0x1a/0x30
[   28.244861]  </TASK>
[   28.244872] 
[   28.255148] Allocated by task 314:
[   28.255711]  kasan_save_stack+0x45/0x70
[   28.255927]  kasan_save_track+0x18/0x40
[   28.256117]  kasan_save_alloc_info+0x3b/0x50
[   28.256724]  __kasan_kmalloc+0xb7/0xc0
[   28.256923]  __kmalloc_cache_noprof+0x189/0x420
[   28.257134]  kasan_atomics+0x95/0x310
[   28.257475]  kunit_try_run_case+0x1a5/0x480
[   28.257918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.258599]  kthread+0x337/0x6f0
[   28.258845]  ret_from_fork+0x116/0x1d0
[   28.259158]  ret_from_fork_asm+0x1a/0x30
[   28.259604] 
[   28.259698] The buggy address belongs to the object at ffff88810458d180
[   28.259698]  which belongs to the cache kmalloc-64 of size 64
[   28.260898] The buggy address is located 0 bytes to the right of
[   28.260898]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.261895] 
[   28.262151] The buggy address belongs to the physical page:
[   28.262808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.263513] flags: 0x200000000000000(node=0|zone=2)
[   28.263818] page_type: f5(slab)
[   28.264186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.264840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.265165] page dumped because: kasan: bad access detected
[   28.265915] 
[   28.266184] Memory state around the buggy address:
[   28.266799]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.267306]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.267766] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.268058]                                      ^
[   28.268224]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.268619]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.269136] ==================================================================
[   28.961929] ==================================================================
[   28.962395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   28.962629] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.962848] 
[   28.962924] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.962971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.962983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.963004] Call Trace:
[   28.963018]  <TASK>
[   28.963035]  dump_stack_lvl+0x73/0xb0
[   28.963063]  print_report+0xd1/0x610
[   28.963099]  ? __virt_addr_valid+0x1db/0x2d0
[   28.963122]  ? kasan_atomics_helper+0x16e7/0x5450
[   28.963144]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.963171]  ? kasan_atomics_helper+0x16e7/0x5450
[   28.963193]  kasan_report+0x141/0x180
[   28.963216]  ? kasan_atomics_helper+0x16e7/0x5450
[   28.963243]  kasan_check_range+0x10c/0x1c0
[   28.963267]  __kasan_check_write+0x18/0x20
[   28.963291]  kasan_atomics_helper+0x16e7/0x5450
[   28.963314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.963336]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.963361]  ? kasan_atomics+0x152/0x310
[   28.963387]  kasan_atomics+0x1dc/0x310
[   28.963434]  ? __pfx_kasan_atomics+0x10/0x10
[   28.963459]  ? __pfx_read_tsc+0x10/0x10
[   28.963481]  ? ktime_get_ts64+0x86/0x230
[   28.963506]  kunit_try_run_case+0x1a5/0x480
[   28.963530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.963552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.963576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.963600]  ? __kthread_parkme+0x82/0x180
[   28.963624]  ? preempt_count_sub+0x50/0x80
[   28.963648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.963672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.963696]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.963719]  kthread+0x337/0x6f0
[   28.963739]  ? trace_preempt_on+0x20/0xc0
[   28.963763]  ? __pfx_kthread+0x10/0x10
[   28.963783]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.963805]  ? calculate_sigpending+0x7b/0xa0
[   28.963829]  ? __pfx_kthread+0x10/0x10
[   28.963851]  ret_from_fork+0x116/0x1d0
[   28.963870]  ? __pfx_kthread+0x10/0x10
[   28.963891]  ret_from_fork_asm+0x1a/0x30
[   28.963942]  </TASK>
[   28.963953] 
[   28.971654] Allocated by task 314:
[   28.971849]  kasan_save_stack+0x45/0x70
[   28.971992]  kasan_save_track+0x18/0x40
[   28.972132]  kasan_save_alloc_info+0x3b/0x50
[   28.972275]  __kasan_kmalloc+0xb7/0xc0
[   28.972487]  __kmalloc_cache_noprof+0x189/0x420
[   28.972702]  kasan_atomics+0x95/0x310
[   28.972879]  kunit_try_run_case+0x1a5/0x480
[   28.973088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.973355]  kthread+0x337/0x6f0
[   28.973518]  ret_from_fork+0x116/0x1d0
[   28.973684]  ret_from_fork_asm+0x1a/0x30
[   28.973830] 
[   28.973894] The buggy address belongs to the object at ffff88810458d180
[   28.973894]  which belongs to the cache kmalloc-64 of size 64
[   28.974352] The buggy address is located 0 bytes to the right of
[   28.974352]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.974924] 
[   28.975015] The buggy address belongs to the physical page:
[   28.975195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.975658] flags: 0x200000000000000(node=0|zone=2)
[   28.975829] page_type: f5(slab)
[   28.975942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.976179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.976464] page dumped because: kasan: bad access detected
[   28.976829] 
[   28.976939] Memory state around the buggy address:
[   28.977151]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.977362]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.977568] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.977955]                                      ^
[   28.978182]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.978484]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.978952] ==================================================================
[   29.123124] ==================================================================
[   29.123563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   29.123911] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.124252] 
[   29.124375] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.124424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.124437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.124459] Call Trace:
[   29.124471]  <TASK>
[   29.124486]  dump_stack_lvl+0x73/0xb0
[   29.124513]  print_report+0xd1/0x610
[   29.124535]  ? __virt_addr_valid+0x1db/0x2d0
[   29.124557]  ? kasan_atomics_helper+0x1c18/0x5450
[   29.124579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.124605]  ? kasan_atomics_helper+0x1c18/0x5450
[   29.124627]  kasan_report+0x141/0x180
[   29.124651]  ? kasan_atomics_helper+0x1c18/0x5450
[   29.124678]  kasan_check_range+0x10c/0x1c0
[   29.124702]  __kasan_check_write+0x18/0x20
[   29.124727]  kasan_atomics_helper+0x1c18/0x5450
[   29.124749]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.124772]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.124797]  ? kasan_atomics+0x152/0x310
[   29.124823]  kasan_atomics+0x1dc/0x310
[   29.124846]  ? __pfx_kasan_atomics+0x10/0x10
[   29.124869]  ? __pfx_read_tsc+0x10/0x10
[   29.124891]  ? ktime_get_ts64+0x86/0x230
[   29.124915]  kunit_try_run_case+0x1a5/0x480
[   29.124939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.124961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.124985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.125009]  ? __kthread_parkme+0x82/0x180
[   29.125033]  ? preempt_count_sub+0x50/0x80
[   29.125056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.125090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.125114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.125138]  kthread+0x337/0x6f0
[   29.125158]  ? trace_preempt_on+0x20/0xc0
[   29.125181]  ? __pfx_kthread+0x10/0x10
[   29.125202]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.125224]  ? calculate_sigpending+0x7b/0xa0
[   29.125247]  ? __pfx_kthread+0x10/0x10
[   29.125288]  ret_from_fork+0x116/0x1d0
[   29.125308]  ? __pfx_kthread+0x10/0x10
[   29.125330]  ret_from_fork_asm+0x1a/0x30
[   29.125362]  </TASK>
[   29.125372] 
[   29.134641] Allocated by task 314:
[   29.134816]  kasan_save_stack+0x45/0x70
[   29.134966]  kasan_save_track+0x18/0x40
[   29.135110]  kasan_save_alloc_info+0x3b/0x50
[   29.135253]  __kasan_kmalloc+0xb7/0xc0
[   29.136000]  __kmalloc_cache_noprof+0x189/0x420
[   29.136430]  kasan_atomics+0x95/0x310
[   29.136617]  kunit_try_run_case+0x1a5/0x480
[   29.136808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.137037]  kthread+0x337/0x6f0
[   29.137203]  ret_from_fork+0x116/0x1d0
[   29.137370]  ret_from_fork_asm+0x1a/0x30
[   29.137839] 
[   29.137926] The buggy address belongs to the object at ffff88810458d180
[   29.137926]  which belongs to the cache kmalloc-64 of size 64
[   29.138404] The buggy address is located 0 bytes to the right of
[   29.138404]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.139023] 
[   29.139103] The buggy address belongs to the physical page:
[   29.139272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.140141] flags: 0x200000000000000(node=0|zone=2)
[   29.140703] page_type: f5(slab)
[   29.141052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.141783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.142087] page dumped because: kasan: bad access detected
[   29.142254] 
[   29.142330] Memory state around the buggy address:
[   29.142481]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.142690]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.142898] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.143121]                                      ^
[   29.143346]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.143606]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.143820] ==================================================================
[   28.903419] ==================================================================
[   28.903697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   28.903940] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.904929] 
[   28.905049] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.905880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.905899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.905929] Call Trace:
[   28.905943]  <TASK>
[   28.905959]  dump_stack_lvl+0x73/0xb0
[   28.905990]  print_report+0xd1/0x610
[   28.906012]  ? __virt_addr_valid+0x1db/0x2d0
[   28.906035]  ? kasan_atomics_helper+0x151d/0x5450
[   28.906057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.907115]  ? kasan_atomics_helper+0x151d/0x5450
[   28.907151]  kasan_report+0x141/0x180
[   28.907177]  ? kasan_atomics_helper+0x151d/0x5450
[   28.907206]  kasan_check_range+0x10c/0x1c0
[   28.907231]  __kasan_check_write+0x18/0x20
[   28.907255]  kasan_atomics_helper+0x151d/0x5450
[   28.907278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.907300]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.907326]  ? kasan_atomics+0x152/0x310
[   28.907354]  kasan_atomics+0x1dc/0x310
[   28.907377]  ? __pfx_kasan_atomics+0x10/0x10
[   28.907402]  ? __pfx_read_tsc+0x10/0x10
[   28.907424]  ? ktime_get_ts64+0x86/0x230
[   28.907448]  kunit_try_run_case+0x1a5/0x480
[   28.907472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.907494]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.907517]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.907541]  ? __kthread_parkme+0x82/0x180
[   28.907565]  ? preempt_count_sub+0x50/0x80
[   28.907589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.907614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.907636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.907660]  kthread+0x337/0x6f0
[   28.907679]  ? trace_preempt_on+0x20/0xc0
[   28.907702]  ? __pfx_kthread+0x10/0x10
[   28.907723]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.907745]  ? calculate_sigpending+0x7b/0xa0
[   28.907786]  ? __pfx_kthread+0x10/0x10
[   28.907808]  ret_from_fork+0x116/0x1d0
[   28.907829]  ? __pfx_kthread+0x10/0x10
[   28.907851]  ret_from_fork_asm+0x1a/0x30
[   28.907883]  </TASK>
[   28.907895] 
[   28.917615] Allocated by task 314:
[   28.917766]  kasan_save_stack+0x45/0x70
[   28.917945]  kasan_save_track+0x18/0x40
[   28.918122]  kasan_save_alloc_info+0x3b/0x50
[   28.918675]  __kasan_kmalloc+0xb7/0xc0
[   28.918875]  __kmalloc_cache_noprof+0x189/0x420
[   28.919251]  kasan_atomics+0x95/0x310
[   28.919596]  kunit_try_run_case+0x1a5/0x480
[   28.919791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.920014]  kthread+0x337/0x6f0
[   28.920189]  ret_from_fork+0x116/0x1d0
[   28.920754]  ret_from_fork_asm+0x1a/0x30
[   28.921032] 
[   28.921299] The buggy address belongs to the object at ffff88810458d180
[   28.921299]  which belongs to the cache kmalloc-64 of size 64
[   28.921952] The buggy address is located 0 bytes to the right of
[   28.921952]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.922485] 
[   28.922554] The buggy address belongs to the physical page:
[   28.922926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.923223] flags: 0x200000000000000(node=0|zone=2)
[   28.923667] page_type: f5(slab)
[   28.923840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.924128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.924468] page dumped because: kasan: bad access detected
[   28.924687] 
[   28.924783] Memory state around the buggy address:
[   28.925049]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.925367]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.925679] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.925986]                                      ^
[   28.926148]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.926434]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.926776] ==================================================================
[   29.364046] ==================================================================
[   29.364555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   29.364850] Read of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.365155] 
[   29.365248] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.365294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.365307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.365328] Call Trace:
[   29.365344]  <TASK>
[   29.365359]  dump_stack_lvl+0x73/0xb0
[   29.365388]  print_report+0xd1/0x610
[   29.365410]  ? __virt_addr_valid+0x1db/0x2d0
[   29.365433]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.365454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.365480]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.365502]  kasan_report+0x141/0x180
[   29.365525]  ? kasan_atomics_helper+0x4fb2/0x5450
[   29.365551]  __asan_report_load8_noabort+0x18/0x20
[   29.365575]  kasan_atomics_helper+0x4fb2/0x5450
[   29.365599]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.365621]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.365646]  ? kasan_atomics+0x152/0x310
[   29.365672]  kasan_atomics+0x1dc/0x310
[   29.365695]  ? __pfx_kasan_atomics+0x10/0x10
[   29.365719]  ? __pfx_read_tsc+0x10/0x10
[   29.365740]  ? ktime_get_ts64+0x86/0x230
[   29.365764]  kunit_try_run_case+0x1a5/0x480
[   29.365788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.365810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.365834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.365859]  ? __kthread_parkme+0x82/0x180
[   29.365883]  ? preempt_count_sub+0x50/0x80
[   29.365906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.365936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.365960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.365983]  kthread+0x337/0x6f0
[   29.366003]  ? trace_preempt_on+0x20/0xc0
[   29.366026]  ? __pfx_kthread+0x10/0x10
[   29.366046]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.366068]  ? calculate_sigpending+0x7b/0xa0
[   29.366322]  ? __pfx_kthread+0x10/0x10
[   29.366348]  ret_from_fork+0x116/0x1d0
[   29.366368]  ? __pfx_kthread+0x10/0x10
[   29.366389]  ret_from_fork_asm+0x1a/0x30
[   29.366615]  </TASK>
[   29.366634] 
[   29.380071] Allocated by task 314:
[   29.380243]  kasan_save_stack+0x45/0x70
[   29.380424]  kasan_save_track+0x18/0x40
[   29.380590]  kasan_save_alloc_info+0x3b/0x50
[   29.380770]  __kasan_kmalloc+0xb7/0xc0
[   29.380936]  __kmalloc_cache_noprof+0x189/0x420
[   29.381633]  kasan_atomics+0x95/0x310
[   29.381926]  kunit_try_run_case+0x1a5/0x480
[   29.382303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.382625]  kthread+0x337/0x6f0
[   29.382937]  ret_from_fork+0x116/0x1d0
[   29.383122]  ret_from_fork_asm+0x1a/0x30
[   29.383577] 
[   29.383666] The buggy address belongs to the object at ffff88810458d180
[   29.383666]  which belongs to the cache kmalloc-64 of size 64
[   29.384416] The buggy address is located 0 bytes to the right of
[   29.384416]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.384914] 
[   29.384995] The buggy address belongs to the physical page:
[   29.385218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.385778] flags: 0x200000000000000(node=0|zone=2)
[   29.385985] page_type: f5(slab)
[   29.386144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.386956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.387409] page dumped because: kasan: bad access detected
[   29.387650] 
[   29.387731] Memory state around the buggy address:
[   29.387928]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.388217]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.388757] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.389034]                                      ^
[   29.389673]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.390027]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.390546] ==================================================================
[   29.248270] ==================================================================
[   29.248754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   29.249386] Write of size 8 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   29.249799] 
[   29.250148] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   29.250203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.250217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.250240] Call Trace:
[   29.250256]  <TASK>
[   29.250273]  dump_stack_lvl+0x73/0xb0
[   29.250304]  print_report+0xd1/0x610
[   29.250327]  ? __virt_addr_valid+0x1db/0x2d0
[   29.250350]  ? kasan_atomics_helper+0x1eaa/0x5450
[   29.250372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.250399]  ? kasan_atomics_helper+0x1eaa/0x5450
[   29.250421]  kasan_report+0x141/0x180
[   29.250445]  ? kasan_atomics_helper+0x1eaa/0x5450
[   29.250472]  kasan_check_range+0x10c/0x1c0
[   29.250496]  __kasan_check_write+0x18/0x20
[   29.250520]  kasan_atomics_helper+0x1eaa/0x5450
[   29.250543]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.250565]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.250590]  ? kasan_atomics+0x152/0x310
[   29.250616]  kasan_atomics+0x1dc/0x310
[   29.250639]  ? __pfx_kasan_atomics+0x10/0x10
[   29.250664]  ? __pfx_read_tsc+0x10/0x10
[   29.250685]  ? ktime_get_ts64+0x86/0x230
[   29.250709]  kunit_try_run_case+0x1a5/0x480
[   29.250733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.250755]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.250779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.250803]  ? __kthread_parkme+0x82/0x180
[   29.250827]  ? preempt_count_sub+0x50/0x80
[   29.250851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.250875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.250899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.250922]  kthread+0x337/0x6f0
[   29.250941]  ? trace_preempt_on+0x20/0xc0
[   29.250965]  ? __pfx_kthread+0x10/0x10
[   29.250985]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.251007]  ? calculate_sigpending+0x7b/0xa0
[   29.251031]  ? __pfx_kthread+0x10/0x10
[   29.251053]  ret_from_fork+0x116/0x1d0
[   29.251072]  ? __pfx_kthread+0x10/0x10
[   29.251103]  ret_from_fork_asm+0x1a/0x30
[   29.251134]  </TASK>
[   29.251145] 
[   29.261511] Allocated by task 314:
[   29.261714]  kasan_save_stack+0x45/0x70
[   29.262068]  kasan_save_track+0x18/0x40
[   29.262287]  kasan_save_alloc_info+0x3b/0x50
[   29.262611]  __kasan_kmalloc+0xb7/0xc0
[   29.262799]  __kmalloc_cache_noprof+0x189/0x420
[   29.263008]  kasan_atomics+0x95/0x310
[   29.263195]  kunit_try_run_case+0x1a5/0x480
[   29.263674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.263967]  kthread+0x337/0x6f0
[   29.264171]  ret_from_fork+0x116/0x1d0
[   29.264518]  ret_from_fork_asm+0x1a/0x30
[   29.264739] 
[   29.264990] The buggy address belongs to the object at ffff88810458d180
[   29.264990]  which belongs to the cache kmalloc-64 of size 64
[   29.265588] The buggy address is located 0 bytes to the right of
[   29.265588]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   29.266269] 
[   29.266519] The buggy address belongs to the physical page:
[   29.266768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   29.267146] flags: 0x200000000000000(node=0|zone=2)
[   29.267590] page_type: f5(slab)
[   29.267888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.268380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.268708] page dumped because: kasan: bad access detected
[   29.269062] 
[   29.269169] Memory state around the buggy address:
[   29.269564]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.269894]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.270408] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.270784]                                      ^
[   29.271105]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.271535]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.271906] ==================================================================
[   28.664619] ==================================================================
[   28.664946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   28.665593] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.665902] 
[   28.666011] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.666342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.666358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.666380] Call Trace:
[   28.666394]  <TASK>
[   28.666410]  dump_stack_lvl+0x73/0xb0
[   28.666440]  print_report+0xd1/0x610
[   28.666462]  ? __virt_addr_valid+0x1db/0x2d0
[   28.666485]  ? kasan_atomics_helper+0x4a1c/0x5450
[   28.666506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.666533]  ? kasan_atomics_helper+0x4a1c/0x5450
[   28.666555]  kasan_report+0x141/0x180
[   28.666578]  ? kasan_atomics_helper+0x4a1c/0x5450
[   28.666605]  __asan_report_load4_noabort+0x18/0x20
[   28.666629]  kasan_atomics_helper+0x4a1c/0x5450
[   28.666652]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.666674]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.666699]  ? kasan_atomics+0x152/0x310
[   28.666726]  kasan_atomics+0x1dc/0x310
[   28.666748]  ? __pfx_kasan_atomics+0x10/0x10
[   28.666772]  ? __pfx_read_tsc+0x10/0x10
[   28.666793]  ? ktime_get_ts64+0x86/0x230
[   28.666817]  kunit_try_run_case+0x1a5/0x480
[   28.666841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.666863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.666887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.666911]  ? __kthread_parkme+0x82/0x180
[   28.666935]  ? preempt_count_sub+0x50/0x80
[   28.666959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.666983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.667006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.667030]  kthread+0x337/0x6f0
[   28.667049]  ? trace_preempt_on+0x20/0xc0
[   28.667072]  ? __pfx_kthread+0x10/0x10
[   28.667104]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.667126]  ? calculate_sigpending+0x7b/0xa0
[   28.667150]  ? __pfx_kthread+0x10/0x10
[   28.667171]  ret_from_fork+0x116/0x1d0
[   28.667191]  ? __pfx_kthread+0x10/0x10
[   28.667211]  ret_from_fork_asm+0x1a/0x30
[   28.667243]  </TASK>
[   28.667254] 
[   28.676573] Allocated by task 314:
[   28.676994]  kasan_save_stack+0x45/0x70
[   28.677202]  kasan_save_track+0x18/0x40
[   28.677414]  kasan_save_alloc_info+0x3b/0x50
[   28.677671]  __kasan_kmalloc+0xb7/0xc0
[   28.677984]  __kmalloc_cache_noprof+0x189/0x420
[   28.678339]  kasan_atomics+0x95/0x310
[   28.678548]  kunit_try_run_case+0x1a5/0x480
[   28.678853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.679192]  kthread+0x337/0x6f0
[   28.679436]  ret_from_fork+0x116/0x1d0
[   28.679734]  ret_from_fork_asm+0x1a/0x30
[   28.679948] 
[   28.680041] The buggy address belongs to the object at ffff88810458d180
[   28.680041]  which belongs to the cache kmalloc-64 of size 64
[   28.680748] The buggy address is located 0 bytes to the right of
[   28.680748]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.681624] 
[   28.681786] The buggy address belongs to the physical page:
[   28.682456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.683139] flags: 0x200000000000000(node=0|zone=2)
[   28.683583] page_type: f5(slab)
[   28.683886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.684338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.684639] page dumped because: kasan: bad access detected
[   28.684809] 
[   28.684878] Memory state around the buggy address:
[   28.685031]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.685401]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.685679] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.685989]                                      ^
[   28.686228]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.686520]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.686782] ==================================================================
[   28.730878] ==================================================================
[   28.731179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   28.731637] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.731868] 
[   28.731944] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.731989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.732002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.732023] Call Trace:
[   28.732037]  <TASK>
[   28.732052]  dump_stack_lvl+0x73/0xb0
[   28.732092]  print_report+0xd1/0x610
[   28.732116]  ? __virt_addr_valid+0x1db/0x2d0
[   28.732139]  ? kasan_atomics_helper+0x1217/0x5450
[   28.732160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.732187]  ? kasan_atomics_helper+0x1217/0x5450
[   28.732209]  kasan_report+0x141/0x180
[   28.732231]  ? kasan_atomics_helper+0x1217/0x5450
[   28.732258]  kasan_check_range+0x10c/0x1c0
[   28.732518]  __kasan_check_write+0x18/0x20
[   28.732546]  kasan_atomics_helper+0x1217/0x5450
[   28.732569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.732591]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.732616]  ? kasan_atomics+0x152/0x310
[   28.732642]  kasan_atomics+0x1dc/0x310
[   28.732665]  ? __pfx_kasan_atomics+0x10/0x10
[   28.732689]  ? __pfx_read_tsc+0x10/0x10
[   28.732711]  ? ktime_get_ts64+0x86/0x230
[   28.732735]  kunit_try_run_case+0x1a5/0x480
[   28.732758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.732781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.732804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.732827]  ? __kthread_parkme+0x82/0x180
[   28.732852]  ? preempt_count_sub+0x50/0x80
[   28.732874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.732898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.732921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.732945]  kthread+0x337/0x6f0
[   28.732964]  ? trace_preempt_on+0x20/0xc0
[   28.732990]  ? __pfx_kthread+0x10/0x10
[   28.733014]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.733037]  ? calculate_sigpending+0x7b/0xa0
[   28.733060]  ? __pfx_kthread+0x10/0x10
[   28.733093]  ret_from_fork+0x116/0x1d0
[   28.733114]  ? __pfx_kthread+0x10/0x10
[   28.733135]  ret_from_fork_asm+0x1a/0x30
[   28.733169]  </TASK>
[   28.733180] 
[   28.742728] Allocated by task 314:
[   28.742909]  kasan_save_stack+0x45/0x70
[   28.743115]  kasan_save_track+0x18/0x40
[   28.743269]  kasan_save_alloc_info+0x3b/0x50
[   28.743745]  __kasan_kmalloc+0xb7/0xc0
[   28.743988]  __kmalloc_cache_noprof+0x189/0x420
[   28.744169]  kasan_atomics+0x95/0x310
[   28.744408]  kunit_try_run_case+0x1a5/0x480
[   28.744791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.745011]  kthread+0x337/0x6f0
[   28.745288]  ret_from_fork+0x116/0x1d0
[   28.745447]  ret_from_fork_asm+0x1a/0x30
[   28.745693] 
[   28.745765] The buggy address belongs to the object at ffff88810458d180
[   28.745765]  which belongs to the cache kmalloc-64 of size 64
[   28.746259] The buggy address is located 0 bytes to the right of
[   28.746259]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.747045] 
[   28.747142] The buggy address belongs to the physical page:
[   28.747312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.747783] flags: 0x200000000000000(node=0|zone=2)
[   28.748061] page_type: f5(slab)
[   28.748206] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.748579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.749035] page dumped because: kasan: bad access detected
[   28.749276] 
[   28.749418] Memory state around the buggy address:
[   28.749687]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.749976]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.750273] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.750554]                                      ^
[   28.750746]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.751033]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.751701] ==================================================================
[   28.142993] ==================================================================
[   28.143632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   28.144663] Read of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.145232] 
[   28.145580] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.145635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.145649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.145670] Call Trace:
[   28.145686]  <TASK>
[   28.145703]  dump_stack_lvl+0x73/0xb0
[   28.145735]  print_report+0xd1/0x610
[   28.145759]  ? __virt_addr_valid+0x1db/0x2d0
[   28.145785]  ? kasan_atomics_helper+0x3df/0x5450
[   28.145809]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.145836]  ? kasan_atomics_helper+0x3df/0x5450
[   28.145858]  kasan_report+0x141/0x180
[   28.145881]  ? kasan_atomics_helper+0x3df/0x5450
[   28.145907]  kasan_check_range+0x10c/0x1c0
[   28.145936]  __kasan_check_read+0x15/0x20
[   28.145959]  kasan_atomics_helper+0x3df/0x5450
[   28.145982]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.146004]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.146029]  ? kasan_atomics+0x152/0x310
[   28.146057]  kasan_atomics+0x1dc/0x310
[   28.146092]  ? __pfx_kasan_atomics+0x10/0x10
[   28.146116]  ? __pfx_read_tsc+0x10/0x10
[   28.146137]  ? ktime_get_ts64+0x86/0x230
[   28.146162]  kunit_try_run_case+0x1a5/0x480
[   28.146186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.146209]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.146236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.146261]  ? __kthread_parkme+0x82/0x180
[   28.146286]  ? preempt_count_sub+0x50/0x80
[   28.146310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.146334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.146371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.146394]  kthread+0x337/0x6f0
[   28.146413]  ? trace_preempt_on+0x20/0xc0
[   28.146436]  ? __pfx_kthread+0x10/0x10
[   28.146458]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.146479]  ? calculate_sigpending+0x7b/0xa0
[   28.146503]  ? __pfx_kthread+0x10/0x10
[   28.146683]  ret_from_fork+0x116/0x1d0
[   28.146714]  ? __pfx_kthread+0x10/0x10
[   28.146738]  ret_from_fork_asm+0x1a/0x30
[   28.146770]  </TASK>
[   28.146781] 
[   28.156452] Allocated by task 314:
[   28.156628]  kasan_save_stack+0x45/0x70
[   28.156823]  kasan_save_track+0x18/0x40
[   28.157024]  kasan_save_alloc_info+0x3b/0x50
[   28.157343]  __kasan_kmalloc+0xb7/0xc0
[   28.157514]  __kmalloc_cache_noprof+0x189/0x420
[   28.157665]  kasan_atomics+0x95/0x310
[   28.157854]  kunit_try_run_case+0x1a5/0x480
[   28.158100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.158561]  kthread+0x337/0x6f0
[   28.158746]  ret_from_fork+0x116/0x1d0
[   28.158919]  ret_from_fork_asm+0x1a/0x30
[   28.159118] 
[   28.159207] The buggy address belongs to the object at ffff88810458d180
[   28.159207]  which belongs to the cache kmalloc-64 of size 64
[   28.159661] The buggy address is located 0 bytes to the right of
[   28.159661]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.160093] 
[   28.160171] The buggy address belongs to the physical page:
[   28.160343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.160578] flags: 0x200000000000000(node=0|zone=2)
[   28.160761] page_type: f5(slab)
[   28.160922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.161406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.161749] page dumped because: kasan: bad access detected
[   28.162004] 
[   28.162096] Memory state around the buggy address:
[   28.162452]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.162738]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.163024] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.163345]                                      ^
[   28.163503]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.163768]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.164095] ==================================================================
[   28.074536] ==================================================================
[   28.074951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   28.075226] Write of size 4 at addr ffff88810458d1b0 by task kunit_try_catch/314
[   28.075821] 
[   28.075923] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) 
[   28.075987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.075998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.076030] Call Trace:
[   28.076042]  <TASK>
[   28.076056]  dump_stack_lvl+0x73/0xb0
[   28.076093]  print_report+0xd1/0x610
[   28.076114]  ? __virt_addr_valid+0x1db/0x2d0
[   28.076136]  ? kasan_atomics_helper+0x4ba2/0x5450
[   28.076157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.076182]  ? kasan_atomics_helper+0x4ba2/0x5450
[   28.076203]  kasan_report+0x141/0x180
[   28.076226]  ? kasan_atomics_helper+0x4ba2/0x5450
[   28.076325]  __asan_report_store4_noabort+0x1b/0x30
[   28.076353]  kasan_atomics_helper+0x4ba2/0x5450
[   28.076375]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.076407]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.076431]  ? kasan_atomics+0x152/0x310
[   28.076457]  kasan_atomics+0x1dc/0x310
[   28.076479]  ? __pfx_kasan_atomics+0x10/0x10
[   28.076502]  ? __pfx_read_tsc+0x10/0x10
[   28.076522]  ? ktime_get_ts64+0x86/0x230
[   28.076545]  kunit_try_run_case+0x1a5/0x480
[   28.076568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.076590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.076613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.076635]  ? __kthread_parkme+0x82/0x180
[   28.076658]  ? preempt_count_sub+0x50/0x80
[   28.076680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.076703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.076735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.076758]  kthread+0x337/0x6f0
[   28.076776]  ? trace_preempt_on+0x20/0xc0
[   28.076808]  ? __pfx_kthread+0x10/0x10
[   28.076828]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.076849]  ? calculate_sigpending+0x7b/0xa0
[   28.076872]  ? __pfx_kthread+0x10/0x10
[   28.076892]  ret_from_fork+0x116/0x1d0
[   28.076910]  ? __pfx_kthread+0x10/0x10
[   28.076930]  ret_from_fork_asm+0x1a/0x30
[   28.076960]  </TASK>
[   28.076970] 
[   28.085186] Allocated by task 314:
[   28.085311]  kasan_save_stack+0x45/0x70
[   28.085446]  kasan_save_track+0x18/0x40
[   28.085578]  kasan_save_alloc_info+0x3b/0x50
[   28.085797]  __kasan_kmalloc+0xb7/0xc0
[   28.085982]  __kmalloc_cache_noprof+0x189/0x420
[   28.086202]  kasan_atomics+0x95/0x310
[   28.086506]  kunit_try_run_case+0x1a5/0x480
[   28.086911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.087106]  kthread+0x337/0x6f0
[   28.087353]  ret_from_fork+0x116/0x1d0
[   28.087564]  ret_from_fork_asm+0x1a/0x30
[   28.087772] 
[   28.087859] The buggy address belongs to the object at ffff88810458d180
[   28.087859]  which belongs to the cache kmalloc-64 of size 64
[   28.088477] The buggy address is located 0 bytes to the right of
[   28.088477]  allocated 48-byte region [ffff88810458d180, ffff88810458d1b0)
[   28.088994] 
[   28.089110] The buggy address belongs to the physical page:
[   28.089396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10458d
[   28.089746] flags: 0x200000000000000(node=0|zone=2)
[   28.089951] page_type: f5(slab)
[   28.090128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.090649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.090971] page dumped because: kasan: bad access detected
[   28.091219] 
[   28.091373] Memory state around the buggy address:
[   28.091570]  ffff88810458d080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.091782]  ffff88810458d100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.091991] >ffff88810458d180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.092270]                                      ^
[   28.092502]  ffff88810458d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.092862]  ffff88810458d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.093218] ==================================================================