Hay
Date
June 19, 2025, 12:07 p.m.

Environment
qemu-arm64

[   33.865115] ==================================================================
[   33.865362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.866005] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.866141] 
[   33.866233] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.866464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.866881] Hardware name: linux,dummy-virt (DT)
[   33.867114] Call trace:
[   33.867217]  show_stack+0x20/0x38 (C)
[   33.867433]  dump_stack_lvl+0x8c/0xd0
[   33.867910]  print_report+0x118/0x608
[   33.868346]  kasan_report+0xdc/0x128
[   33.868614]  __asan_report_load4_noabort+0x20/0x30
[   33.869216]  kasan_atomics_helper+0x42d8/0x4858
[   33.869454]  kasan_atomics+0x198/0x2e0
[   33.869587]  kunit_try_run_case+0x170/0x3f0
[   33.869712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.869854]  kthread+0x328/0x630
[   33.869977]  ret_from_fork+0x10/0x20
[   33.870092] 
[   33.870143] Allocated by task 276:
[   33.870223]  kasan_save_stack+0x3c/0x68
[   33.870330]  kasan_save_track+0x20/0x40
[   33.870429]  kasan_save_alloc_info+0x40/0x58
[   33.870529]  __kasan_kmalloc+0xd4/0xd8
[   33.870625]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.870724]  kasan_atomics+0xb8/0x2e0
[   33.870841]  kunit_try_run_case+0x170/0x3f0
[   33.870934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.871049]  kthread+0x328/0x630
[   33.871118]  ret_from_fork+0x10/0x20
[   33.871205] 
[   33.871259] The buggy address belongs to the object at fff00000c76a3180
[   33.871259]  which belongs to the cache kmalloc-64 of size 64
[   33.871390] The buggy address is located 0 bytes to the right of
[   33.871390]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.871563] 
[   33.871637] The buggy address belongs to the physical page:
[   33.871715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.871867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.871999] page_type: f5(slab)
[   33.872136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.872312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.872468] page dumped because: kasan: bad access detected
[   33.872565] 
[   33.872612] Memory state around the buggy address:
[   33.872698]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.872861]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.873029] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.873164]                                      ^
[   33.873257]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.873368]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.873494] ==================================================================
[   33.880405] ==================================================================
[   33.880520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.880647] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.880790] 
[   33.880893] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.881154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.881334] Hardware name: linux,dummy-virt (DT)
[   33.881437] Call trace:
[   33.881518]  show_stack+0x20/0x38 (C)
[   33.881698]  dump_stack_lvl+0x8c/0xd0
[   33.881812]  print_report+0x118/0x608
[   33.881942]  kasan_report+0xdc/0x128
[   33.882061]  kasan_check_range+0x100/0x1a8
[   33.882187]  __kasan_check_write+0x20/0x30
[   33.882289]  kasan_atomics_helper+0x99c/0x4858
[   33.882403]  kasan_atomics+0x198/0x2e0
[   33.882516]  kunit_try_run_case+0x170/0x3f0
[   33.882653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.882806]  kthread+0x328/0x630
[   33.882918]  ret_from_fork+0x10/0x20
[   33.883098] 
[   33.883153] Allocated by task 276:
[   33.883232]  kasan_save_stack+0x3c/0x68
[   33.883342]  kasan_save_track+0x20/0x40
[   33.883443]  kasan_save_alloc_info+0x40/0x58
[   33.883548]  __kasan_kmalloc+0xd4/0xd8
[   33.883646]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.883755]  kasan_atomics+0xb8/0x2e0
[   33.883854]  kunit_try_run_case+0x170/0x3f0
[   33.884023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.884136]  kthread+0x328/0x630
[   33.884234]  ret_from_fork+0x10/0x20
[   33.884325] 
[   33.884371] The buggy address belongs to the object at fff00000c76a3180
[   33.884371]  which belongs to the cache kmalloc-64 of size 64
[   33.884526] The buggy address is located 0 bytes to the right of
[   33.884526]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.884799] 
[   33.884860] The buggy address belongs to the physical page:
[   33.884949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.885087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.885225] page_type: f5(slab)
[   33.885351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.885532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.885746] page dumped because: kasan: bad access detected
[   33.885849] 
[   33.885903] Memory state around the buggy address:
[   33.885981]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.886098]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.886218] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.886317]                                      ^
[   33.886392]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.886483]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.886566] ==================================================================
[   34.090155] ==================================================================
[   34.090547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   34.090866] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.091072] 
[   34.091201] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.091387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.091453] Hardware name: linux,dummy-virt (DT)
[   34.091531] Call trace:
[   34.091589]  show_stack+0x20/0x38 (C)
[   34.091763]  dump_stack_lvl+0x8c/0xd0
[   34.091983]  print_report+0x118/0x608
[   34.092097]  kasan_report+0xdc/0x128
[   34.092445]  kasan_check_range+0x100/0x1a8
[   34.092571]  __kasan_check_write+0x20/0x30
[   34.093027]  kasan_atomics_helper+0xf88/0x4858
[   34.093259]  kasan_atomics+0x198/0x2e0
[   34.093403]  kunit_try_run_case+0x170/0x3f0
[   34.093522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.093759]  kthread+0x328/0x630
[   34.093856]  ret_from_fork+0x10/0x20
[   34.093977] 
[   34.094017] Allocated by task 276:
[   34.094074]  kasan_save_stack+0x3c/0x68
[   34.094161]  kasan_save_track+0x20/0x40
[   34.094259]  kasan_save_alloc_info+0x40/0x58
[   34.094523]  __kasan_kmalloc+0xd4/0xd8
[   34.094643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.094773]  kasan_atomics+0xb8/0x2e0
[   34.094914]  kunit_try_run_case+0x170/0x3f0
[   34.095025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.095131]  kthread+0x328/0x630
[   34.095502]  ret_from_fork+0x10/0x20
[   34.095616] 
[   34.095672] The buggy address belongs to the object at fff00000c76a3180
[   34.095672]  which belongs to the cache kmalloc-64 of size 64
[   34.095839] The buggy address is located 0 bytes to the right of
[   34.095839]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.096022] 
[   34.096083] The buggy address belongs to the physical page:
[   34.096165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.096318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.096504] page_type: f5(slab)
[   34.096603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.096735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.096847] page dumped because: kasan: bad access detected
[   34.097319] 
[   34.097514] Memory state around the buggy address:
[   34.097666]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.097882]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.098267] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.098388]                                      ^
[   34.098529]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.098644]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.098730] ==================================================================
[   34.124567] ==================================================================
[   34.124696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   34.125252] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.125423] 
[   34.125515] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.125744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.125807] Hardware name: linux,dummy-virt (DT)
[   34.125898] Call trace:
[   34.125957]  show_stack+0x20/0x38 (C)
[   34.126085]  dump_stack_lvl+0x8c/0xd0
[   34.126213]  print_report+0x118/0x608
[   34.126331]  kasan_report+0xdc/0x128
[   34.126446]  kasan_check_range+0x100/0x1a8
[   34.126570]  __kasan_check_write+0x20/0x30
[   34.126694]  kasan_atomics_helper+0x10c0/0x4858
[   34.126823]  kasan_atomics+0x198/0x2e0
[   34.128949]  kunit_try_run_case+0x170/0x3f0
[   34.129528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.129710]  kthread+0x328/0x630
[   34.129816]  ret_from_fork+0x10/0x20
[   34.129941] 
[   34.130047] Allocated by task 276:
[   34.130146]  kasan_save_stack+0x3c/0x68
[   34.130275]  kasan_save_track+0x20/0x40
[   34.130381]  kasan_save_alloc_info+0x40/0x58
[   34.130491]  __kasan_kmalloc+0xd4/0xd8
[   34.131575]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.131776]  kasan_atomics+0xb8/0x2e0
[   34.131931]  kunit_try_run_case+0x170/0x3f0
[   34.132204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.132416]  kthread+0x328/0x630
[   34.132503]  ret_from_fork+0x10/0x20
[   34.133496] 
[   34.133692] The buggy address belongs to the object at fff00000c76a3180
[   34.133692]  which belongs to the cache kmalloc-64 of size 64
[   34.134326] The buggy address is located 0 bytes to the right of
[   34.134326]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.135354] 
[   34.135578] The buggy address belongs to the physical page:
[   34.136268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.136922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.137620] page_type: f5(slab)
[   34.138208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.138752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.139017] page dumped because: kasan: bad access detected
[   34.139589] 
[   34.139658] Memory state around the buggy address:
[   34.139888]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.140181]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.140429] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.140533]                                      ^
[   34.140624]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.140736]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.140840] ==================================================================
[   34.099467] ==================================================================
[   34.099665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   34.099788] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.099924] 
[   34.100012] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.100230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.100303] Hardware name: linux,dummy-virt (DT)
[   34.100385] Call trace:
[   34.100439]  show_stack+0x20/0x38 (C)
[   34.100556]  dump_stack_lvl+0x8c/0xd0
[   34.100683]  print_report+0x118/0x608
[   34.101335]  kasan_report+0xdc/0x128
[   34.101582]  kasan_check_range+0x100/0x1a8
[   34.102026]  __kasan_check_write+0x20/0x30
[   34.102373]  kasan_atomics_helper+0xff0/0x4858
[   34.102584]  kasan_atomics+0x198/0x2e0
[   34.102844]  kunit_try_run_case+0x170/0x3f0
[   34.103168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.103592]  kthread+0x328/0x630
[   34.103827]  ret_from_fork+0x10/0x20
[   34.104334] 
[   34.104397] Allocated by task 276:
[   34.104483]  kasan_save_stack+0x3c/0x68
[   34.104599]  kasan_save_track+0x20/0x40
[   34.104760]  kasan_save_alloc_info+0x40/0x58
[   34.104870]  __kasan_kmalloc+0xd4/0xd8
[   34.104982]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.105084]  kasan_atomics+0xb8/0x2e0
[   34.105179]  kunit_try_run_case+0x170/0x3f0
[   34.105291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.105421]  kthread+0x328/0x630
[   34.105724]  ret_from_fork+0x10/0x20
[   34.106024] 
[   34.106074] The buggy address belongs to the object at fff00000c76a3180
[   34.106074]  which belongs to the cache kmalloc-64 of size 64
[   34.106194] The buggy address is located 0 bytes to the right of
[   34.106194]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.106349] 
[   34.106401] The buggy address belongs to the physical page:
[   34.106479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.106612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.106742] page_type: f5(slab)
[   34.106838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.107000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.107112] page dumped because: kasan: bad access detected
[   34.107200] 
[   34.107916] Memory state around the buggy address:
[   34.108361]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.108762]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.109162] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.109475]                                      ^
[   34.109726]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.110059]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.110486] ==================================================================
[   33.917169] ==================================================================
[   33.917329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   33.918017] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.918397] 
[   33.918654] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.918884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.919709] Hardware name: linux,dummy-virt (DT)
[   33.919829] Call trace:
[   33.919903]  show_stack+0x20/0x38 (C)
[   33.920038]  dump_stack_lvl+0x8c/0xd0
[   33.920678]  print_report+0x118/0x608
[   33.921113]  kasan_report+0xdc/0x128
[   33.921527]  kasan_check_range+0x100/0x1a8
[   33.921908]  __kasan_check_write+0x20/0x30
[   33.922117]  kasan_atomics_helper+0xad4/0x4858
[   33.922253]  kasan_atomics+0x198/0x2e0
[   33.922355]  kunit_try_run_case+0x170/0x3f0
[   33.923036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.923563]  kthread+0x328/0x630
[   33.924023]  ret_from_fork+0x10/0x20
[   33.924231] 
[   33.924297] Allocated by task 276:
[   33.924450]  kasan_save_stack+0x3c/0x68
[   33.924586]  kasan_save_track+0x20/0x40
[   33.924697]  kasan_save_alloc_info+0x40/0x58
[   33.924795]  __kasan_kmalloc+0xd4/0xd8
[   33.925490]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.925628]  kasan_atomics+0xb8/0x2e0
[   33.925708]  kunit_try_run_case+0x170/0x3f0
[   33.925802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.925920]  kthread+0x328/0x630
[   33.926900]  ret_from_fork+0x10/0x20
[   33.927054] 
[   33.927117] The buggy address belongs to the object at fff00000c76a3180
[   33.927117]  which belongs to the cache kmalloc-64 of size 64
[   33.927357] The buggy address is located 0 bytes to the right of
[   33.927357]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.928005] 
[   33.928076] The buggy address belongs to the physical page:
[   33.928236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.928381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.928510] page_type: f5(slab)
[   33.928621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.928758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.928895] page dumped because: kasan: bad access detected
[   33.929300] 
[   33.929360] Memory state around the buggy address:
[   33.929513]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.930266]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.930409] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.930523]                                      ^
[   33.930618]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.931345]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.931464] ==================================================================
[   34.011028] ==================================================================
[   34.011174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   34.011305] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.011436] 
[   34.011524] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.011719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.011778] Hardware name: linux,dummy-virt (DT)
[   34.011853] Call trace:
[   34.011925]  show_stack+0x20/0x38 (C)
[   34.012388]  dump_stack_lvl+0x8c/0xd0
[   34.012528]  print_report+0x118/0x608
[   34.012651]  kasan_report+0xdc/0x128
[   34.012764]  __asan_report_load4_noabort+0x20/0x30
[   34.012956]  kasan_atomics_helper+0x3e04/0x4858
[   34.013146]  kasan_atomics+0x198/0x2e0
[   34.013318]  kunit_try_run_case+0x170/0x3f0
[   34.013502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.013635]  kthread+0x328/0x630
[   34.013754]  ret_from_fork+0x10/0x20
[   34.013868] 
[   34.013925] Allocated by task 276:
[   34.014006]  kasan_save_stack+0x3c/0x68
[   34.014103]  kasan_save_track+0x20/0x40
[   34.014194]  kasan_save_alloc_info+0x40/0x58
[   34.014284]  __kasan_kmalloc+0xd4/0xd8
[   34.014370]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.014471]  kasan_atomics+0xb8/0x2e0
[   34.015015]  kunit_try_run_case+0x170/0x3f0
[   34.015173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.015347]  kthread+0x328/0x630
[   34.015439]  ret_from_fork+0x10/0x20
[   34.015535] 
[   34.015593] The buggy address belongs to the object at fff00000c76a3180
[   34.015593]  which belongs to the cache kmalloc-64 of size 64
[   34.015746] The buggy address is located 0 bytes to the right of
[   34.015746]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.015930] 
[   34.015987] The buggy address belongs to the physical page:
[   34.016085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.016267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.016420] page_type: f5(slab)
[   34.016564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.016752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.016903] page dumped because: kasan: bad access detected
[   34.016978] 
[   34.017022] Memory state around the buggy address:
[   34.017104]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.017227]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.017582] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.017846]                                      ^
[   34.017947]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.018058]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.018332] ==================================================================
[   34.312117] ==================================================================
[   34.312798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   34.313089] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.313242] 
[   34.313759] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.314159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.314234] Hardware name: linux,dummy-virt (DT)
[   34.314342] Call trace:
[   34.314414]  show_stack+0x20/0x38 (C)
[   34.314685]  dump_stack_lvl+0x8c/0xd0
[   34.314821]  print_report+0x118/0x608
[   34.314963]  kasan_report+0xdc/0x128
[   34.315549]  kasan_check_range+0x100/0x1a8
[   34.315701]  __kasan_check_write+0x20/0x30
[   34.315809]  kasan_atomics_helper+0x16d0/0x4858
[   34.316416]  kasan_atomics+0x198/0x2e0
[   34.316563]  kunit_try_run_case+0x170/0x3f0
[   34.317324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.317643]  kthread+0x328/0x630
[   34.317774]  ret_from_fork+0x10/0x20
[   34.318259] 
[   34.318365] Allocated by task 276:
[   34.318742]  kasan_save_stack+0x3c/0x68
[   34.318867]  kasan_save_track+0x20/0x40
[   34.318994]  kasan_save_alloc_info+0x40/0x58
[   34.319496]  __kasan_kmalloc+0xd4/0xd8
[   34.319622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.320246]  kasan_atomics+0xb8/0x2e0
[   34.320422]  kunit_try_run_case+0x170/0x3f0
[   34.320523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.320633]  kthread+0x328/0x630
[   34.320725]  ret_from_fork+0x10/0x20
[   34.321379] 
[   34.321728] The buggy address belongs to the object at fff00000c76a3180
[   34.321728]  which belongs to the cache kmalloc-64 of size 64
[   34.322192] The buggy address is located 0 bytes to the right of
[   34.322192]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.322642] 
[   34.322710] The buggy address belongs to the physical page:
[   34.323071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.323259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.323395] page_type: f5(slab)
[   34.324049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.324200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.324661] page dumped because: kasan: bad access detected
[   34.324769] 
[   34.325097] Memory state around the buggy address:
[   34.325192]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.325668]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.325797] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.325917]                                      ^
[   34.326560]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.326678]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.327099] ==================================================================
[   34.174303] ==================================================================
[   34.174484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   34.174610] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.174738] 
[   34.174826] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.175356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.175475] Hardware name: linux,dummy-virt (DT)
[   34.175560] Call trace:
[   34.175626]  show_stack+0x20/0x38 (C)
[   34.175794]  dump_stack_lvl+0x8c/0xd0
[   34.175966]  print_report+0x118/0x608
[   34.176109]  kasan_report+0xdc/0x128
[   34.176226]  kasan_check_range+0x100/0x1a8
[   34.176356]  __kasan_check_write+0x20/0x30
[   34.176503]  kasan_atomics_helper+0x126c/0x4858
[   34.176615]  kasan_atomics+0x198/0x2e0
[   34.176723]  kunit_try_run_case+0x170/0x3f0
[   34.176840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.177018]  kthread+0x328/0x630
[   34.177136]  ret_from_fork+0x10/0x20
[   34.177265] 
[   34.177333] Allocated by task 276:
[   34.177463]  kasan_save_stack+0x3c/0x68
[   34.177595]  kasan_save_track+0x20/0x40
[   34.177693]  kasan_save_alloc_info+0x40/0x58
[   34.177799]  __kasan_kmalloc+0xd4/0xd8
[   34.177905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.178010]  kasan_atomics+0xb8/0x2e0
[   34.178100]  kunit_try_run_case+0x170/0x3f0
[   34.178192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.178284]  kthread+0x328/0x630
[   34.178353]  ret_from_fork+0x10/0x20
[   34.178443] 
[   34.178498] The buggy address belongs to the object at fff00000c76a3180
[   34.178498]  which belongs to the cache kmalloc-64 of size 64
[   34.178675] The buggy address is located 0 bytes to the right of
[   34.178675]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.178847] 
[   34.178913] The buggy address belongs to the physical page:
[   34.179010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.179151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.180016] page_type: f5(slab)
[   34.180138] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.180266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.180507] page dumped because: kasan: bad access detected
[   34.180790] 
[   34.180991] Memory state around the buggy address:
[   34.181245]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.181507]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.181733] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.182083]                                      ^
[   34.182308]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.182584]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.182772] ==================================================================
[   34.255805] ==================================================================
[   34.255933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   34.256058] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.256181] 
[   34.256268] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.256496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.256564] Hardware name: linux,dummy-virt (DT)
[   34.257037] Call trace:
[   34.257227]  show_stack+0x20/0x38 (C)
[   34.257479]  dump_stack_lvl+0x8c/0xd0
[   34.257706]  print_report+0x118/0x608
[   34.257888]  kasan_report+0xdc/0x128
[   34.258008]  kasan_check_range+0x100/0x1a8
[   34.258114]  __kasan_check_write+0x20/0x30
[   34.258215]  kasan_atomics_helper+0x154c/0x4858
[   34.258337]  kasan_atomics+0x198/0x2e0
[   34.258456]  kunit_try_run_case+0x170/0x3f0
[   34.259020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.259319]  kthread+0x328/0x630
[   34.259942]  ret_from_fork+0x10/0x20
[   34.260106] 
[   34.260171] Allocated by task 276:
[   34.260498]  kasan_save_stack+0x3c/0x68
[   34.260627]  kasan_save_track+0x20/0x40
[   34.260730]  kasan_save_alloc_info+0x40/0x58
[   34.260834]  __kasan_kmalloc+0xd4/0xd8
[   34.260933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.261026]  kasan_atomics+0xb8/0x2e0
[   34.261120]  kunit_try_run_case+0x170/0x3f0
[   34.261264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.261381]  kthread+0x328/0x630
[   34.262011]  ret_from_fork+0x10/0x20
[   34.262397] 
[   34.262483] The buggy address belongs to the object at fff00000c76a3180
[   34.262483]  which belongs to the cache kmalloc-64 of size 64
[   34.262786] The buggy address is located 0 bytes to the right of
[   34.262786]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.263097] 
[   34.263414] The buggy address belongs to the physical page:
[   34.263513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.263717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.264123] page_type: f5(slab)
[   34.264247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.264384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.264572] page dumped because: kasan: bad access detected
[   34.264915] 
[   34.265136] Memory state around the buggy address:
[   34.265269]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.265499]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.265641] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.266135]                                      ^
[   34.266379]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.266495]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.266901] ==================================================================
[   34.328678] ==================================================================
[   34.328816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   34.328967] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.329105] 
[   34.329197] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.329414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.329503] Hardware name: linux,dummy-virt (DT)
[   34.329586] Call trace:
[   34.330266]  show_stack+0x20/0x38 (C)
[   34.330460]  dump_stack_lvl+0x8c/0xd0
[   34.331028]  print_report+0x118/0x608
[   34.331471]  kasan_report+0xdc/0x128
[   34.331620]  __asan_report_load8_noabort+0x20/0x30
[   34.331754]  kasan_atomics_helper+0x3e10/0x4858
[   34.331895]  kasan_atomics+0x198/0x2e0
[   34.332020]  kunit_try_run_case+0x170/0x3f0
[   34.333275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.333962]  kthread+0x328/0x630
[   34.334094]  ret_from_fork+0x10/0x20
[   34.334193] 
[   34.334232] Allocated by task 276:
[   34.334303]  kasan_save_stack+0x3c/0x68
[   34.335444]  kasan_save_track+0x20/0x40
[   34.335585]  kasan_save_alloc_info+0x40/0x58
[   34.335695]  __kasan_kmalloc+0xd4/0xd8
[   34.336067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.336684]  kasan_atomics+0xb8/0x2e0
[   34.336798]  kunit_try_run_case+0x170/0x3f0
[   34.336909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.337245]  kthread+0x328/0x630
[   34.337762]  ret_from_fork+0x10/0x20
[   34.337917] 
[   34.337978] The buggy address belongs to the object at fff00000c76a3180
[   34.337978]  which belongs to the cache kmalloc-64 of size 64
[   34.338243] The buggy address is located 0 bytes to the right of
[   34.338243]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.338386] 
[   34.338430] The buggy address belongs to the physical page:
[   34.338722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.338893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.339046] page_type: f5(slab)
[   34.339720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.339866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.340333] page dumped because: kasan: bad access detected
[   34.340448] 
[   34.340676] Memory state around the buggy address:
[   34.341072]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.341352]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.341809] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.342040]                                      ^
[   34.342152]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.342274]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.342426] ==================================================================
[   34.183599] ==================================================================
[   34.183859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   34.184216] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.184571] 
[   34.184741] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.185171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.185238] Hardware name: linux,dummy-virt (DT)
[   34.185316] Call trace:
[   34.185371]  show_stack+0x20/0x38 (C)
[   34.185905]  dump_stack_lvl+0x8c/0xd0
[   34.186418]  print_report+0x118/0x608
[   34.186789]  kasan_report+0xdc/0x128
[   34.187092]  kasan_check_range+0x100/0x1a8
[   34.187413]  __kasan_check_write+0x20/0x30
[   34.187554]  kasan_atomics_helper+0x12d8/0x4858
[   34.187894]  kasan_atomics+0x198/0x2e0
[   34.188134]  kunit_try_run_case+0x170/0x3f0
[   34.188535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.188956]  kthread+0x328/0x630
[   34.189218]  ret_from_fork+0x10/0x20
[   34.189535] 
[   34.189593] Allocated by task 276:
[   34.189678]  kasan_save_stack+0x3c/0x68
[   34.189796]  kasan_save_track+0x20/0x40
[   34.190133]  kasan_save_alloc_info+0x40/0x58
[   34.190387]  __kasan_kmalloc+0xd4/0xd8
[   34.190721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.190868]  kasan_atomics+0xb8/0x2e0
[   34.190980]  kunit_try_run_case+0x170/0x3f0
[   34.191248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.191735]  kthread+0x328/0x630
[   34.191848]  ret_from_fork+0x10/0x20
[   34.191955] 
[   34.192262] The buggy address belongs to the object at fff00000c76a3180
[   34.192262]  which belongs to the cache kmalloc-64 of size 64
[   34.192615] The buggy address is located 0 bytes to the right of
[   34.192615]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.193176] 
[   34.193367] The buggy address belongs to the physical page:
[   34.193586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.193731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.193851] page_type: f5(slab)
[   34.194268] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.194659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.194908] page dumped because: kasan: bad access detected
[   34.195017] 
[   34.195070] Memory state around the buggy address:
[   34.195159]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.195274]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.195387] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.195490]                                      ^
[   34.195579]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.195970]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.196253] ==================================================================
[   34.296984] ==================================================================
[   34.297098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   34.297208] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.297330] 
[   34.297422] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.297668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.297739] Hardware name: linux,dummy-virt (DT)
[   34.297815] Call trace:
[   34.297936]  show_stack+0x20/0x38 (C)
[   34.298161]  dump_stack_lvl+0x8c/0xd0
[   34.298289]  print_report+0x118/0x608
[   34.298403]  kasan_report+0xdc/0x128
[   34.298531]  __asan_report_load8_noabort+0x20/0x30
[   34.298667]  kasan_atomics_helper+0x3df4/0x4858
[   34.298792]  kasan_atomics+0x198/0x2e0
[   34.298958]  kunit_try_run_case+0x170/0x3f0
[   34.299086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.299240]  kthread+0x328/0x630
[   34.299483]  ret_from_fork+0x10/0x20
[   34.299631] 
[   34.299684] Allocated by task 276:
[   34.299764]  kasan_save_stack+0x3c/0x68
[   34.299859]  kasan_save_track+0x20/0x40
[   34.299954]  kasan_save_alloc_info+0x40/0x58
[   34.300106]  __kasan_kmalloc+0xd4/0xd8
[   34.300206]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.300950]  kasan_atomics+0xb8/0x2e0
[   34.301323]  kunit_try_run_case+0x170/0x3f0
[   34.302103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.302385]  kthread+0x328/0x630
[   34.302906]  ret_from_fork+0x10/0x20
[   34.303113] 
[   34.303296] The buggy address belongs to the object at fff00000c76a3180
[   34.303296]  which belongs to the cache kmalloc-64 of size 64
[   34.303988] The buggy address is located 0 bytes to the right of
[   34.303988]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.304765] 
[   34.304963] The buggy address belongs to the physical page:
[   34.305227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.305463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.305580] page_type: f5(slab)
[   34.306497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.306845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.306983] page dumped because: kasan: bad access detected
[   34.307071] 
[   34.307125] Memory state around the buggy address:
[   34.307612]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.307749]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.308001] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.308237]                                      ^
[   34.308321]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.308443]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.308861] ==================================================================
[   34.281039] ==================================================================
[   34.281164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   34.281292] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.281427] 
[   34.281516] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.281745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.281818] Hardware name: linux,dummy-virt (DT)
[   34.282425] Call trace:
[   34.282493]  show_stack+0x20/0x38 (C)
[   34.282618]  dump_stack_lvl+0x8c/0xd0
[   34.282744]  print_report+0x118/0x608
[   34.283264]  kasan_report+0xdc/0x128
[   34.283545]  __asan_report_load8_noabort+0x20/0x30
[   34.283701]  kasan_atomics_helper+0x3db0/0x4858
[   34.283822]  kasan_atomics+0x198/0x2e0
[   34.284127]  kunit_try_run_case+0x170/0x3f0
[   34.284276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.284413]  kthread+0x328/0x630
[   34.284513]  ret_from_fork+0x10/0x20
[   34.284658] 
[   34.284751] Allocated by task 276:
[   34.284829]  kasan_save_stack+0x3c/0x68
[   34.284965]  kasan_save_track+0x20/0x40
[   34.285068]  kasan_save_alloc_info+0x40/0x58
[   34.285176]  __kasan_kmalloc+0xd4/0xd8
[   34.285274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.285379]  kasan_atomics+0xb8/0x2e0
[   34.285501]  kunit_try_run_case+0x170/0x3f0
[   34.285595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.285925]  kthread+0x328/0x630
[   34.286016]  ret_from_fork+0x10/0x20
[   34.286111] 
[   34.286344] The buggy address belongs to the object at fff00000c76a3180
[   34.286344]  which belongs to the cache kmalloc-64 of size 64
[   34.286504] The buggy address is located 0 bytes to the right of
[   34.286504]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.286657] 
[   34.286711] The buggy address belongs to the physical page:
[   34.286838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.287069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.287221] page_type: f5(slab)
[   34.287368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.287552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.287682] page dumped because: kasan: bad access detected
[   34.287769] 
[   34.287838] Memory state around the buggy address:
[   34.287969]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.288092]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.288209] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.288314]                                      ^
[   34.288441]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288591]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288694] ==================================================================
[   34.345109] ==================================================================
[   34.345315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   34.345485] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.345613] 
[   34.345698] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.345912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.345987] Hardware name: linux,dummy-virt (DT)
[   34.346075] Call trace:
[   34.346898]  show_stack+0x20/0x38 (C)
[   34.347260]  dump_stack_lvl+0x8c/0xd0
[   34.347409]  print_report+0x118/0x608
[   34.347525]  kasan_report+0xdc/0x128
[   34.348085]  kasan_check_range+0x100/0x1a8
[   34.348451]  __kasan_check_write+0x20/0x30
[   34.348751]  kasan_atomics_helper+0x175c/0x4858
[   34.348934]  kasan_atomics+0x198/0x2e0
[   34.349433]  kunit_try_run_case+0x170/0x3f0
[   34.349617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.349778]  kthread+0x328/0x630
[   34.349909]  ret_from_fork+0x10/0x20
[   34.350757] 
[   34.350841] Allocated by task 276:
[   34.350957]  kasan_save_stack+0x3c/0x68
[   34.351145]  kasan_save_track+0x20/0x40
[   34.351478]  kasan_save_alloc_info+0x40/0x58
[   34.351755]  __kasan_kmalloc+0xd4/0xd8
[   34.351858]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.351973]  kasan_atomics+0xb8/0x2e0
[   34.352071]  kunit_try_run_case+0x170/0x3f0
[   34.352175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.352288]  kthread+0x328/0x630
[   34.352997]  ret_from_fork+0x10/0x20
[   34.353134] 
[   34.353570] The buggy address belongs to the object at fff00000c76a3180
[   34.353570]  which belongs to the cache kmalloc-64 of size 64
[   34.353983] The buggy address is located 0 bytes to the right of
[   34.353983]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.354174] 
[   34.354739] The buggy address belongs to the physical page:
[   34.354846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.355009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.355498] page_type: f5(slab)
[   34.355957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.356136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.356401] page dumped because: kasan: bad access detected
[   34.356707] 
[   34.356772] Memory state around the buggy address:
[   34.357097]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.357228]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.357345] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.357455]                                      ^
[   34.357551]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.357666]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.357772] ==================================================================
[   34.080313] ==================================================================
[   34.080445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   34.080650] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.080776] 
[   34.081203] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.081851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.081946] Hardware name: linux,dummy-virt (DT)
[   34.082451] Call trace:
[   34.082545]  show_stack+0x20/0x38 (C)
[   34.082685]  dump_stack_lvl+0x8c/0xd0
[   34.082810]  print_report+0x118/0x608
[   34.082953]  kasan_report+0xdc/0x128
[   34.083081]  kasan_check_range+0x100/0x1a8
[   34.083206]  __kasan_check_write+0x20/0x30
[   34.083322]  kasan_atomics_helper+0xf20/0x4858
[   34.083451]  kasan_atomics+0x198/0x2e0
[   34.083572]  kunit_try_run_case+0x170/0x3f0
[   34.083698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.083846]  kthread+0x328/0x630
[   34.083965]  ret_from_fork+0x10/0x20
[   34.084375] 
[   34.084537] Allocated by task 276:
[   34.084646]  kasan_save_stack+0x3c/0x68
[   34.084754]  kasan_save_track+0x20/0x40
[   34.084853]  kasan_save_alloc_info+0x40/0x58
[   34.084974]  __kasan_kmalloc+0xd4/0xd8
[   34.085073]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.085178]  kasan_atomics+0xb8/0x2e0
[   34.085278]  kunit_try_run_case+0x170/0x3f0
[   34.085412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.085563]  kthread+0x328/0x630
[   34.085685]  ret_from_fork+0x10/0x20
[   34.085803] 
[   34.085859] The buggy address belongs to the object at fff00000c76a3180
[   34.085859]  which belongs to the cache kmalloc-64 of size 64
[   34.086009] The buggy address is located 0 bytes to the right of
[   34.086009]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.086174] 
[   34.086236] The buggy address belongs to the physical page:
[   34.086327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.086458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.086571] page_type: f5(slab)
[   34.087077] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.087592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.087842] page dumped because: kasan: bad access detected
[   34.088070] 
[   34.088118] Memory state around the buggy address:
[   34.088308]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.088531]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.088678] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.088800]                                      ^
[   34.089181]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.089300]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.089578] ==================================================================
[   34.221415] ==================================================================
[   34.222052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   34.222445] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.222682] 
[   34.223006] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.223538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.223702] Hardware name: linux,dummy-virt (DT)
[   34.223803] Call trace:
[   34.223867]  show_stack+0x20/0x38 (C)
[   34.224013]  dump_stack_lvl+0x8c/0xd0
[   34.224139]  print_report+0x118/0x608
[   34.224259]  kasan_report+0xdc/0x128
[   34.225025]  kasan_check_range+0x100/0x1a8
[   34.225308]  __kasan_check_write+0x20/0x30
[   34.225617]  kasan_atomics_helper+0x1414/0x4858
[   34.225789]  kasan_atomics+0x198/0x2e0
[   34.226041]  kunit_try_run_case+0x170/0x3f0
[   34.226311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.226769]  kthread+0x328/0x630
[   34.226897]  ret_from_fork+0x10/0x20
[   34.227139] 
[   34.227309] Allocated by task 276:
[   34.227408]  kasan_save_stack+0x3c/0x68
[   34.227728]  kasan_save_track+0x20/0x40
[   34.228100]  kasan_save_alloc_info+0x40/0x58
[   34.228226]  __kasan_kmalloc+0xd4/0xd8
[   34.228331]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.228430]  kasan_atomics+0xb8/0x2e0
[   34.228524]  kunit_try_run_case+0x170/0x3f0
[   34.228628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.228741]  kthread+0x328/0x630
[   34.228825]  ret_from_fork+0x10/0x20
[   34.228931] 
[   34.228990] The buggy address belongs to the object at fff00000c76a3180
[   34.228990]  which belongs to the cache kmalloc-64 of size 64
[   34.229511] The buggy address is located 0 bytes to the right of
[   34.229511]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.229856] 
[   34.230112] The buggy address belongs to the physical page:
[   34.230512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.230675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.231043] page_type: f5(slab)
[   34.231145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.231400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.231711] page dumped because: kasan: bad access detected
[   34.232020] 
[   34.232077] Memory state around the buggy address:
[   34.232163]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.232674]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.233091] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.233438]                                      ^
[   34.233628]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.233837]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.233938] ==================================================================
[   34.040018] ==================================================================
[   34.040139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   34.040262] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.040395] 
[   34.040488] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.040719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.042297] Hardware name: linux,dummy-virt (DT)
[   34.042408] Call trace:
[   34.042474]  show_stack+0x20/0x38 (C)
[   34.042953]  dump_stack_lvl+0x8c/0xd0
[   34.043570]  print_report+0x118/0x608
[   34.043842]  kasan_report+0xdc/0x128
[   34.043987]  kasan_check_range+0x100/0x1a8
[   34.044110]  __kasan_check_write+0x20/0x30
[   34.044814]  kasan_atomics_helper+0xe44/0x4858
[   34.045251]  kasan_atomics+0x198/0x2e0
[   34.045384]  kunit_try_run_case+0x170/0x3f0
[   34.045999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.046581]  kthread+0x328/0x630
[   34.047053]  ret_from_fork+0x10/0x20
[   34.047221] 
[   34.047444] Allocated by task 276:
[   34.047532]  kasan_save_stack+0x3c/0x68
[   34.048105]  kasan_save_track+0x20/0x40
[   34.048218]  kasan_save_alloc_info+0x40/0x58
[   34.048330]  __kasan_kmalloc+0xd4/0xd8
[   34.048428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.048541]  kasan_atomics+0xb8/0x2e0
[   34.048640]  kunit_try_run_case+0x170/0x3f0
[   34.049814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.050214]  kthread+0x328/0x630
[   34.050556]  ret_from_fork+0x10/0x20
[   34.050887] 
[   34.050964] The buggy address belongs to the object at fff00000c76a3180
[   34.050964]  which belongs to the cache kmalloc-64 of size 64
[   34.051374] The buggy address is located 0 bytes to the right of
[   34.051374]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.051564] 
[   34.051614] The buggy address belongs to the physical page:
[   34.051686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.051809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.051952] page_type: f5(slab)
[   34.052056] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.053158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.053438] page dumped because: kasan: bad access detected
[   34.053530] 
[   34.053574] Memory state around the buggy address:
[   34.054054]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.054366]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.054497] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.055086]                                      ^
[   34.055193]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.055306]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.055668] ==================================================================
[   34.210732] ==================================================================
[   34.210865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   34.211002] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.211107] 
[   34.211190] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.211412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.211484] Hardware name: linux,dummy-virt (DT)
[   34.211571] Call trace:
[   34.211630]  show_stack+0x20/0x38 (C)
[   34.211758]  dump_stack_lvl+0x8c/0xd0
[   34.211889]  print_report+0x118/0x608
[   34.212021]  kasan_report+0xdc/0x128
[   34.212138]  __asan_report_load8_noabort+0x20/0x30
[   34.212261]  kasan_atomics_helper+0x3f04/0x4858
[   34.212387]  kasan_atomics+0x198/0x2e0
[   34.212510]  kunit_try_run_case+0x170/0x3f0
[   34.212640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.212783]  kthread+0x328/0x630
[   34.213548]  ret_from_fork+0x10/0x20
[   34.213843] 
[   34.213910] Allocated by task 276:
[   34.213998]  kasan_save_stack+0x3c/0x68
[   34.214387]  kasan_save_track+0x20/0x40
[   34.214489]  kasan_save_alloc_info+0x40/0x58
[   34.214572]  __kasan_kmalloc+0xd4/0xd8
[   34.214643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.214738]  kasan_atomics+0xb8/0x2e0
[   34.214825]  kunit_try_run_case+0x170/0x3f0
[   34.215024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.215293]  kthread+0x328/0x630
[   34.215747]  ret_from_fork+0x10/0x20
[   34.216081] 
[   34.216213] The buggy address belongs to the object at fff00000c76a3180
[   34.216213]  which belongs to the cache kmalloc-64 of size 64
[   34.216426] The buggy address is located 0 bytes to the right of
[   34.216426]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.216998] 
[   34.217079] The buggy address belongs to the physical page:
[   34.217298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.217534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.217894] page_type: f5(slab)
[   34.217998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.218120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.218374] page dumped because: kasan: bad access detected
[   34.218568] 
[   34.218643] Memory state around the buggy address:
[   34.218758]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.218881]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.219008] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.219738]                                      ^
[   34.220044]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.220184]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.220294] ==================================================================
[   34.166336] ==================================================================
[   34.166465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   34.166643] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.166818] 
[   34.166975] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.167273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.167344] Hardware name: linux,dummy-virt (DT)
[   34.167430] Call trace:
[   34.167515]  show_stack+0x20/0x38 (C)
[   34.167681]  dump_stack_lvl+0x8c/0xd0
[   34.167847]  print_report+0x118/0x608
[   34.167967]  kasan_report+0xdc/0x128
[   34.168081]  kasan_check_range+0x100/0x1a8
[   34.168250]  __kasan_check_write+0x20/0x30
[   34.168360]  kasan_atomics_helper+0x11f8/0x4858
[   34.168477]  kasan_atomics+0x198/0x2e0
[   34.168593]  kunit_try_run_case+0x170/0x3f0
[   34.168727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.168928]  kthread+0x328/0x630
[   34.169062]  ret_from_fork+0x10/0x20
[   34.169214] 
[   34.169283] Allocated by task 276:
[   34.169379]  kasan_save_stack+0x3c/0x68
[   34.169506]  kasan_save_track+0x20/0x40
[   34.169637]  kasan_save_alloc_info+0x40/0x58
[   34.169853]  __kasan_kmalloc+0xd4/0xd8
[   34.169993]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.170109]  kasan_atomics+0xb8/0x2e0
[   34.170198]  kunit_try_run_case+0x170/0x3f0
[   34.170284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.170372]  kthread+0x328/0x630
[   34.170450]  ret_from_fork+0x10/0x20
[   34.170545] 
[   34.170602] The buggy address belongs to the object at fff00000c76a3180
[   34.170602]  which belongs to the cache kmalloc-64 of size 64
[   34.171239] The buggy address is located 0 bytes to the right of
[   34.171239]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.172433] 
[   34.172508] The buggy address belongs to the physical page:
[   34.172591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.172675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.172736] page_type: f5(slab)
[   34.172788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.172845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.172947] page dumped because: kasan: bad access detected
[   34.173070] 
[   34.173120] Memory state around the buggy address:
[   34.173206]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.173322]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.173429] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.173531]                                      ^
[   34.173613]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.173706]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.173793] ==================================================================
[   33.874083] ==================================================================
[   33.874211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   33.874375] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.874508] 
[   33.874589] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.874785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.875726]  kasan_atomics_helper+0x934/0x4858
[   33.877084]  __kasan_kmalloc+0xd4/0xd8
[   33.877179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.877280]  kasan_atomics+0xb8/0x2e0
[   33.877371]  kunit_try_run_case+0x170/0x3f0
[   33.877603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.877744]  kthread+0x328/0x630
[   33.877827]  ret_from_fork+0x10/0x20
[   33.877928] 
[   33.878012] The buggy address belongs to the object at fff00000c76a3180
[   33.878012]  which belongs to the cache kmalloc-64 of size 64
[   33.878162] The buggy address is located 0 bytes to the right of
[   33.878162]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.878346] 
[   33.878410] The buggy address belongs to the physical page:
[   33.878481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.878595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.878711] page_type: f5(slab)
[   33.878814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.878972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.879092] page dumped because: kasan: bad access detected
[   33.879168] 
[   33.879233] Memory state around the buggy address:
[   33.879321]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.879430]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.879548] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.879653]                                      ^
[   33.879744]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.879859]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.879974] ==================================================================
[   33.990765] ==================================================================
[   33.990987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.991125] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.991256] 
[   33.991338] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.991557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.991634] Hardware name: linux,dummy-virt (DT)
[   33.991724] Call trace:
[   33.991811]  show_stack+0x20/0x38 (C)
[   33.992075]  dump_stack_lvl+0x8c/0xd0
[   33.992323]  print_report+0x118/0x608
[   33.993098]  kasan_report+0xdc/0x128
[   33.993482]  __asan_report_load4_noabort+0x20/0x30
[   33.993742]  kasan_atomics_helper+0x3dd8/0x4858
[   33.993912]  kasan_atomics+0x198/0x2e0
[   33.994036]  kunit_try_run_case+0x170/0x3f0
[   33.994166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.994307]  kthread+0x328/0x630
[   33.994422]  ret_from_fork+0x10/0x20
[   33.994544] 
[   33.994586] Allocated by task 276:
[   33.994647]  kasan_save_stack+0x3c/0x68
[   33.995124]  kasan_save_track+0x20/0x40
[   33.995366]  kasan_save_alloc_info+0x40/0x58
[   33.995480]  __kasan_kmalloc+0xd4/0xd8
[   33.995665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.995948]  kasan_atomics+0xb8/0x2e0
[   33.996047]  kunit_try_run_case+0x170/0x3f0
[   33.996311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.996623]  kthread+0x328/0x630
[   33.996821]  ret_from_fork+0x10/0x20
[   33.997032] 
[   33.997105] The buggy address belongs to the object at fff00000c76a3180
[   33.997105]  which belongs to the cache kmalloc-64 of size 64
[   33.997376] The buggy address is located 0 bytes to the right of
[   33.997376]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.997563] 
[   33.997622] The buggy address belongs to the physical page:
[   33.997709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.997850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.997990] page_type: f5(slab)
[   33.998089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.998263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.998625] page dumped because: kasan: bad access detected
[   33.998758] 
[   33.998839] Memory state around the buggy address:
[   33.998986]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.999156]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.999321] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.999467]                                      ^
[   33.999967]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.000087]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.000193] ==================================================================
[   33.900918] ==================================================================
[   33.901055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.901839] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.902007] 
[   33.902097] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.902326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.902407] Hardware name: linux,dummy-virt (DT)
[   33.903390] Call trace:
[   33.903571]  show_stack+0x20/0x38 (C)
[   33.904160]  dump_stack_lvl+0x8c/0xd0
[   33.904518]  print_report+0x118/0x608
[   33.904881]  kasan_report+0xdc/0x128
[   33.905379]  kasan_check_range+0x100/0x1a8
[   33.905624]  __kasan_check_write+0x20/0x30
[   33.905859]  kasan_atomics_helper+0xa6c/0x4858
[   33.906188]  kasan_atomics+0x198/0x2e0
[   33.906426]  kunit_try_run_case+0x170/0x3f0
[   33.906822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.907209]  kthread+0x328/0x630
[   33.907648]  ret_from_fork+0x10/0x20
[   33.908036] 
[   33.908100] Allocated by task 276:
[   33.908471]  kasan_save_stack+0x3c/0x68
[   33.908593]  kasan_save_track+0x20/0x40
[   33.908932]  kasan_save_alloc_info+0x40/0x58
[   33.909055]  __kasan_kmalloc+0xd4/0xd8
[   33.909660]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.909848]  kasan_atomics+0xb8/0x2e0
[   33.909960]  kunit_try_run_case+0x170/0x3f0
[   33.910293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.910663]  kthread+0x328/0x630
[   33.910805]  ret_from_fork+0x10/0x20
[   33.911118] 
[   33.911443] The buggy address belongs to the object at fff00000c76a3180
[   33.911443]  which belongs to the cache kmalloc-64 of size 64
[   33.911811] The buggy address is located 0 bytes to the right of
[   33.911811]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.912384] 
[   33.912463] The buggy address belongs to the physical page:
[   33.912554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.913102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.913250] page_type: f5(slab)
[   33.913795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.914324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.914449] page dumped because: kasan: bad access detected
[   33.914606] 
[   33.914686] Memory state around the buggy address:
[   33.914882]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.915021]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.915200] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.915367]                                      ^
[   33.915465]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.915617]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.915806] ==================================================================
[   34.031573] ==================================================================
[   34.031637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   34.031745] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.031858] 
[   34.031962] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.032150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.032221] Hardware name: linux,dummy-virt (DT)
[   34.032304] Call trace:
[   34.032360]  show_stack+0x20/0x38 (C)
[   34.032493]  dump_stack_lvl+0x8c/0xd0
[   34.032617]  print_report+0x118/0x608
[   34.032738]  kasan_report+0xdc/0x128
[   34.032853]  __asan_report_load8_noabort+0x20/0x30
[   34.032999]  kasan_atomics_helper+0x3f58/0x4858
[   34.033129]  kasan_atomics+0x198/0x2e0
[   34.033248]  kunit_try_run_case+0x170/0x3f0
[   34.033379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.033517]  kthread+0x328/0x630
[   34.033631]  ret_from_fork+0x10/0x20
[   34.033757] 
[   34.033806] Allocated by task 276:
[   34.033889]  kasan_save_stack+0x3c/0x68
[   34.034295]  kasan_save_track+0x20/0x40
[   34.034395]  kasan_save_alloc_info+0x40/0x58
[   34.034490]  __kasan_kmalloc+0xd4/0xd8
[   34.034762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.034866]  kasan_atomics+0xb8/0x2e0
[   34.034989]  kunit_try_run_case+0x170/0x3f0
[   34.035081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.035184]  kthread+0x328/0x630
[   34.035258]  ret_from_fork+0x10/0x20
[   34.035332] 
[   34.035382] The buggy address belongs to the object at fff00000c76a3180
[   34.035382]  which belongs to the cache kmalloc-64 of size 64
[   34.035934] The buggy address is located 0 bytes to the right of
[   34.035934]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.036190] 
[   34.036251] The buggy address belongs to the physical page:
[   34.036492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.036962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.037800] page_type: f5(slab)
[   34.037924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.038078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.038508] page dumped because: kasan: bad access detected
[   34.038589] 
[   34.038644] Memory state around the buggy address:
[   34.038743]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.038857]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.038989] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.039077]                                      ^
[   34.039157]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.039250]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.039361] ==================================================================
[   34.057646] ==================================================================
[   34.058461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   34.058766] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.058982] 
[   34.059082] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.059602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.059824] Hardware name: linux,dummy-virt (DT)
[   34.060030] Call trace:
[   34.060244]  show_stack+0x20/0x38 (C)
[   34.060504]  dump_stack_lvl+0x8c/0xd0
[   34.060933]  print_report+0x118/0x608
[   34.061214]  kasan_report+0xdc/0x128
[   34.061382]  __asan_report_store8_noabort+0x20/0x30
[   34.061767]  kasan_atomics_helper+0x3e5c/0x4858
[   34.062092]  kasan_atomics+0x198/0x2e0
[   34.062168]  kunit_try_run_case+0x170/0x3f0
[   34.062228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.062293]  kthread+0x328/0x630
[   34.062346]  ret_from_fork+0x10/0x20
[   34.062407] 
[   34.062431] Allocated by task 276:
[   34.062470]  kasan_save_stack+0x3c/0x68
[   34.062525]  kasan_save_track+0x20/0x40
[   34.062571]  kasan_save_alloc_info+0x40/0x58
[   34.062618]  __kasan_kmalloc+0xd4/0xd8
[   34.062662]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.062709]  kasan_atomics+0xb8/0x2e0
[   34.062751]  kunit_try_run_case+0x170/0x3f0
[   34.062794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.062845]  kthread+0x328/0x630
[   34.062914]  ret_from_fork+0x10/0x20
[   34.063543] 
[   34.063647] The buggy address belongs to the object at fff00000c76a3180
[   34.063647]  which belongs to the cache kmalloc-64 of size 64
[   34.064106] The buggy address is located 0 bytes to the right of
[   34.064106]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.064578] 
[   34.064686] The buggy address belongs to the physical page:
[   34.064904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.065034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.065553] page_type: f5(slab)
[   34.065841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.065992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.066105] page dumped because: kasan: bad access detected
[   34.066535] 
[   34.066593] Memory state around the buggy address:
[   34.066853]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.067107]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.067450] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.067773]                                      ^
[   34.068099]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.068350]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.068462] ==================================================================
[   34.289220] ==================================================================
[   34.289566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   34.289786] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.290081] 
[   34.290390] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.290646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.290718] Hardware name: linux,dummy-virt (DT)
[   34.290802] Call trace:
[   34.290892]  show_stack+0x20/0x38 (C)
[   34.291330]  dump_stack_lvl+0x8c/0xd0
[   34.291539]  print_report+0x118/0x608
[   34.291703]  kasan_report+0xdc/0x128
[   34.291895]  kasan_check_range+0x100/0x1a8
[   34.292015]  __kasan_check_write+0x20/0x30
[   34.292111]  kasan_atomics_helper+0x1644/0x4858
[   34.292254]  kasan_atomics+0x198/0x2e0
[   34.292385]  kunit_try_run_case+0x170/0x3f0
[   34.292524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.292644]  kthread+0x328/0x630
[   34.292751]  ret_from_fork+0x10/0x20
[   34.292894] 
[   34.292951] Allocated by task 276:
[   34.293034]  kasan_save_stack+0x3c/0x68
[   34.293133]  kasan_save_track+0x20/0x40
[   34.293251]  kasan_save_alloc_info+0x40/0x58
[   34.293386]  __kasan_kmalloc+0xd4/0xd8
[   34.293544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.293649]  kasan_atomics+0xb8/0x2e0
[   34.293732]  kunit_try_run_case+0x170/0x3f0
[   34.293832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.293984]  kthread+0x328/0x630
[   34.294078]  ret_from_fork+0x10/0x20
[   34.294208] 
[   34.294259] The buggy address belongs to the object at fff00000c76a3180
[   34.294259]  which belongs to the cache kmalloc-64 of size 64
[   34.294449] The buggy address is located 0 bytes to the right of
[   34.294449]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.294624] 
[   34.294708] The buggy address belongs to the physical page:
[   34.294784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.294937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.295072] page_type: f5(slab)
[   34.295161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.295305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.295412] page dumped because: kasan: bad access detected
[   34.295496] 
[   34.295547] Memory state around the buggy address:
[   34.295632]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.295750]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.295929] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.296084]                                      ^
[   34.296217]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.296381]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.296531] ==================================================================
[   33.886996] ==================================================================
[   33.887118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.887243] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.887380] 
[   33.887506] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.888392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.888568] Hardware name: linux,dummy-virt (DT)
[   33.888657] Call trace:
[   33.888712]  show_stack+0x20/0x38 (C)
[   33.888846]  dump_stack_lvl+0x8c/0xd0
[   33.888985]  print_report+0x118/0x608
[   33.889107]  kasan_report+0xdc/0x128
[   33.889227]  kasan_check_range+0x100/0x1a8
[   33.889355]  __kasan_check_write+0x20/0x30
[   33.889927]  kasan_atomics_helper+0xa04/0x4858
[   33.890620]  kasan_atomics+0x198/0x2e0
[   33.890795]  kunit_try_run_case+0x170/0x3f0
[   33.891207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.891593]  kthread+0x328/0x630
[   33.891724]  ret_from_fork+0x10/0x20
[   33.891976] 
[   33.892038] Allocated by task 276:
[   33.892242]  kasan_save_stack+0x3c/0x68
[   33.892793]  kasan_save_track+0x20/0x40
[   33.892946]  kasan_save_alloc_info+0x40/0x58
[   33.893158]  __kasan_kmalloc+0xd4/0xd8
[   33.893266]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.893828]  kasan_atomics+0xb8/0x2e0
[   33.893954]  kunit_try_run_case+0x170/0x3f0
[   33.894367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.894490]  kthread+0x328/0x630
[   33.894568]  ret_from_fork+0x10/0x20
[   33.894649] 
[   33.894706] The buggy address belongs to the object at fff00000c76a3180
[   33.894706]  which belongs to the cache kmalloc-64 of size 64
[   33.895725] The buggy address is located 0 bytes to the right of
[   33.895725]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   33.896013] 
[   33.896163] The buggy address belongs to the physical page:
[   33.896283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.896460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.896648] page_type: f5(slab)
[   33.896821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.897204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.897533] page dumped because: kasan: bad access detected
[   33.897630] 
[   33.897677] Memory state around the buggy address:
[   33.897751]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.897855]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.898434] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.899029]                                      ^
[   33.899155]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.899682]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.900164] ==================================================================
[   34.268958] ==================================================================
[   34.269092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   34.269224] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.269358] 
[   34.269462] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.269694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.269765] Hardware name: linux,dummy-virt (DT)
[   34.269850] Call trace:
[   34.272628]  show_stack+0x20/0x38 (C)
[   34.272792]  dump_stack_lvl+0x8c/0xd0
[   34.273028]  print_report+0x118/0x608
[   34.273157]  kasan_report+0xdc/0x128
[   34.273365]  kasan_check_range+0x100/0x1a8
[   34.273655]  __kasan_check_write+0x20/0x30
[   34.273866]  kasan_atomics_helper+0x15b4/0x4858
[   34.274198]  kasan_atomics+0x198/0x2e0
[   34.274364]  kunit_try_run_case+0x170/0x3f0
[   34.274472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.274587]  kthread+0x328/0x630
[   34.274674]  ret_from_fork+0x10/0x20
[   34.274798] 
[   34.275299] Allocated by task 276:
[   34.275382]  kasan_save_stack+0x3c/0x68
[   34.275486]  kasan_save_track+0x20/0x40
[   34.275570]  kasan_save_alloc_info+0x40/0x58
[   34.275668]  __kasan_kmalloc+0xd4/0xd8
[   34.275761]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.276316]  kasan_atomics+0xb8/0x2e0
[   34.276436]  kunit_try_run_case+0x170/0x3f0
[   34.276538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.277129]  kthread+0x328/0x630
[   34.277754]  ret_from_fork+0x10/0x20
[   34.277868] 
[   34.277967] The buggy address belongs to the object at fff00000c76a3180
[   34.277967]  which belongs to the cache kmalloc-64 of size 64
[   34.278113] The buggy address is located 0 bytes to the right of
[   34.278113]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.278383] 
[   34.278713] The buggy address belongs to the physical page:
[   34.278843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.279084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.279222] page_type: f5(slab)
[   34.279326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.279453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.279582] page dumped because: kasan: bad access detected
[   34.279702] 
[   34.279783] Memory state around the buggy address:
[   34.279909]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.280014]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.280124] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.280228]                                      ^
[   34.280319]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.280426]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.280521] ==================================================================
[   34.021554] ==================================================================
[   34.021680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   34.022138] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.022327] 
[   34.022419] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.022635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.022709] Hardware name: linux,dummy-virt (DT)
[   34.022988] Call trace:
[   34.023059]  show_stack+0x20/0x38 (C)
[   34.023237]  dump_stack_lvl+0x8c/0xd0
[   34.023404]  print_report+0x118/0x608
[   34.023581]  kasan_report+0xdc/0x128
[   34.023754]  kasan_check_range+0x100/0x1a8
[   34.023955]  __kasan_check_read+0x20/0x30
[   34.024141]  kasan_atomics_helper+0xdd4/0x4858
[   34.024318]  kasan_atomics+0x198/0x2e0
[   34.024488]  kunit_try_run_case+0x170/0x3f0
[   34.024628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.024789]  kthread+0x328/0x630
[   34.024915]  ret_from_fork+0x10/0x20
[   34.025048] 
[   34.025125] Allocated by task 276:
[   34.025232]  kasan_save_stack+0x3c/0x68
[   34.025384]  kasan_save_track+0x20/0x40
[   34.025525]  kasan_save_alloc_info+0x40/0x58
[   34.025627]  __kasan_kmalloc+0xd4/0xd8
[   34.025723]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.025831]  kasan_atomics+0xb8/0x2e0
[   34.026384]  kunit_try_run_case+0x170/0x3f0
[   34.027197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.027359]  kthread+0x328/0x630
[   34.027451]  ret_from_fork+0x10/0x20
[   34.027548] 
[   34.027630] The buggy address belongs to the object at fff00000c76a3180
[   34.027630]  which belongs to the cache kmalloc-64 of size 64
[   34.027768] The buggy address is located 0 bytes to the right of
[   34.027768]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.028206] 
[   34.028301] The buggy address belongs to the physical page:
[   34.028425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.028582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.028723] page_type: f5(slab)
[   34.028886] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.029027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.029134] page dumped because: kasan: bad access detected
[   34.029219] 
[   34.029268] Memory state around the buggy address:
[   34.029358]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.029509]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.029622] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.029732]                                      ^
[   34.030375]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030509]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030918] ==================================================================
[   34.142751] ==================================================================
[   34.143235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   34.143692] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.143827] 
[   34.143928] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.144151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.144227] Hardware name: linux,dummy-virt (DT)
[   34.144312] Call trace:
[   34.144368]  show_stack+0x20/0x38 (C)
[   34.144491]  dump_stack_lvl+0x8c/0xd0
[   34.144620]  print_report+0x118/0x608
[   34.144739]  kasan_report+0xdc/0x128
[   34.144859]  kasan_check_range+0x100/0x1a8
[   34.146185]  __kasan_check_write+0x20/0x30
[   34.146502]  kasan_atomics_helper+0x1128/0x4858
[   34.146721]  kasan_atomics+0x198/0x2e0
[   34.146868]  kunit_try_run_case+0x170/0x3f0
[   34.147013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.147239]  kthread+0x328/0x630
[   34.147421]  ret_from_fork+0x10/0x20
[   34.147617] 
[   34.147673] Allocated by task 276:
[   34.147767]  kasan_save_stack+0x3c/0x68
[   34.147889]  kasan_save_track+0x20/0x40
[   34.147992]  kasan_save_alloc_info+0x40/0x58
[   34.148092]  __kasan_kmalloc+0xd4/0xd8
[   34.148206]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.148320]  kasan_atomics+0xb8/0x2e0
[   34.148416]  kunit_try_run_case+0x170/0x3f0
[   34.148512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.148628]  kthread+0x328/0x630
[   34.148715]  ret_from_fork+0x10/0x20
[   34.148842] 
[   34.149187] The buggy address belongs to the object at fff00000c76a3180
[   34.149187]  which belongs to the cache kmalloc-64 of size 64
[   34.149359] The buggy address is located 0 bytes to the right of
[   34.149359]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.149523] 
[   34.150421] The buggy address belongs to the physical page:
[   34.150554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.150694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.151052] page_type: f5(slab)
[   34.151160] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.151308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.151433] page dumped because: kasan: bad access detected
[   34.151570] 
[   34.151659] Memory state around the buggy address:
[   34.151932]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.152079]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.152296] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.152497]                                      ^
[   34.152651]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.152929]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.153040] ==================================================================
[   34.234833] ==================================================================
[   34.234986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   34.235555] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.236190] 
[   34.236356] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.236677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.236778] Hardware name: linux,dummy-virt (DT)
[   34.236913] Call trace:
[   34.237003]  show_stack+0x20/0x38 (C)
[   34.237190]  dump_stack_lvl+0x8c/0xd0
[   34.237342]  print_report+0x118/0x608
[   34.237512]  kasan_report+0xdc/0x128
[   34.237628]  kasan_check_range+0x100/0x1a8
[   34.237939]  __kasan_check_write+0x20/0x30
[   34.238294]  kasan_atomics_helper+0x147c/0x4858
[   34.238458]  kasan_atomics+0x198/0x2e0
[   34.238588]  kunit_try_run_case+0x170/0x3f0
[   34.238713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.239104]  kthread+0x328/0x630
[   34.239226]  ret_from_fork+0x10/0x20
[   34.239370] 
[   34.239449] Allocated by task 276:
[   34.239757]  kasan_save_stack+0x3c/0x68
[   34.239900]  kasan_save_track+0x20/0x40
[   34.240315]  kasan_save_alloc_info+0x40/0x58
[   34.240552]  __kasan_kmalloc+0xd4/0xd8
[   34.240699]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.240848]  kasan_atomics+0xb8/0x2e0
[   34.240967]  kunit_try_run_case+0x170/0x3f0
[   34.241065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.241200]  kthread+0x328/0x630
[   34.241295]  ret_from_fork+0x10/0x20
[   34.241461] 
[   34.241515] The buggy address belongs to the object at fff00000c76a3180
[   34.241515]  which belongs to the cache kmalloc-64 of size 64
[   34.241670] The buggy address is located 0 bytes to the right of
[   34.241670]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.242186] 
[   34.242335] The buggy address belongs to the physical page:
[   34.242480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.242754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.243329] page_type: f5(slab)
[   34.243461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.243600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.243715] page dumped because: kasan: bad access detected
[   34.243799] 
[   34.243886] Memory state around the buggy address:
[   34.243967]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.244117]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.244231] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.244585]                                      ^
[   34.244727]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.244918]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.245029] ==================================================================
[   34.359109] ==================================================================
[   34.359243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   34.359768] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.359911] 
[   34.360003] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.360213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.360280] Hardware name: linux,dummy-virt (DT)
[   34.360359] Call trace:
[   34.360418]  show_stack+0x20/0x38 (C)
[   34.360540]  dump_stack_lvl+0x8c/0xd0
[   34.361315]  print_report+0x118/0x608
[   34.361579]  kasan_report+0xdc/0x128
[   34.361789]  __asan_report_load8_noabort+0x20/0x30
[   34.362184]  kasan_atomics_helper+0x3e20/0x4858
[   34.362429]  kasan_atomics+0x198/0x2e0
[   34.362554]  kunit_try_run_case+0x170/0x3f0
[   34.363324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.363639]  kthread+0x328/0x630
[   34.363779]  ret_from_fork+0x10/0x20
[   34.364004] 
[   34.364059] Allocated by task 276:
[   34.364227]  kasan_save_stack+0x3c/0x68
[   34.364576]  kasan_save_track+0x20/0x40
[   34.364928]  kasan_save_alloc_info+0x40/0x58
[   34.365043]  __kasan_kmalloc+0xd4/0xd8
[   34.365559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.365694]  kasan_atomics+0xb8/0x2e0
[   34.365778]  kunit_try_run_case+0x170/0x3f0
[   34.365861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.365977]  kthread+0x328/0x630
[   34.366522]  ret_from_fork+0x10/0x20
[   34.366651] 
[   34.367107] The buggy address belongs to the object at fff00000c76a3180
[   34.367107]  which belongs to the cache kmalloc-64 of size 64
[   34.367296] The buggy address is located 0 bytes to the right of
[   34.367296]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.368033] 
[   34.368103] The buggy address belongs to the physical page:
[   34.368204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.368348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.368808] page_type: f5(slab)
[   34.368952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.369694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.369825] page dumped because: kasan: bad access detected
[   34.369916] 
[   34.369969] Memory state around the buggy address:
[   34.370149]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.370269]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.370384] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.370509]                                      ^
[   34.370606]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.370735]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.370845] ==================================================================
[   34.070170] ==================================================================
[   34.070597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   34.070794] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.070959] 
[   34.071045] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.071253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.071363] Hardware name: linux,dummy-virt (DT)
[   34.071498] Call trace:
[   34.071566]  show_stack+0x20/0x38 (C)
[   34.071697]  dump_stack_lvl+0x8c/0xd0
[   34.071822]  print_report+0x118/0x608
[   34.071946]  kasan_report+0xdc/0x128
[   34.072063]  kasan_check_range+0x100/0x1a8
[   34.072188]  __kasan_check_write+0x20/0x30
[   34.072303]  kasan_atomics_helper+0xeb8/0x4858
[   34.072436]  kasan_atomics+0x198/0x2e0
[   34.072557]  kunit_try_run_case+0x170/0x3f0
[   34.072679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.072817]  kthread+0x328/0x630
[   34.072948]  ret_from_fork+0x10/0x20
[   34.073077] 
[   34.073134] Allocated by task 276:
[   34.073212]  kasan_save_stack+0x3c/0x68
[   34.073321]  kasan_save_track+0x20/0x40
[   34.073727]  kasan_save_alloc_info+0x40/0x58
[   34.074346]  __kasan_kmalloc+0xd4/0xd8
[   34.074732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.074833]  kasan_atomics+0xb8/0x2e0
[   34.074952]  kunit_try_run_case+0x170/0x3f0
[   34.075077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.075245]  kthread+0x328/0x630
[   34.075371]  ret_from_fork+0x10/0x20
[   34.075509] 
[   34.075809] The buggy address belongs to the object at fff00000c76a3180
[   34.075809]  which belongs to the cache kmalloc-64 of size 64
[   34.075970] The buggy address is located 0 bytes to the right of
[   34.075970]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.076312] 
[   34.076425] The buggy address belongs to the physical page:
[   34.076527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.076924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.077070] page_type: f5(slab)
[   34.077310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.077648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.077764] page dumped because: kasan: bad access detected
[   34.077945] 
[   34.078105] Memory state around the buggy address:
[   34.078323]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.078464]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.078560] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.078654]                                      ^
[   34.078745]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.079139]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.079354] ==================================================================
[   33.934809] ==================================================================
[   33.934967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   33.935110] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   33.936268] 
[   33.936367] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   33.937307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.937520] Hardware name: linux,dummy-virt (DT)
[   33.937608] Call trace:
[   33.937674]  show_stack+0x20/0x38 (C)
[   33.937809]  dump_stack_lvl+0x8c/0xd0
[   33.940009]  kasan_atomics+0x198/0x2e0
[   33.942336]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.942889]  ret_from_fork+0x10/0x20
[   33.943670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   33.943858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.943986] page_type: f5(slab)
[   33.944208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.944797] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.945011]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.948274]  kunit_try_run_case+0x170/0x3f0
[   33.950540] The buggy address belongs to the physical page:
[   33.950755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.950917] page_type: f5(slab)
[   33.951297] page dumped because: kasan: bad access detected
[   33.952049]                                      ^
[   33.952140]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.952318] ==================================================================
[   34.246294] ==================================================================
[   34.246420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   34.246547] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.246730] 
[   34.246819] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.247121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.247210] Hardware name: linux,dummy-virt (DT)
[   34.247287] Call trace:
[   34.247349]  show_stack+0x20/0x38 (C)
[   34.247770]  dump_stack_lvl+0x8c/0xd0
[   34.247957]  print_report+0x118/0x608
[   34.248090]  kasan_report+0xdc/0x128
[   34.248211]  kasan_check_range+0x100/0x1a8
[   34.248335]  __kasan_check_write+0x20/0x30
[   34.248449]  kasan_atomics_helper+0x14e4/0x4858
[   34.248589]  kasan_atomics+0x198/0x2e0
[   34.248710]  kunit_try_run_case+0x170/0x3f0
[   34.249088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.249247]  kthread+0x328/0x630
[   34.249453]  ret_from_fork+0x10/0x20
[   34.249578] 
[   34.249629] Allocated by task 276:
[   34.249998]  kasan_save_stack+0x3c/0x68
[   34.250165]  kasan_save_track+0x20/0x40
[   34.250307]  kasan_save_alloc_info+0x40/0x58
[   34.250413]  __kasan_kmalloc+0xd4/0xd8
[   34.250493]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.250600]  kasan_atomics+0xb8/0x2e0
[   34.250691]  kunit_try_run_case+0x170/0x3f0
[   34.250993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.251120]  kthread+0x328/0x630
[   34.251233]  ret_from_fork+0x10/0x20
[   34.251465] 
[   34.251559] The buggy address belongs to the object at fff00000c76a3180
[   34.251559]  which belongs to the cache kmalloc-64 of size 64
[   34.251788] The buggy address is located 0 bytes to the right of
[   34.251788]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.252021] 
[   34.252086] The buggy address belongs to the physical page:
[   34.252172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.252307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.252443] page_type: f5(slab)
[   34.252551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.252744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.252902] page dumped because: kasan: bad access detected
[   34.252978] 
[   34.253032] Memory state around the buggy address:
[   34.253112]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.253239]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.253723] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.253906]                                      ^
[   34.254136]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.254323]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.254665] ==================================================================
[   34.375374] ==================================================================
[   34.375511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   34.375892] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.376132] 
[   34.376748] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.377005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.377257] Hardware name: linux,dummy-virt (DT)
[   34.377352] Call trace:
[   34.377587]  show_stack+0x20/0x38 (C)
[   34.377833]  dump_stack_lvl+0x8c/0xd0
[   34.378458]  print_report+0x118/0x608
[   34.378601]  kasan_report+0xdc/0x128
[   34.378994]  kasan_check_range+0x100/0x1a8
[   34.379297]  __kasan_check_write+0x20/0x30
[   34.379819]  kasan_atomics_helper+0x17ec/0x4858
[   34.380215]  kasan_atomics+0x198/0x2e0
[   34.380570]  kunit_try_run_case+0x170/0x3f0
[   34.381067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.381341]  kthread+0x328/0x630
[   34.381523]  ret_from_fork+0x10/0x20
[   34.381718] 
[   34.381788] Allocated by task 276:
[   34.381937]  kasan_save_stack+0x3c/0x68
[   34.382098]  kasan_save_track+0x20/0x40
[   34.382371]  kasan_save_alloc_info+0x40/0x58
[   34.382489]  __kasan_kmalloc+0xd4/0xd8
[   34.382633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.382741]  kasan_atomics+0xb8/0x2e0
[   34.382839]  kunit_try_run_case+0x170/0x3f0
[   34.383518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.383987]  kthread+0x328/0x630
[   34.384115]  ret_from_fork+0x10/0x20
[   34.384268] 
[   34.384341] The buggy address belongs to the object at fff00000c76a3180
[   34.384341]  which belongs to the cache kmalloc-64 of size 64
[   34.384898] The buggy address is located 0 bytes to the right of
[   34.384898]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.385063] 
[   34.385145] The buggy address belongs to the physical page:
[   34.385449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.386002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.386134] page_type: f5(slab)
[   34.386763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.386930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.387406] page dumped because: kasan: bad access detected
[   34.387500] 
[   34.387557] Memory state around the buggy address:
[   34.387870]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.388354]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.388946] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.389068]                                      ^
[   34.389178]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.389359]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.389703] ==================================================================
[   34.111973] ==================================================================
[   34.112127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   34.112364] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.112667] 
[   34.112949] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.113390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.113644] Hardware name: linux,dummy-virt (DT)
[   34.113747] Call trace:
[   34.113814]  show_stack+0x20/0x38 (C)
[   34.114235]  dump_stack_lvl+0x8c/0xd0
[   34.114687]  print_report+0x118/0x608
[   34.114926]  kasan_report+0xdc/0x128
[   34.115048]  kasan_check_range+0x100/0x1a8
[   34.115147]  __kasan_check_write+0x20/0x30
[   34.115521]  kasan_atomics_helper+0x1058/0x4858
[   34.116038]  kasan_atomics+0x198/0x2e0
[   34.116545]  kunit_try_run_case+0x170/0x3f0
[   34.116761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.117123]  kthread+0x328/0x630
[   34.117241]  ret_from_fork+0x10/0x20
[   34.117367] 
[   34.117417] Allocated by task 276:
[   34.117491]  kasan_save_stack+0x3c/0x68
[   34.117906]  kasan_save_track+0x20/0x40
[   34.118163]  kasan_save_alloc_info+0x40/0x58
[   34.118492]  __kasan_kmalloc+0xd4/0xd8
[   34.118841]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.119093]  kasan_atomics+0xb8/0x2e0
[   34.119195]  kunit_try_run_case+0x170/0x3f0
[   34.119299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.119778]  kthread+0x328/0x630
[   34.120084]  ret_from_fork+0x10/0x20
[   34.120325] 
[   34.120494] The buggy address belongs to the object at fff00000c76a3180
[   34.120494]  which belongs to the cache kmalloc-64 of size 64
[   34.120913] The buggy address is located 0 bytes to the right of
[   34.120913]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.121243] 
[   34.121567] The buggy address belongs to the physical page:
[   34.121674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.121826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.121967] page_type: f5(slab)
[   34.122255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.122830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.123002] page dumped because: kasan: bad access detected
[   34.123099] 
[   34.123159] Memory state around the buggy address:
[   34.123251]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.123370]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.123486] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.123590]                                      ^
[   34.123678]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.123788]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.123901] ==================================================================
[   34.001243] ==================================================================
[   34.001372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   34.001544] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.001677] 
[   34.002121] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.002438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.002731] Hardware name: linux,dummy-virt (DT)
[   34.002953] Call trace:
[   34.003030]  show_stack+0x20/0x38 (C)
[   34.003163]  dump_stack_lvl+0x8c/0xd0
[   34.003515]  print_report+0x118/0x608
[   34.003937]  kasan_report+0xdc/0x128
[   34.004462]  kasan_check_range+0x100/0x1a8
[   34.004624]  __kasan_check_write+0x20/0x30
[   34.004744]  kasan_atomics_helper+0xd3c/0x4858
[   34.004889]  kasan_atomics+0x198/0x2e0
[   34.005081]  kunit_try_run_case+0x170/0x3f0
[   34.005270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.005451]  kthread+0x328/0x630
[   34.005556]  ret_from_fork+0x10/0x20
[   34.005682] 
[   34.005743] Allocated by task 276:
[   34.005927]  kasan_save_stack+0x3c/0x68
[   34.006305]  kasan_save_track+0x20/0x40
[   34.006507]  kasan_save_alloc_info+0x40/0x58
[   34.006608]  __kasan_kmalloc+0xd4/0xd8
[   34.006712]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.006802]  kasan_atomics+0xb8/0x2e0
[   34.006909]  kunit_try_run_case+0x170/0x3f0
[   34.007252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.007381]  kthread+0x328/0x630
[   34.007469]  ret_from_fork+0x10/0x20
[   34.007559] 
[   34.007617] The buggy address belongs to the object at fff00000c76a3180
[   34.007617]  which belongs to the cache kmalloc-64 of size 64
[   34.007773] The buggy address is located 0 bytes to the right of
[   34.007773]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.007955] 
[   34.008024] The buggy address belongs to the physical page:
[   34.008111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.008573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.008773] page_type: f5(slab)
[   34.008935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.009132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.009260] page dumped because: kasan: bad access detected
[   34.009347] 
[   34.009395] Memory state around the buggy address:
[   34.009505]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.009615]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.009961] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.010067]                                      ^
[   34.010160]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.010278]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.010379] ==================================================================
[   34.197379] ==================================================================
[   34.197851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   34.198185] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.198329] 
[   34.198411] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.198964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.199050] Hardware name: linux,dummy-virt (DT)
[   34.199304] Call trace:
[   34.199635]  show_stack+0x20/0x38 (C)
[   34.200031]  dump_stack_lvl+0x8c/0xd0
[   34.200275]  print_report+0x118/0x608
[   34.200472]  kasan_report+0xdc/0x128
[   34.200587]  kasan_check_range+0x100/0x1a8
[   34.201012]  __kasan_check_write+0x20/0x30
[   34.201791]  kasan_atomics_helper+0x1384/0x4858
[   34.201930]  kasan_atomics+0x198/0x2e0
[   34.202067]  kunit_try_run_case+0x170/0x3f0
[   34.202178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.202316]  kthread+0x328/0x630
[   34.202440]  ret_from_fork+0x10/0x20
[   34.202578] 
[   34.202633] Allocated by task 276:
[   34.202708]  kasan_save_stack+0x3c/0x68
[   34.203199]  kasan_save_track+0x20/0x40
[   34.203718]  kasan_save_alloc_info+0x40/0x58
[   34.203983]  __kasan_kmalloc+0xd4/0xd8
[   34.204087]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.204184]  kasan_atomics+0xb8/0x2e0
[   34.204556]  kunit_try_run_case+0x170/0x3f0
[   34.204684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.204817]  kthread+0x328/0x630
[   34.204915]  ret_from_fork+0x10/0x20
[   34.205015] 
[   34.205285] The buggy address belongs to the object at fff00000c76a3180
[   34.205285]  which belongs to the cache kmalloc-64 of size 64
[   34.205672] The buggy address is located 0 bytes to the right of
[   34.205672]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.205837] 
[   34.205905] The buggy address belongs to the physical page:
[   34.205991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.206182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.206382] page_type: f5(slab)
[   34.206507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.207268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.207524] page dumped because: kasan: bad access detected
[   34.207720] 
[   34.207976] Memory state around the buggy address:
[   34.208165]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.208550]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.208838] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.208982]                                      ^
[   34.209159]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.209437]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.209531] ==================================================================
[   34.153900] ==================================================================
[   34.154021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   34.154199] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276
[   34.154372] 
[   34.154502] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250619 #1 PREEMPT 
[   34.154808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.155465] Hardware name: linux,dummy-virt (DT)
[   34.155671] Call trace:
[   34.155728]  show_stack+0x20/0x38 (C)
[   34.155842]  dump_stack_lvl+0x8c/0xd0
[   34.156007]  print_report+0x118/0x608
[   34.156345]  kasan_report+0xdc/0x128
[   34.156465]  kasan_check_range+0x100/0x1a8
[   34.156631]  __kasan_check_write+0x20/0x30
[   34.156852]  kasan_atomics_helper+0x1190/0x4858
[   34.157375]  kasan_atomics+0x198/0x2e0
[   34.157536]  kunit_try_run_case+0x170/0x3f0
[   34.157671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.157894]  kthread+0x328/0x630
[   34.158111]  ret_from_fork+0x10/0x20
[   34.158494] 
[   34.158598] Allocated by task 276:
[   34.158668]  kasan_save_stack+0x3c/0x68
[   34.158757]  kasan_save_track+0x20/0x40
[   34.159028]  kasan_save_alloc_info+0x40/0x58
[   34.159149]  __kasan_kmalloc+0xd4/0xd8
[   34.159403]  __kmalloc_cache_noprof+0x16c/0x3c0
[   34.159623]  kasan_atomics+0xb8/0x2e0
[   34.159735]  kunit_try_run_case+0x170/0x3f0
[   34.160087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.160373]  kthread+0x328/0x630
[   34.160462]  ret_from_fork+0x10/0x20
[   34.160552] 
[   34.160610] The buggy address belongs to the object at fff00000c76a3180
[   34.160610]  which belongs to the cache kmalloc-64 of size 64
[   34.161010] The buggy address is located 0 bytes to the right of
[   34.161010]  allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0)
[   34.161229] 
[   34.161381] The buggy address belongs to the physical page:
[   34.161698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3
[   34.161943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.162088] page_type: f5(slab)
[   34.162189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.162293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.162609] page dumped because: kasan: bad access detected
[   34.162818] 
[   34.162905] Memory state around the buggy address:
[   34.163117]  fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.163514]  fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.163715] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.163822]                                      ^
[   34.163917]  fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.164020]  fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.164125] ==================================================================