Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   61.350118] ==================================================================
[   61.357428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   61.364832] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   61.372320] 
[   61.373846] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   61.373875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.373883] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.373894] Call trace:
[   61.373899]  show_stack+0x20/0x38 (C)
[   61.373916]  dump_stack_lvl+0x8c/0xd0
[   61.373935]  print_report+0x118/0x608
[   61.373953]  kasan_report+0xdc/0x128
[   61.373972]  kasan_check_range+0x100/0x1a8
[   61.373992]  __kasan_check_write+0x20/0x30
[   61.374007]  kasan_atomics_helper+0x6ec/0x4858
[   61.374024]  kasan_atomics+0x198/0x2e0
[   61.374041]  kunit_try_run_case+0x170/0x3f0
[   61.374059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.374081]  kthread+0x328/0x630
[   61.374095]  ret_from_fork+0x10/0x20
[   61.374111] 
[   61.447277] Allocated by task 363:
[   61.450732]  kasan_save_stack+0x3c/0x68
[   61.454630]  kasan_save_track+0x20/0x40
[   61.458526]  kasan_save_alloc_info+0x40/0x58
[   61.462864]  __kasan_kmalloc+0xd4/0xd8
[   61.466675]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.471277]  kasan_atomics+0xb8/0x2e0
[   61.474998]  kunit_try_run_case+0x170/0x3f0
[   61.479251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.484820]  kthread+0x328/0x630
[   61.488107]  ret_from_fork+0x10/0x20
[   61.491740] 
[   61.493263] The buggy address belongs to the object at ffff000080acff00
[   61.493263]  which belongs to the cache kmalloc-64 of size 64
[   61.505740] The buggy address is located 0 bytes to the right of
[   61.505740]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   61.518741] 
[   61.520276] The buggy address belongs to the physical page:
[   61.525921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   61.534026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.540633] page_type: f5(slab)
[   61.543832] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.551671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.559503] page dumped because: kasan: bad access detected
[   61.565149] 
[   61.566672] Memory state around the buggy address:
[   61.571529]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.578841]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.586154] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.593463]                                      ^
[   61.598318]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.605630]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.612940] ==================================================================
[   66.196670] ==================================================================
[   66.203980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   66.211471] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   66.218871] 
[   66.220396] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   66.220427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.220435] Hardware name: Thundercomm Dragonboard 845c (DT)
[   66.220445] Call trace:
[   66.220451]  show_stack+0x20/0x38 (C)
[   66.220468]  dump_stack_lvl+0x8c/0xd0
[   66.220486]  print_report+0x118/0x608
[   66.220504]  kasan_report+0xdc/0x128
[   66.220523]  __asan_report_load4_noabort+0x20/0x30
[   66.220540]  kasan_atomics_helper+0x3e04/0x4858
[   66.220558]  kasan_atomics+0x198/0x2e0
[   66.220574]  kunit_try_run_case+0x170/0x3f0
[   66.220591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.220612]  kthread+0x328/0x630
[   66.220627]  ret_from_fork+0x10/0x20
[   66.220643] 
[   66.290439] Allocated by task 363:
[   66.293895]  kasan_save_stack+0x3c/0x68
[   66.297794]  kasan_save_track+0x20/0x40
[   66.301692]  kasan_save_alloc_info+0x40/0x58
[   66.306030]  __kasan_kmalloc+0xd4/0xd8
[   66.309839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.314440]  kasan_atomics+0xb8/0x2e0
[   66.318161]  kunit_try_run_case+0x170/0x3f0
[   66.322415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.327984]  kthread+0x328/0x630
[   66.331269]  ret_from_fork+0x10/0x20
[   66.334903] 
[   66.336426] The buggy address belongs to the object at ffff000080acff00
[   66.336426]  which belongs to the cache kmalloc-64 of size 64
[   66.348902] The buggy address is located 0 bytes to the right of
[   66.348902]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   66.361903] 
[   66.363427] The buggy address belongs to the physical page:
[   66.369071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   66.377177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.383783] page_type: f5(slab)
[   66.386981] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.394817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.402648] page dumped because: kasan: bad access detected
[   66.408293] 
[   66.409816] Memory state around the buggy address:
[   66.414670]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.421981]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.429293] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.436602]                                      ^
[   66.441458]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.448769]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.456078] ==================================================================
[   72.399561] ==================================================================
[   72.406873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   72.414364] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   72.421766] 
[   72.423290] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   72.423320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.423329] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.423338] Call trace:
[   72.423345]  show_stack+0x20/0x38 (C)
[   72.423362]  dump_stack_lvl+0x8c/0xd0
[   72.423380]  print_report+0x118/0x608
[   72.423399]  kasan_report+0xdc/0x128
[   72.423419]  __asan_report_load8_noabort+0x20/0x30
[   72.423436]  kasan_atomics_helper+0x3db0/0x4858
[   72.423454]  kasan_atomics+0x198/0x2e0
[   72.423472]  kunit_try_run_case+0x170/0x3f0
[   72.423491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.423511]  kthread+0x328/0x630
[   72.423527]  ret_from_fork+0x10/0x20
[   72.423544] 
[   72.493342] Allocated by task 363:
[   72.496798]  kasan_save_stack+0x3c/0x68
[   72.500696]  kasan_save_track+0x20/0x40
[   72.504594]  kasan_save_alloc_info+0x40/0x58
[   72.508933]  __kasan_kmalloc+0xd4/0xd8
[   72.512741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.517343]  kasan_atomics+0xb8/0x2e0
[   72.521064]  kunit_try_run_case+0x170/0x3f0
[   72.525317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.530887]  kthread+0x328/0x630
[   72.534173]  ret_from_fork+0x10/0x20
[   72.537808] 
[   72.539331] The buggy address belongs to the object at ffff000080acff00
[   72.539331]  which belongs to the cache kmalloc-64 of size 64
[   72.551809] The buggy address is located 0 bytes to the right of
[   72.551809]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   72.564810] 
[   72.566333] The buggy address belongs to the physical page:
[   72.571979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   72.580086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.586694] page_type: f5(slab)
[   72.589893] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.597730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.605563] page dumped because: kasan: bad access detected
[   72.611210] 
[   72.612733] Memory state around the buggy address:
[   72.617587]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.624900]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.632212] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.639522]                                      ^
[   72.644379]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.651690]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.659000] ==================================================================
[   58.384768] ==================================================================
[   58.392084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   58.399580] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   58.406978] 
[   58.408510] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   58.408539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.408547] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.408557] Call trace:
[   58.408563]  show_stack+0x20/0x38 (C)
[   58.408579]  dump_stack_lvl+0x8c/0xd0
[   58.408598]  print_report+0x118/0x608
[   58.408617]  kasan_report+0xdc/0x128
[   58.408636]  __asan_report_load4_noabort+0x20/0x30
[   58.408651]  kasan_atomics_helper+0x40fc/0x4858
[   58.408669]  kasan_atomics+0x198/0x2e0
[   58.408687]  kunit_try_run_case+0x170/0x3f0
[   58.408704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.408726]  kthread+0x328/0x630
[   58.408739]  ret_from_fork+0x10/0x20
[   58.408756] 
[   58.478546] Allocated by task 363:
[   58.481997]  kasan_save_stack+0x3c/0x68
[   58.485894]  kasan_save_track+0x20/0x40
[   58.489799]  kasan_save_alloc_info+0x40/0x58
[   58.494137]  __kasan_kmalloc+0xd4/0xd8
[   58.497952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.502552]  kasan_atomics+0xb8/0x2e0
[   58.506279]  kunit_try_run_case+0x170/0x3f0
[   58.510530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.516095]  kthread+0x328/0x630
[   58.519377]  ret_from_fork+0x10/0x20
[   58.523011] 
[   58.524543] The buggy address belongs to the object at ffff000080acff00
[   58.524543]  which belongs to the cache kmalloc-64 of size 64
[   58.537021] The buggy address is located 0 bytes to the right of
[   58.537021]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   58.550023] 
[   58.551554] The buggy address belongs to the physical page:
[   58.557197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   58.565298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.571907] page_type: f5(slab)
[   58.575105] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.582947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.590784] page dumped because: kasan: bad access detected
[   58.596423] 
[   58.597945] Memory state around the buggy address:
[   58.602806]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.610123]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.617440] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.624755]                                      ^
[   58.629610]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.636916]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   58.644230] ==================================================================
[   59.999242] ==================================================================
[   60.006552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   60.013956] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   60.021445] 
[   60.022971] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   60.023001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.023008] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.023018] Call trace:
[   60.023024]  show_stack+0x20/0x38 (C)
[   60.023041]  dump_stack_lvl+0x8c/0xd0
[   60.023058]  print_report+0x118/0x608
[   60.023077]  kasan_report+0xdc/0x128
[   60.023095]  kasan_check_range+0x100/0x1a8
[   60.023114]  __kasan_check_write+0x20/0x30
[   60.023129]  kasan_atomics_helper+0x4e4/0x4858
[   60.023147]  kasan_atomics+0x198/0x2e0
[   60.023164]  kunit_try_run_case+0x170/0x3f0
[   60.023182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.023202]  kthread+0x328/0x630
[   60.023217]  ret_from_fork+0x10/0x20
[   60.023233] 
[   60.096395] Allocated by task 363:
[   60.099851]  kasan_save_stack+0x3c/0x68
[   60.103749]  kasan_save_track+0x20/0x40
[   60.107646]  kasan_save_alloc_info+0x40/0x58
[   60.111984]  __kasan_kmalloc+0xd4/0xd8
[   60.115792]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.120394]  kasan_atomics+0xb8/0x2e0
[   60.124116]  kunit_try_run_case+0x170/0x3f0
[   60.128368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.133937]  kthread+0x328/0x630
[   60.137223]  ret_from_fork+0x10/0x20
[   60.140859] 
[   60.142383] The buggy address belongs to the object at ffff000080acff00
[   60.142383]  which belongs to the cache kmalloc-64 of size 64
[   60.154861] The buggy address is located 0 bytes to the right of
[   60.154861]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   60.167862] 
[   60.169385] The buggy address belongs to the physical page:
[   60.175031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   60.183137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.189745] page_type: f5(slab)
[   60.192946] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   60.200782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.208613] page dumped because: kasan: bad access detected
[   60.214260] 
[   60.215783] Memory state around the buggy address:
[   60.220639]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.227951]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.235263] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.242571]                                      ^
[   60.247428]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.254738]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.262049] ==================================================================
[   64.315559] ==================================================================
[   64.322870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   64.330275] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   64.337764] 
[   64.339289] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   64.339318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.339328] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.339337] Call trace:
[   64.339343]  show_stack+0x20/0x38 (C)
[   64.339360]  dump_stack_lvl+0x8c/0xd0
[   64.339378]  print_report+0x118/0x608
[   64.339398]  kasan_report+0xdc/0x128
[   64.339418]  kasan_check_range+0x100/0x1a8
[   64.339438]  __kasan_check_write+0x20/0x30
[   64.339454]  kasan_atomics_helper+0xb70/0x4858
[   64.339471]  kasan_atomics+0x198/0x2e0
[   64.339488]  kunit_try_run_case+0x170/0x3f0
[   64.339506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.339527]  kthread+0x328/0x630
[   64.339541]  ret_from_fork+0x10/0x20
[   64.339557] 
[   64.412733] Allocated by task 363:
[   64.416190]  kasan_save_stack+0x3c/0x68
[   64.420089]  kasan_save_track+0x20/0x40
[   64.423987]  kasan_save_alloc_info+0x40/0x58
[   64.428324]  __kasan_kmalloc+0xd4/0xd8
[   64.432135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.436736]  kasan_atomics+0xb8/0x2e0
[   64.440457]  kunit_try_run_case+0x170/0x3f0
[   64.444710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.450279]  kthread+0x328/0x630
[   64.453564]  ret_from_fork+0x10/0x20
[   64.457200] 
[   64.458722] The buggy address belongs to the object at ffff000080acff00
[   64.458722]  which belongs to the cache kmalloc-64 of size 64
[   64.471200] The buggy address is located 0 bytes to the right of
[   64.471200]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   64.484203] 
[   64.485725] The buggy address belongs to the physical page:
[   64.491372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   64.499478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.506084] page_type: f5(slab)
[   64.509283] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.517120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.524952] page dumped because: kasan: bad access detected
[   64.530599] 
[   64.532122] Memory state around the buggy address:
[   64.536978]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.544290]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.551603] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.558914]                                      ^
[   64.563770]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.571081]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.578391] ==================================================================
[   62.697717] ==================================================================
[   62.705027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   62.712431] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   62.719920] 
[   62.721456] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   62.721484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.721491] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.721501] Call trace:
[   62.721507]  show_stack+0x20/0x38 (C)
[   62.721525]  dump_stack_lvl+0x8c/0xd0
[   62.721542]  print_report+0x118/0x608
[   62.721560]  kasan_report+0xdc/0x128
[   62.721579]  kasan_check_range+0x100/0x1a8
[   62.721599]  __kasan_check_write+0x20/0x30
[   62.721616]  kasan_atomics_helper+0x934/0x4858
[   62.721634]  kasan_atomics+0x198/0x2e0
[   62.721652]  kunit_try_run_case+0x170/0x3f0
[   62.721669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.721689]  kthread+0x328/0x630
[   62.721702]  ret_from_fork+0x10/0x20
[   62.721719] 
[   62.794874] Allocated by task 363:
[   62.798331]  kasan_save_stack+0x3c/0x68
[   62.802229]  kasan_save_track+0x20/0x40
[   62.806126]  kasan_save_alloc_info+0x40/0x58
[   62.810465]  __kasan_kmalloc+0xd4/0xd8
[   62.814274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.818876]  kasan_atomics+0xb8/0x2e0
[   62.822596]  kunit_try_run_case+0x170/0x3f0
[   62.826849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.832418]  kthread+0x328/0x630
[   62.835704]  ret_from_fork+0x10/0x20
[   62.839339] 
[   62.840861] The buggy address belongs to the object at ffff000080acff00
[   62.840861]  which belongs to the cache kmalloc-64 of size 64
[   62.853339] The buggy address is located 0 bytes to the right of
[   62.853339]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   62.866341] 
[   62.867865] The buggy address belongs to the physical page:
[   62.873511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   62.881619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.888227] page_type: f5(slab)
[   62.891426] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.899263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.907096] page dumped because: kasan: bad access detected
[   62.912742] 
[   62.914265] Memory state around the buggy address:
[   62.919119]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.926431]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.933742] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.941051]                                      ^
[   62.945907]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.953220]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.960528] ==================================================================
[   68.347895] ==================================================================
[   68.355204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   68.362607] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   68.370095] 
[   68.371620] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   68.371648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.371657] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.371666] Call trace:
[   68.371673]  show_stack+0x20/0x38 (C)
[   68.371690]  dump_stack_lvl+0x8c/0xd0
[   68.371707]  print_report+0x118/0x608
[   68.371725]  kasan_report+0xdc/0x128
[   68.371745]  kasan_check_range+0x100/0x1a8
[   68.371766]  __kasan_check_write+0x20/0x30
[   68.371781]  kasan_atomics_helper+0xff0/0x4858
[   68.371800]  kasan_atomics+0x198/0x2e0
[   68.371817]  kunit_try_run_case+0x170/0x3f0
[   68.371836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.371857]  kthread+0x328/0x630
[   68.371871]  ret_from_fork+0x10/0x20
[   68.371887] 
[   68.445051] Allocated by task 363:
[   68.448507]  kasan_save_stack+0x3c/0x68
[   68.452406]  kasan_save_track+0x20/0x40
[   68.456303]  kasan_save_alloc_info+0x40/0x58
[   68.460641]  __kasan_kmalloc+0xd4/0xd8
[   68.464450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.469054]  kasan_atomics+0xb8/0x2e0
[   68.472775]  kunit_try_run_case+0x170/0x3f0
[   68.477028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.482597]  kthread+0x328/0x630
[   68.485884]  ret_from_fork+0x10/0x20
[   68.489518] 
[   68.491041] The buggy address belongs to the object at ffff000080acff00
[   68.491041]  which belongs to the cache kmalloc-64 of size 64
[   68.503519] The buggy address is located 0 bytes to the right of
[   68.503519]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   68.516519] 
[   68.518043] The buggy address belongs to the physical page:
[   68.523689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   68.531796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.538401] page_type: f5(slab)
[   68.541601] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.549436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.557268] page dumped because: kasan: bad access detected
[   68.562914] 
[   68.564437] Memory state around the buggy address:
[   68.569292]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.576604]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.583916] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.591227]                                      ^
[   68.596082]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.603395]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   68.610704] ==================================================================
[   61.620303] ==================================================================
[   61.627615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   61.635020] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   61.642510] 
[   61.644036] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   61.644066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.644076] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.644086] Call trace:
[   61.644093]  show_stack+0x20/0x38 (C)
[   61.644110]  dump_stack_lvl+0x8c/0xd0
[   61.644128]  print_report+0x118/0x608
[   61.644148]  kasan_report+0xdc/0x128
[   61.644167]  kasan_check_range+0x100/0x1a8
[   61.644188]  __kasan_check_write+0x20/0x30
[   61.644204]  kasan_atomics_helper+0x760/0x4858
[   61.644223]  kasan_atomics+0x198/0x2e0
[   61.644240]  kunit_try_run_case+0x170/0x3f0
[   61.644259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.644281]  kthread+0x328/0x630
[   61.644295]  ret_from_fork+0x10/0x20
[   61.644311] 
[   61.717477] Allocated by task 363:
[   61.720933]  kasan_save_stack+0x3c/0x68
[   61.724831]  kasan_save_track+0x20/0x40
[   61.728728]  kasan_save_alloc_info+0x40/0x58
[   61.733066]  __kasan_kmalloc+0xd4/0xd8
[   61.736874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.741476]  kasan_atomics+0xb8/0x2e0
[   61.745199]  kunit_try_run_case+0x170/0x3f0
[   61.749452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.755020]  kthread+0x328/0x630
[   61.758306]  ret_from_fork+0x10/0x20
[   61.761940] 
[   61.763463] The buggy address belongs to the object at ffff000080acff00
[   61.763463]  which belongs to the cache kmalloc-64 of size 64
[   61.775940] The buggy address is located 0 bytes to the right of
[   61.775940]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   61.788943] 
[   61.790467] The buggy address belongs to the physical page:
[   61.796112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   61.804219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.810827] page_type: f5(slab)
[   61.814026] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.821863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.829696] page dumped because: kasan: bad access detected
[   61.835343] 
[   61.836866] Memory state around the buggy address:
[   61.841720]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.849034]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.856345] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.863656]                                      ^
[   61.868513]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.875824]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.883134] ==================================================================
[   72.129206] ==================================================================
[   72.136518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   72.144012] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   72.151501] 
[   72.153026] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   72.153055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.153063] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.153072] Call trace:
[   72.153078]  show_stack+0x20/0x38 (C)
[   72.153094]  dump_stack_lvl+0x8c/0xd0
[   72.153112]  print_report+0x118/0x608
[   72.153130]  kasan_report+0xdc/0x128
[   72.153149]  kasan_check_range+0x100/0x1a8
[   72.153169]  __kasan_check_write+0x20/0x30
[   72.153185]  kasan_atomics_helper+0x15b4/0x4858
[   72.153203]  kasan_atomics+0x198/0x2e0
[   72.153219]  kunit_try_run_case+0x170/0x3f0
[   72.153236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.153258]  kthread+0x328/0x630
[   72.153271]  ret_from_fork+0x10/0x20
[   72.153287] 
[   72.226542] Allocated by task 363:
[   72.229998]  kasan_save_stack+0x3c/0x68
[   72.233897]  kasan_save_track+0x20/0x40
[   72.237795]  kasan_save_alloc_info+0x40/0x58
[   72.242133]  __kasan_kmalloc+0xd4/0xd8
[   72.245942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.250544]  kasan_atomics+0xb8/0x2e0
[   72.254266]  kunit_try_run_case+0x170/0x3f0
[   72.258520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.264088]  kthread+0x328/0x630
[   72.267373]  ret_from_fork+0x10/0x20
[   72.271008] 
[   72.272530] The buggy address belongs to the object at ffff000080acff00
[   72.272530]  which belongs to the cache kmalloc-64 of size 64
[   72.285010] The buggy address is located 0 bytes to the right of
[   72.285010]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   72.298011] 
[   72.299534] The buggy address belongs to the physical page:
[   72.305179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   72.313287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.319893] page_type: f5(slab)
[   72.323093] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.330930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.338763] page dumped because: kasan: bad access detected
[   72.344409] 
[   72.345932] Memory state around the buggy address:
[   72.350787]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.358100]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.365412] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.372722]                                      ^
[   72.377578]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.384889]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.392198] ==================================================================
[   73.203536] ==================================================================
[   73.210847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   73.218337] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   73.225825] 
[   73.227350] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   73.227379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.227388] Hardware name: Thundercomm Dragonboard 845c (DT)
[   73.227398] Call trace:
[   73.227404]  show_stack+0x20/0x38 (C)
[   73.227421]  dump_stack_lvl+0x8c/0xd0
[   73.227440]  print_report+0x118/0x608
[   73.227458]  kasan_report+0xdc/0x128
[   73.227476]  kasan_check_range+0x100/0x1a8
[   73.227495]  __kasan_check_write+0x20/0x30
[   73.227510]  kasan_atomics_helper+0x16d0/0x4858
[   73.227529]  kasan_atomics+0x198/0x2e0
[   73.227546]  kunit_try_run_case+0x170/0x3f0
[   73.227564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.227583]  kthread+0x328/0x630
[   73.227597]  ret_from_fork+0x10/0x20
[   73.227613] 
[   73.300865] Allocated by task 363:
[   73.304321]  kasan_save_stack+0x3c/0x68
[   73.308220]  kasan_save_track+0x20/0x40
[   73.312118]  kasan_save_alloc_info+0x40/0x58
[   73.316456]  __kasan_kmalloc+0xd4/0xd8
[   73.320265]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.324868]  kasan_atomics+0xb8/0x2e0
[   73.328589]  kunit_try_run_case+0x170/0x3f0
[   73.332842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.338410]  kthread+0x328/0x630
[   73.341695]  ret_from_fork+0x10/0x20
[   73.345330] 
[   73.346853] The buggy address belongs to the object at ffff000080acff00
[   73.346853]  which belongs to the cache kmalloc-64 of size 64
[   73.359330] The buggy address is located 0 bytes to the right of
[   73.359330]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   73.372331] 
[   73.373854] The buggy address belongs to the physical page:
[   73.379499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   73.387605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.394211] page_type: f5(slab)
[   73.397411] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.405245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.413077] page dumped because: kasan: bad access detected
[   73.418723] 
[   73.420246] Memory state around the buggy address:
[   73.425101]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.432412]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.439723] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.447032]                                      ^
[   73.451887]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.459199]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.466508] ==================================================================
[   60.809766] ==================================================================
[   60.817075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   60.824479] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   60.831966] 
[   60.833492] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   60.833520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.833528] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.833538] Call trace:
[   60.833544]  show_stack+0x20/0x38 (C)
[   60.833562]  dump_stack_lvl+0x8c/0xd0
[   60.833580]  print_report+0x118/0x608
[   60.833598]  kasan_report+0xdc/0x128
[   60.833616]  kasan_check_range+0x100/0x1a8
[   60.833637]  __kasan_check_write+0x20/0x30
[   60.833652]  kasan_atomics_helper+0x61c/0x4858
[   60.833670]  kasan_atomics+0x198/0x2e0
[   60.833687]  kunit_try_run_case+0x170/0x3f0
[   60.833705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.833727]  kthread+0x328/0x630
[   60.833740]  ret_from_fork+0x10/0x20
[   60.833756] 
[   60.906920] Allocated by task 363:
[   60.910376]  kasan_save_stack+0x3c/0x68
[   60.914274]  kasan_save_track+0x20/0x40
[   60.918172]  kasan_save_alloc_info+0x40/0x58
[   60.922510]  __kasan_kmalloc+0xd4/0xd8
[   60.926319]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.930919]  kasan_atomics+0xb8/0x2e0
[   60.934641]  kunit_try_run_case+0x170/0x3f0
[   60.938895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.944464]  kthread+0x328/0x630
[   60.947749]  ret_from_fork+0x10/0x20
[   60.951383] 
[   60.952906] The buggy address belongs to the object at ffff000080acff00
[   60.952906]  which belongs to the cache kmalloc-64 of size 64
[   60.965385] The buggy address is located 0 bytes to the right of
[   60.965385]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   60.978387] 
[   60.979909] The buggy address belongs to the physical page:
[   60.985555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   60.993660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.000267] page_type: f5(slab)
[   61.003467] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.011303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.019135] page dumped because: kasan: bad access detected
[   61.024781] 
[   61.026303] Memory state around the buggy address:
[   61.031159]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.038472]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.045783] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.053092]                                      ^
[   61.057947]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.065258]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.072569] ==================================================================
[   73.473868] ==================================================================
[   73.481179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   73.488670] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   73.496071] 
[   73.497596] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   73.497624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.497632] Hardware name: Thundercomm Dragonboard 845c (DT)
[   73.497641] Call trace:
[   73.497647]  show_stack+0x20/0x38 (C)
[   73.497665]  dump_stack_lvl+0x8c/0xd0
[   73.497684]  print_report+0x118/0x608
[   73.497703]  kasan_report+0xdc/0x128
[   73.497722]  __asan_report_load8_noabort+0x20/0x30
[   73.497739]  kasan_atomics_helper+0x3e10/0x4858
[   73.497757]  kasan_atomics+0x198/0x2e0
[   73.497774]  kunit_try_run_case+0x170/0x3f0
[   73.497792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.497812]  kthread+0x328/0x630
[   73.497825]  ret_from_fork+0x10/0x20
[   73.497842] 
[   73.567640] Allocated by task 363:
[   73.571095]  kasan_save_stack+0x3c/0x68
[   73.574995]  kasan_save_track+0x20/0x40
[   73.578891]  kasan_save_alloc_info+0x40/0x58
[   73.583229]  __kasan_kmalloc+0xd4/0xd8
[   73.587037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.591639]  kasan_atomics+0xb8/0x2e0
[   73.595361]  kunit_try_run_case+0x170/0x3f0
[   73.599613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.605181]  kthread+0x328/0x630
[   73.608467]  ret_from_fork+0x10/0x20
[   73.612101] 
[   73.613623] The buggy address belongs to the object at ffff000080acff00
[   73.613623]  which belongs to the cache kmalloc-64 of size 64
[   73.626100] The buggy address is located 0 bytes to the right of
[   73.626100]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   73.639099] 
[   73.640622] The buggy address belongs to the physical page:
[   73.646267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   73.654372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.660979] page_type: f5(slab)
[   73.664178] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.672013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.679844] page dumped because: kasan: bad access detected
[   73.685489] 
[   73.687011] Memory state around the buggy address:
[   73.691865]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.699175]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.706486] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.713794]                                      ^
[   73.718650]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.725960]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.733269] ==================================================================
[   74.010951] ==================================================================
[   74.018262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   74.025751] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   74.033153] 
[   74.034688] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   74.034717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.034725] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.034735] Call trace:
[   74.034741]  show_stack+0x20/0x38 (C)
[   74.034758]  dump_stack_lvl+0x8c/0xd0
[   74.034776]  print_report+0x118/0x608
[   74.034794]  kasan_report+0xdc/0x128
[   74.034812]  __asan_report_load8_noabort+0x20/0x30
[   74.034828]  kasan_atomics_helper+0x3e20/0x4858
[   74.034847]  kasan_atomics+0x198/0x2e0
[   74.034864]  kunit_try_run_case+0x170/0x3f0
[   74.034881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.034902]  kthread+0x328/0x630
[   74.034915]  ret_from_fork+0x10/0x20
[   74.034932] 
[   74.104729] Allocated by task 363:
[   74.108184]  kasan_save_stack+0x3c/0x68
[   74.112083]  kasan_save_track+0x20/0x40
[   74.115980]  kasan_save_alloc_info+0x40/0x58
[   74.120318]  __kasan_kmalloc+0xd4/0xd8
[   74.124127]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.128728]  kasan_atomics+0xb8/0x2e0
[   74.132449]  kunit_try_run_case+0x170/0x3f0
[   74.136702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.142271]  kthread+0x328/0x630
[   74.145557]  ret_from_fork+0x10/0x20
[   74.149191] 
[   74.150714] The buggy address belongs to the object at ffff000080acff00
[   74.150714]  which belongs to the cache kmalloc-64 of size 64
[   74.163190] The buggy address is located 0 bytes to the right of
[   74.163190]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   74.176190] 
[   74.177713] The buggy address belongs to the physical page:
[   74.183359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   74.191465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.198072] page_type: f5(slab)
[   74.201271] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   74.209108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.216939] page dumped because: kasan: bad access detected
[   74.222584] 
[   74.224107] Memory state around the buggy address:
[   74.228962]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.236273]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.243585] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.250893]                                      ^
[   74.255749]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.263059]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.270368] ==================================================================
[   74.277740] ==================================================================
[   74.285051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   74.292541] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   74.300028] 
[   74.301553] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   74.301582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.301590] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.301600] Call trace:
[   74.301606]  show_stack+0x20/0x38 (C)
[   74.301623]  dump_stack_lvl+0x8c/0xd0
[   74.301640]  print_report+0x118/0x608
[   74.301658]  kasan_report+0xdc/0x128
[   74.301677]  kasan_check_range+0x100/0x1a8
[   74.301698]  __kasan_check_write+0x20/0x30
[   74.301714]  kasan_atomics_helper+0x17ec/0x4858
[   74.301733]  kasan_atomics+0x198/0x2e0
[   74.301751]  kunit_try_run_case+0x170/0x3f0
[   74.301769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.301790]  kthread+0x328/0x630
[   74.301804]  ret_from_fork+0x10/0x20
[   74.301821] 
[   74.375070] Allocated by task 363:
[   74.378526]  kasan_save_stack+0x3c/0x68
[   74.382424]  kasan_save_track+0x20/0x40
[   74.386321]  kasan_save_alloc_info+0x40/0x58
[   74.390659]  __kasan_kmalloc+0xd4/0xd8
[   74.394468]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.399069]  kasan_atomics+0xb8/0x2e0
[   74.402791]  kunit_try_run_case+0x170/0x3f0
[   74.407044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.412613]  kthread+0x328/0x630
[   74.415898]  ret_from_fork+0x10/0x20
[   74.419533] 
[   74.421055] The buggy address belongs to the object at ffff000080acff00
[   74.421055]  which belongs to the cache kmalloc-64 of size 64
[   74.433531] The buggy address is located 0 bytes to the right of
[   74.433531]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   74.446532] 
[   74.448056] The buggy address belongs to the physical page:
[   74.453700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   74.461806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.468413] page_type: f5(slab)
[   74.471613] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   74.479448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.487280] page dumped because: kasan: bad access detected
[   74.492926] 
[   74.494448] Memory state around the buggy address:
[   74.499303]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.506613]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.513925] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.521234]                                      ^
[   74.526090]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.533401]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.540710] ==================================================================
[   69.699541] ==================================================================
[   69.706853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   69.714347] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   69.721838] 
[   69.723363] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   69.723393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.723401] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.723411] Call trace:
[   69.723418]  show_stack+0x20/0x38 (C)
[   69.723435]  dump_stack_lvl+0x8c/0xd0
[   69.723454]  print_report+0x118/0x608
[   69.723473]  kasan_report+0xdc/0x128
[   69.723491]  kasan_check_range+0x100/0x1a8
[   69.723512]  __kasan_check_write+0x20/0x30
[   69.723528]  kasan_atomics_helper+0x11f8/0x4858
[   69.723546]  kasan_atomics+0x198/0x2e0
[   69.723562]  kunit_try_run_case+0x170/0x3f0
[   69.723580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.723601]  kthread+0x328/0x630
[   69.723614]  ret_from_fork+0x10/0x20
[   69.723630] 
[   69.796882] Allocated by task 363:
[   69.800339]  kasan_save_stack+0x3c/0x68
[   69.804239]  kasan_save_track+0x20/0x40
[   69.808136]  kasan_save_alloc_info+0x40/0x58
[   69.812476]  __kasan_kmalloc+0xd4/0xd8
[   69.816285]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.820886]  kasan_atomics+0xb8/0x2e0
[   69.824607]  kunit_try_run_case+0x170/0x3f0
[   69.828859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.834429]  kthread+0x328/0x630
[   69.837715]  ret_from_fork+0x10/0x20
[   69.841349] 
[   69.842872] The buggy address belongs to the object at ffff000080acff00
[   69.842872]  which belongs to the cache kmalloc-64 of size 64
[   69.855349] The buggy address is located 0 bytes to the right of
[   69.855349]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   69.868350] 
[   69.869874] The buggy address belongs to the physical page:
[   69.875519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   69.883628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.890235] page_type: f5(slab)
[   69.893434] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.901271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.909102] page dumped because: kasan: bad access detected
[   69.914748] 
[   69.916270] Memory state around the buggy address:
[   69.921125]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.928438]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.935750] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.943059]                                      ^
[   69.947916]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.955227]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   69.962536] ==================================================================
[   58.114772] ==================================================================
[   58.122087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   58.129494] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   58.136897] 
[   58.138422] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   58.138452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.138460] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.138470] Call trace:
[   58.138477]  show_stack+0x20/0x38 (C)
[   58.138494]  dump_stack_lvl+0x8c/0xd0
[   58.138512]  print_report+0x118/0x608
[   58.138531]  kasan_report+0xdc/0x128
[   58.138549]  kasan_check_range+0x100/0x1a8
[   58.138569]  __kasan_check_read+0x20/0x30
[   58.138585]  kasan_atomics_helper+0x2b0/0x4858
[   58.138604]  kasan_atomics+0x198/0x2e0
[   58.138622]  kunit_try_run_case+0x170/0x3f0
[   58.138641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.138661]  kthread+0x328/0x630
[   58.138676]  ret_from_fork+0x10/0x20
[   58.138692] 
[   58.211760] Allocated by task 363:
[   58.215215]  kasan_save_stack+0x3c/0x68
[   58.219121]  kasan_save_track+0x20/0x40
[   58.223018]  kasan_save_alloc_info+0x40/0x58
[   58.227352]  __kasan_kmalloc+0xd4/0xd8
[   58.231161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.235759]  kasan_atomics+0xb8/0x2e0
[   58.239488]  kunit_try_run_case+0x170/0x3f0
[   58.243741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.249306]  kthread+0x328/0x630
[   58.252590]  ret_from_fork+0x10/0x20
[   58.256221] 
[   58.257744] The buggy address belongs to the object at ffff000080acff00
[   58.257744]  which belongs to the cache kmalloc-64 of size 64
[   58.270222] The buggy address is located 0 bytes to the right of
[   58.270222]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   58.283235] 
[   58.284759] The buggy address belongs to the physical page:
[   58.290401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   58.298500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.305111] page_type: f5(slab)
[   58.308311] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.316151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.323987] page dumped because: kasan: bad access detected
[   58.329630] 
[   58.331162] Memory state around the buggy address:
[   58.336014]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.343321]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.350626] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.357941]                                      ^
[   58.362795]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.370108]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   58.377423] ==================================================================
[   68.888416] ==================================================================
[   68.895726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   68.903217] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   68.910705] 
[   68.912230] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   68.912259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.912268] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.912278] Call trace:
[   68.912285]  show_stack+0x20/0x38 (C)
[   68.912302]  dump_stack_lvl+0x8c/0xd0
[   68.912320]  print_report+0x118/0x608
[   68.912338]  kasan_report+0xdc/0x128
[   68.912358]  kasan_check_range+0x100/0x1a8
[   68.912377]  __kasan_check_write+0x20/0x30
[   68.912394]  kasan_atomics_helper+0x10c0/0x4858
[   68.912413]  kasan_atomics+0x198/0x2e0
[   68.912429]  kunit_try_run_case+0x170/0x3f0
[   68.912447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.912469]  kthread+0x328/0x630
[   68.912483]  ret_from_fork+0x10/0x20
[   68.912500] 
[   68.985750] Allocated by task 363:
[   68.989206]  kasan_save_stack+0x3c/0x68
[   68.993103]  kasan_save_track+0x20/0x40
[   68.997000]  kasan_save_alloc_info+0x40/0x58
[   69.001339]  __kasan_kmalloc+0xd4/0xd8
[   69.005148]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.009749]  kasan_atomics+0xb8/0x2e0
[   69.013471]  kunit_try_run_case+0x170/0x3f0
[   69.017725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.023294]  kthread+0x328/0x630
[   69.026580]  ret_from_fork+0x10/0x20
[   69.030214] 
[   69.031737] The buggy address belongs to the object at ffff000080acff00
[   69.031737]  which belongs to the cache kmalloc-64 of size 64
[   69.044215] The buggy address is located 0 bytes to the right of
[   69.044215]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   69.057216] 
[   69.058740] The buggy address belongs to the physical page:
[   69.064385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   69.072490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.079098] page_type: f5(slab)
[   69.082296] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.090133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.097966] page dumped because: kasan: bad access detected
[   69.103611] 
[   69.105134] Memory state around the buggy address:
[   69.109989]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.117301]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.124615] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.131924]                                      ^
[   69.136780]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.144092]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   69.151402] ==================================================================
[   70.780970] ==================================================================
[   70.788282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   70.795773] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   70.803175] 
[   70.804700] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   70.804729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.804736] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.804746] Call trace:
[   70.804753]  show_stack+0x20/0x38 (C)
[   70.804770]  dump_stack_lvl+0x8c/0xd0
[   70.804788]  print_report+0x118/0x608
[   70.804807]  kasan_report+0xdc/0x128
[   70.804826]  __asan_report_load8_noabort+0x20/0x30
[   70.804843]  kasan_atomics_helper+0x3f04/0x4858
[   70.804861]  kasan_atomics+0x198/0x2e0
[   70.804878]  kunit_try_run_case+0x170/0x3f0
[   70.804897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.804917]  kthread+0x328/0x630
[   70.804931]  ret_from_fork+0x10/0x20
[   70.804947] 
[   70.874746] Allocated by task 363:
[   70.878203]  kasan_save_stack+0x3c/0x68
[   70.882102]  kasan_save_track+0x20/0x40
[   70.886000]  kasan_save_alloc_info+0x40/0x58
[   70.890339]  __kasan_kmalloc+0xd4/0xd8
[   70.894148]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.898750]  kasan_atomics+0xb8/0x2e0
[   70.902472]  kunit_try_run_case+0x170/0x3f0
[   70.906724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.912293]  kthread+0x328/0x630
[   70.915580]  ret_from_fork+0x10/0x20
[   70.919215] 
[   70.920738] The buggy address belongs to the object at ffff000080acff00
[   70.920738]  which belongs to the cache kmalloc-64 of size 64
[   70.933216] The buggy address is located 0 bytes to the right of
[   70.933216]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   70.946218] 
[   70.947742] The buggy address belongs to the physical page:
[   70.953387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   70.961494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.968102] page_type: f5(slab)
[   70.971301] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.979138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.986970] page dumped because: kasan: bad access detected
[   70.992616] 
[   70.994138] Memory state around the buggy address:
[   70.998993]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.006305]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.013616] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.020926]                                      ^
[   71.025782]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.033095]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   71.040406] ==================================================================
[   65.926483] ==================================================================
[   65.933795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   65.941199] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   65.948688] 
[   65.950214] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   65.950243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.950253] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.950262] Call trace:
[   65.950269]  show_stack+0x20/0x38 (C)
[   65.950285]  dump_stack_lvl+0x8c/0xd0
[   65.950304]  print_report+0x118/0x608
[   65.950322]  kasan_report+0xdc/0x128
[   65.950340]  kasan_check_range+0x100/0x1a8
[   65.950360]  __kasan_check_write+0x20/0x30
[   65.950374]  kasan_atomics_helper+0xd3c/0x4858
[   65.950392]  kasan_atomics+0x198/0x2e0
[   65.950409]  kunit_try_run_case+0x170/0x3f0
[   65.950426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.950446]  kthread+0x328/0x630
[   65.950459]  ret_from_fork+0x10/0x20
[   65.950475] 
[   66.023642] Allocated by task 363:
[   66.027099]  kasan_save_stack+0x3c/0x68
[   66.030998]  kasan_save_track+0x20/0x40
[   66.034895]  kasan_save_alloc_info+0x40/0x58
[   66.039234]  __kasan_kmalloc+0xd4/0xd8
[   66.043043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.047644]  kasan_atomics+0xb8/0x2e0
[   66.051367]  kunit_try_run_case+0x170/0x3f0
[   66.055621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.061190]  kthread+0x328/0x630
[   66.064477]  ret_from_fork+0x10/0x20
[   66.068111] 
[   66.069634] The buggy address belongs to the object at ffff000080acff00
[   66.069634]  which belongs to the cache kmalloc-64 of size 64
[   66.082111] The buggy address is located 0 bytes to the right of
[   66.082111]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   66.095112] 
[   66.096636] The buggy address belongs to the physical page:
[   66.102281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   66.110388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.116995] page_type: f5(slab)
[   66.120195] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.128030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.135862] page dumped because: kasan: bad access detected
[   66.141508] 
[   66.143031] Memory state around the buggy address:
[   66.147886]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.155198]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.162510] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.169819]                                      ^
[   66.174676]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.181987]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.189297] ==================================================================
[   57.844583] ==================================================================
[   57.851902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   57.859312] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   57.866796] 
[   57.868331] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   57.868360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.868369] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.868380] Call trace:
[   57.868386]  show_stack+0x20/0x38 (C)
[   57.868403]  dump_stack_lvl+0x8c/0xd0
[   57.868422]  print_report+0x118/0x608
[   57.868441]  kasan_report+0xdc/0x128
[   57.868460]  kasan_check_range+0x100/0x1a8
[   57.868481]  __kasan_check_write+0x20/0x30
[   57.868496]  kasan_atomics_helper+0x24c/0x4858
[   57.868514]  kasan_atomics+0x198/0x2e0
[   57.868530]  kunit_try_run_case+0x170/0x3f0
[   57.868548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.868569]  kthread+0x328/0x630
[   57.868582]  ret_from_fork+0x10/0x20
[   57.868600] 
[   57.941765] Allocated by task 363:
[   57.945217]  kasan_save_stack+0x3c/0x68
[   57.949121]  kasan_save_track+0x20/0x40
[   57.953025]  kasan_save_alloc_info+0x40/0x58
[   57.957360]  __kasan_kmalloc+0xd4/0xd8
[   57.961175]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.965773]  kasan_atomics+0xb8/0x2e0
[   57.969501]  kunit_try_run_case+0x170/0x3f0
[   57.973751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.979311]  kthread+0x328/0x630
[   57.982597]  ret_from_fork+0x10/0x20
[   57.986228] 
[   57.987758] The buggy address belongs to the object at ffff000080acff00
[   57.987758]  which belongs to the cache kmalloc-64 of size 64
[   58.000237] The buggy address is located 0 bytes to the right of
[   58.000237]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   58.013236] 
[   58.014762] The buggy address belongs to the physical page:
[   58.020399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   58.028498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.035111] page_type: f5(slab)
[   58.038308] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.046148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.053980] page dumped because: kasan: bad access detected
[   58.059618] 
[   58.061142] Memory state around the buggy address:
[   58.065993]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.073308]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.080623] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.087937]                                      ^
[   58.092789]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.100103]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   58.107416] ==================================================================
[   58.921754] ==================================================================
[   58.929064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   58.936556] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   58.944044] 
[   58.945569] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   58.945599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.945606] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.945617] Call trace:
[   58.945623]  show_stack+0x20/0x38 (C)
[   58.945640]  dump_stack_lvl+0x8c/0xd0
[   58.945658]  print_report+0x118/0x608
[   58.945676]  kasan_report+0xdc/0x128
[   58.945693]  __asan_report_store4_noabort+0x20/0x30
[   58.945711]  kasan_atomics_helper+0x3f94/0x4858
[   58.945729]  kasan_atomics+0x198/0x2e0
[   58.945746]  kunit_try_run_case+0x170/0x3f0
[   58.945765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.945786]  kthread+0x328/0x630
[   58.945800]  ret_from_fork+0x10/0x20
[   58.945817] 
[   59.015700] Allocated by task 363:
[   59.019156]  kasan_save_stack+0x3c/0x68
[   59.023054]  kasan_save_track+0x20/0x40
[   59.026951]  kasan_save_alloc_info+0x40/0x58
[   59.031290]  __kasan_kmalloc+0xd4/0xd8
[   59.035098]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.039699]  kasan_atomics+0xb8/0x2e0
[   59.043420]  kunit_try_run_case+0x170/0x3f0
[   59.047673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.053243]  kthread+0x328/0x630
[   59.056528]  ret_from_fork+0x10/0x20
[   59.060162] 
[   59.061685] The buggy address belongs to the object at ffff000080acff00
[   59.061685]  which belongs to the cache kmalloc-64 of size 64
[   59.074163] The buggy address is located 0 bytes to the right of
[   59.074163]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   59.087164] 
[   59.088687] The buggy address belongs to the physical page:
[   59.094332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   59.102441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.109048] page_type: f5(slab)
[   59.112246] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.120084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.127916] page dumped because: kasan: bad access detected
[   59.133562] 
[   59.135085] Memory state around the buggy address:
[   59.139940]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.147253]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.154565] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.161874]                                      ^
[   59.166730]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.174041]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   59.181350] ==================================================================
[   62.160697] ==================================================================
[   62.168008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   62.175412] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   62.182900] 
[   62.184427] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   62.184455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.184464] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.184474] Call trace:
[   62.184480]  show_stack+0x20/0x38 (C)
[   62.184498]  dump_stack_lvl+0x8c/0xd0
[   62.184515]  print_report+0x118/0x608
[   62.184534]  kasan_report+0xdc/0x128
[   62.184552]  kasan_check_range+0x100/0x1a8
[   62.184572]  __kasan_check_write+0x20/0x30
[   62.184588]  kasan_atomics_helper+0x894/0x4858
[   62.184608]  kasan_atomics+0x198/0x2e0
[   62.184625]  kunit_try_run_case+0x170/0x3f0
[   62.184643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.184663]  kthread+0x328/0x630
[   62.184677]  ret_from_fork+0x10/0x20
[   62.184695] 
[   62.257858] Allocated by task 363:
[   62.261314]  kasan_save_stack+0x3c/0x68
[   62.265212]  kasan_save_track+0x20/0x40
[   62.269111]  kasan_save_alloc_info+0x40/0x58
[   62.273449]  __kasan_kmalloc+0xd4/0xd8
[   62.277260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.281861]  kasan_atomics+0xb8/0x2e0
[   62.285583]  kunit_try_run_case+0x170/0x3f0
[   62.289836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.295405]  kthread+0x328/0x630
[   62.298690]  ret_from_fork+0x10/0x20
[   62.302324] 
[   62.303848] The buggy address belongs to the object at ffff000080acff00
[   62.303848]  which belongs to the cache kmalloc-64 of size 64
[   62.316326] The buggy address is located 0 bytes to the right of
[   62.316326]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   62.329327] 
[   62.330851] The buggy address belongs to the physical page:
[   62.336496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   62.344604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.351210] page_type: f5(slab)
[   62.354408] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.362244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.370074] page dumped because: kasan: bad access detected
[   62.375720] 
[   62.377242] Memory state around the buggy address:
[   62.382097]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.389409]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.396720] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.404029]                                      ^
[   62.408884]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.416195]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.423505] ==================================================================
[   67.000232] ==================================================================
[   67.007542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   67.014947] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   67.022436] 
[   67.023961] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   67.023990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.023998] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.024008] Call trace:
[   67.024015]  show_stack+0x20/0x38 (C)
[   67.024032]  dump_stack_lvl+0x8c/0xd0
[   67.024049]  print_report+0x118/0x608
[   67.024068]  kasan_report+0xdc/0x128
[   67.024087]  kasan_check_range+0x100/0x1a8
[   67.024107]  __kasan_check_write+0x20/0x30
[   67.024123]  kasan_atomics_helper+0xe44/0x4858
[   67.024142]  kasan_atomics+0x198/0x2e0
[   67.024158]  kunit_try_run_case+0x170/0x3f0
[   67.024177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.024197]  kthread+0x328/0x630
[   67.024210]  ret_from_fork+0x10/0x20
[   67.024228] 
[   67.097396] Allocated by task 363:
[   67.100851]  kasan_save_stack+0x3c/0x68
[   67.104748]  kasan_save_track+0x20/0x40
[   67.108647]  kasan_save_alloc_info+0x40/0x58
[   67.112984]  __kasan_kmalloc+0xd4/0xd8
[   67.116794]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.121395]  kasan_atomics+0xb8/0x2e0
[   67.125116]  kunit_try_run_case+0x170/0x3f0
[   67.129368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.134938]  kthread+0x328/0x630
[   67.138223]  ret_from_fork+0x10/0x20
[   67.141858] 
[   67.143381] The buggy address belongs to the object at ffff000080acff00
[   67.143381]  which belongs to the cache kmalloc-64 of size 64
[   67.155860] The buggy address is located 0 bytes to the right of
[   67.155860]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   67.168861] 
[   67.170386] The buggy address belongs to the physical page:
[   67.176031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   67.184138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.190745] page_type: f5(slab)
[   67.193945] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   67.201781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.209614] page dumped because: kasan: bad access detected
[   67.215259] 
[   67.216782] Memory state around the buggy address:
[   67.221638]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.228950]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.236263] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.243572]                                      ^
[   67.248429]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.255743]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.263055] ==================================================================
[   66.463440] ==================================================================
[   66.470751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   66.478154] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   66.485555] 
[   66.487082] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   66.487111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.487118] Hardware name: Thundercomm Dragonboard 845c (DT)
[   66.487129] Call trace:
[   66.487135]  show_stack+0x20/0x38 (C)
[   66.487152]  dump_stack_lvl+0x8c/0xd0
[   66.487170]  print_report+0x118/0x608
[   66.487189]  kasan_report+0xdc/0x128
[   66.487207]  kasan_check_range+0x100/0x1a8
[   66.487227]  __kasan_check_read+0x20/0x30
[   66.487243]  kasan_atomics_helper+0xdd4/0x4858
[   66.487261]  kasan_atomics+0x198/0x2e0
[   66.487278]  kunit_try_run_case+0x170/0x3f0
[   66.487295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.487316]  kthread+0x328/0x630
[   66.487330]  ret_from_fork+0x10/0x20
[   66.487346] 
[   66.560416] Allocated by task 363:
[   66.563873]  kasan_save_stack+0x3c/0x68
[   66.567771]  kasan_save_track+0x20/0x40
[   66.571670]  kasan_save_alloc_info+0x40/0x58
[   66.576009]  __kasan_kmalloc+0xd4/0xd8
[   66.579817]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.584419]  kasan_atomics+0xb8/0x2e0
[   66.588140]  kunit_try_run_case+0x170/0x3f0
[   66.592392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.597961]  kthread+0x328/0x630
[   66.601246]  ret_from_fork+0x10/0x20
[   66.604881] 
[   66.606403] The buggy address belongs to the object at ffff000080acff00
[   66.606403]  which belongs to the cache kmalloc-64 of size 64
[   66.618880] The buggy address is located 0 bytes to the right of
[   66.618880]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   66.631879] 
[   66.633402] The buggy address belongs to the physical page:
[   66.639047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   66.647153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.653760] page_type: f5(slab)
[   66.656959] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.664794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.672625] page dumped because: kasan: bad access detected
[   66.678270] 
[   66.679793] Memory state around the buggy address:
[   66.684648]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.691959]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.699269] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.706579]                                      ^
[   66.711435]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.718746]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.726057] ==================================================================
[   63.238080] ==================================================================
[   63.245389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   63.252794] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   63.260282] 
[   63.261808] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   63.261837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.261845] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.261856] Call trace:
[   63.261861]  show_stack+0x20/0x38 (C)
[   63.261879]  dump_stack_lvl+0x8c/0xd0
[   63.261897]  print_report+0x118/0x608
[   63.261916]  kasan_report+0xdc/0x128
[   63.261935]  kasan_check_range+0x100/0x1a8
[   63.261955]  __kasan_check_write+0x20/0x30
[   63.261970]  kasan_atomics_helper+0xa04/0x4858
[   63.261988]  kasan_atomics+0x198/0x2e0
[   63.262006]  kunit_try_run_case+0x170/0x3f0
[   63.262023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.262045]  kthread+0x328/0x630
[   63.262058]  ret_from_fork+0x10/0x20
[   63.262075] 
[   63.335241] Allocated by task 363:
[   63.338697]  kasan_save_stack+0x3c/0x68
[   63.342594]  kasan_save_track+0x20/0x40
[   63.346490]  kasan_save_alloc_info+0x40/0x58
[   63.350829]  __kasan_kmalloc+0xd4/0xd8
[   63.354640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.359241]  kasan_atomics+0xb8/0x2e0
[   63.362964]  kunit_try_run_case+0x170/0x3f0
[   63.367216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.372786]  kthread+0x328/0x630
[   63.376073]  ret_from_fork+0x10/0x20
[   63.379708] 
[   63.381232] The buggy address belongs to the object at ffff000080acff00
[   63.381232]  which belongs to the cache kmalloc-64 of size 64
[   63.393711] The buggy address is located 0 bytes to the right of
[   63.393711]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   63.406712] 
[   63.408236] The buggy address belongs to the physical page:
[   63.413882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   63.421988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.428596] page_type: f5(slab)
[   63.431794] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.439630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.447463] page dumped because: kasan: bad access detected
[   63.453109] 
[   63.454638] Memory state around the buggy address:
[   63.459498]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.466813]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.474129] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.481440]                                      ^
[   63.486297]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.493611]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.500921] ==================================================================
[   63.508310] ==================================================================
[   63.515621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   63.523028] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   63.530520] 
[   63.532048] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   63.532076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.532084] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.532095] Call trace:
[   63.532103]  show_stack+0x20/0x38 (C)
[   63.532121]  dump_stack_lvl+0x8c/0xd0
[   63.532139]  print_report+0x118/0x608
[   63.532158]  kasan_report+0xdc/0x128
[   63.532177]  kasan_check_range+0x100/0x1a8
[   63.532197]  __kasan_check_write+0x20/0x30
[   63.532213]  kasan_atomics_helper+0xa6c/0x4858
[   63.532230]  kasan_atomics+0x198/0x2e0
[   63.532249]  kunit_try_run_case+0x170/0x3f0
[   63.532266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.532286]  kthread+0x328/0x630
[   63.532300]  ret_from_fork+0x10/0x20
[   63.532316] 
[   63.605484] Allocated by task 363:
[   63.608941]  kasan_save_stack+0x3c/0x68
[   63.612841]  kasan_save_track+0x20/0x40
[   63.616739]  kasan_save_alloc_info+0x40/0x58
[   63.621077]  __kasan_kmalloc+0xd4/0xd8
[   63.624885]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.629489]  kasan_atomics+0xb8/0x2e0
[   63.633210]  kunit_try_run_case+0x170/0x3f0
[   63.637464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.643033]  kthread+0x328/0x630
[   63.646320]  ret_from_fork+0x10/0x20
[   63.649955] 
[   63.651479] The buggy address belongs to the object at ffff000080acff00
[   63.651479]  which belongs to the cache kmalloc-64 of size 64
[   63.663957] The buggy address is located 0 bytes to the right of
[   63.663957]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   63.676959] 
[   63.678483] The buggy address belongs to the physical page:
[   63.684129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   63.692237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.698845] page_type: f5(slab)
[   63.702047] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.709885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.717717] page dumped because: kasan: bad access detected
[   63.723363] 
[   63.724886] Memory state around the buggy address:
[   63.729742]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.737055]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.744367] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.751678]                                      ^
[   63.756535]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.763847]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.771157] ==================================================================
[   68.077722] ==================================================================
[   68.085033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   68.092437] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   68.099925] 
[   68.101450] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   68.101479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.101486] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.101497] Call trace:
[   68.101504]  show_stack+0x20/0x38 (C)
[   68.101521]  dump_stack_lvl+0x8c/0xd0
[   68.101538]  print_report+0x118/0x608
[   68.101556]  kasan_report+0xdc/0x128
[   68.101574]  kasan_check_range+0x100/0x1a8
[   68.101594]  __kasan_check_write+0x20/0x30
[   68.101609]  kasan_atomics_helper+0xf88/0x4858
[   68.101627]  kasan_atomics+0x198/0x2e0
[   68.101643]  kunit_try_run_case+0x170/0x3f0
[   68.101661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.101682]  kthread+0x328/0x630
[   68.101695]  ret_from_fork+0x10/0x20
[   68.101713] 
[   68.174880] Allocated by task 363:
[   68.178336]  kasan_save_stack+0x3c/0x68
[   68.182235]  kasan_save_track+0x20/0x40
[   68.186131]  kasan_save_alloc_info+0x40/0x58
[   68.190468]  __kasan_kmalloc+0xd4/0xd8
[   68.194278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.198879]  kasan_atomics+0xb8/0x2e0
[   68.202601]  kunit_try_run_case+0x170/0x3f0
[   68.206855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.212423]  kthread+0x328/0x630
[   68.215708]  ret_from_fork+0x10/0x20
[   68.219343] 
[   68.220866] The buggy address belongs to the object at ffff000080acff00
[   68.220866]  which belongs to the cache kmalloc-64 of size 64
[   68.233343] The buggy address is located 0 bytes to the right of
[   68.233343]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   68.246345] 
[   68.247868] The buggy address belongs to the physical page:
[   68.253512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   68.261618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.268225] page_type: f5(slab)
[   68.271423] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.279259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.287091] page dumped because: kasan: bad access detected
[   68.292738] 
[   68.294260] Memory state around the buggy address:
[   68.299114]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.306426]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.313736] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.321045]                                      ^
[   68.325901]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.333212]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   68.340522] ==================================================================
[   64.048734] ==================================================================
[   64.056044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   64.063536] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   64.070938] 
[   64.072463] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   64.072494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.072502] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.072513] Call trace:
[   64.072519]  show_stack+0x20/0x38 (C)
[   64.072537]  dump_stack_lvl+0x8c/0xd0
[   64.072555]  print_report+0x118/0x608
[   64.072575]  kasan_report+0xdc/0x128
[   64.072593]  __asan_report_load4_noabort+0x20/0x30
[   64.072610]  kasan_atomics_helper+0x3dcc/0x4858
[   64.072629]  kasan_atomics+0x198/0x2e0
[   64.072645]  kunit_try_run_case+0x170/0x3f0
[   64.072663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.072685]  kthread+0x328/0x630
[   64.072698]  ret_from_fork+0x10/0x20
[   64.072715] 
[   64.142513] Allocated by task 363:
[   64.145970]  kasan_save_stack+0x3c/0x68
[   64.149871]  kasan_save_track+0x20/0x40
[   64.153769]  kasan_save_alloc_info+0x40/0x58
[   64.158108]  __kasan_kmalloc+0xd4/0xd8
[   64.161917]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.166519]  kasan_atomics+0xb8/0x2e0
[   64.170241]  kunit_try_run_case+0x170/0x3f0
[   64.174495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.180065]  kthread+0x328/0x630
[   64.183352]  ret_from_fork+0x10/0x20
[   64.186987] 
[   64.188511] The buggy address belongs to the object at ffff000080acff00
[   64.188511]  which belongs to the cache kmalloc-64 of size 64
[   64.200989] The buggy address is located 0 bytes to the right of
[   64.200989]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   64.213991] 
[   64.215515] The buggy address belongs to the physical page:
[   64.221161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   64.229268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.235876] page_type: f5(slab)
[   64.239075] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.246913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.254744] page dumped because: kasan: bad access detected
[   64.260391] 
[   64.261925] Memory state around the buggy address:
[   64.266779]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.274093]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.281406] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.288716]                                      ^
[   64.293573]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.300884]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.308195] ==================================================================
[   71.858855] ==================================================================
[   71.866166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   71.873657] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   71.881144] 
[   71.882670] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   71.882699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.882707] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.882718] Call trace:
[   71.882724]  show_stack+0x20/0x38 (C)
[   71.882740]  dump_stack_lvl+0x8c/0xd0
[   71.882758]  print_report+0x118/0x608
[   71.882776]  kasan_report+0xdc/0x128
[   71.882796]  kasan_check_range+0x100/0x1a8
[   71.882815]  __kasan_check_write+0x20/0x30
[   71.882832]  kasan_atomics_helper+0x154c/0x4858
[   71.882851]  kasan_atomics+0x198/0x2e0
[   71.882868]  kunit_try_run_case+0x170/0x3f0
[   71.882886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.882906]  kthread+0x328/0x630
[   71.882920]  ret_from_fork+0x10/0x20
[   71.882936] 
[   71.956187] Allocated by task 363:
[   71.959643]  kasan_save_stack+0x3c/0x68
[   71.963542]  kasan_save_track+0x20/0x40
[   71.967438]  kasan_save_alloc_info+0x40/0x58
[   71.971776]  __kasan_kmalloc+0xd4/0xd8
[   71.975586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.980187]  kasan_atomics+0xb8/0x2e0
[   71.983908]  kunit_try_run_case+0x170/0x3f0
[   71.988161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.993730]  kthread+0x328/0x630
[   71.997016]  ret_from_fork+0x10/0x20
[   72.000650] 
[   72.002173] The buggy address belongs to the object at ffff000080acff00
[   72.002173]  which belongs to the cache kmalloc-64 of size 64
[   72.014653] The buggy address is located 0 bytes to the right of
[   72.014653]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   72.027654] 
[   72.029177] The buggy address belongs to the physical page:
[   72.034822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   72.042928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.049535] page_type: f5(slab)
[   72.052734] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.060570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.068401] page dumped because: kasan: bad access detected
[   72.074047] 
[   72.075569] Memory state around the buggy address:
[   72.080424]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.087735]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.095047] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.102357]                                      ^
[   72.107212]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.114524]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.121833] ==================================================================
[   57.574485] ==================================================================
[   57.581814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   57.589227] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   57.596635] 
[   57.598164] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   57.598195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.598203] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.598216] Call trace:
[   57.598222]  show_stack+0x20/0x38 (C)
[   57.598241]  dump_stack_lvl+0x8c/0xd0
[   57.598260]  print_report+0x118/0x608
[   57.598280]  kasan_report+0xdc/0x128
[   57.598299]  kasan_check_range+0x100/0x1a8
[   57.598319]  __kasan_check_read+0x20/0x30
[   57.598335]  kasan_atomics_helper+0x1ec/0x4858
[   57.598354]  kasan_atomics+0x198/0x2e0
[   57.598373]  kunit_try_run_case+0x170/0x3f0
[   57.598391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.598413]  kthread+0x328/0x630
[   57.598427]  ret_from_fork+0x10/0x20
[   57.598447] 
[   57.671530] Allocated by task 363:
[   57.674988]  kasan_save_stack+0x3c/0x68
[   57.678894]  kasan_save_track+0x20/0x40
[   57.682799]  kasan_save_alloc_info+0x40/0x58
[   57.687134]  __kasan_kmalloc+0xd4/0xd8
[   57.690940]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.695545]  kasan_atomics+0xb8/0x2e0
[   57.699263]  kunit_try_run_case+0x170/0x3f0
[   57.703512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.709079]  kthread+0x328/0x630
[   57.712362]  ret_from_fork+0x10/0x20
[   57.715994] 
[   57.717517] The buggy address belongs to the object at ffff000080acff00
[   57.717517]  which belongs to the cache kmalloc-64 of size 64
[   57.729996] The buggy address is located 0 bytes to the right of
[   57.729996]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   57.743006] 
[   57.744537] The buggy address belongs to the physical page:
[   57.750181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   57.758282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.764897] page_type: f5(slab)
[   57.768095] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   57.775937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.783772] page dumped because: kasan: bad access detected
[   57.789418] 
[   57.790940] Memory state around the buggy address:
[   57.795799]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.803107]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.810423] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.817736]                                      ^
[   57.822588]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.829903]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   57.837217] ==================================================================
[   64.852563] ==================================================================
[   64.859873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   64.867278] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   64.874767] 
[   64.876293] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   64.876321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.876330] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.876340] Call trace:
[   64.876346]  show_stack+0x20/0x38 (C)
[   64.876363]  dump_stack_lvl+0x8c/0xd0
[   64.876380]  print_report+0x118/0x608
[   64.876398]  kasan_report+0xdc/0x128
[   64.876416]  kasan_check_range+0x100/0x1a8
[   64.876436]  __kasan_check_write+0x20/0x30
[   64.876451]  kasan_atomics_helper+0xc08/0x4858
[   64.876469]  kasan_atomics+0x198/0x2e0
[   64.876485]  kunit_try_run_case+0x170/0x3f0
[   64.876502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.876523]  kthread+0x328/0x630
[   64.876536]  ret_from_fork+0x10/0x20
[   64.876552] 
[   64.949715] Allocated by task 363:
[   64.953171]  kasan_save_stack+0x3c/0x68
[   64.957069]  kasan_save_track+0x20/0x40
[   64.960966]  kasan_save_alloc_info+0x40/0x58
[   64.965303]  __kasan_kmalloc+0xd4/0xd8
[   64.969112]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.973713]  kasan_atomics+0xb8/0x2e0
[   64.977434]  kunit_try_run_case+0x170/0x3f0
[   64.981686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.987255]  kthread+0x328/0x630
[   64.990540]  ret_from_fork+0x10/0x20
[   64.994176] 
[   64.995699] The buggy address belongs to the object at ffff000080acff00
[   64.995699]  which belongs to the cache kmalloc-64 of size 64
[   65.008175] The buggy address is located 0 bytes to the right of
[   65.008175]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   65.021176] 
[   65.022699] The buggy address belongs to the physical page:
[   65.028344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   65.036450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.043056] page_type: f5(slab)
[   65.046255] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.054090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.061921] page dumped because: kasan: bad access detected
[   65.067567] 
[   65.069089] Memory state around the buggy address:
[   65.073942]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.081253]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.088564] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.095874]                                      ^
[   65.100729]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.108040]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.115349] ==================================================================
[   71.047781] ==================================================================
[   71.055093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   71.062586] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   71.070075] 
[   71.071601] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   71.071631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.071639] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.071649] Call trace:
[   71.071654]  show_stack+0x20/0x38 (C)
[   71.071671]  dump_stack_lvl+0x8c/0xd0
[   71.071689]  print_report+0x118/0x608
[   71.071707]  kasan_report+0xdc/0x128
[   71.071726]  kasan_check_range+0x100/0x1a8
[   71.071746]  __kasan_check_write+0x20/0x30
[   71.071762]  kasan_atomics_helper+0x1414/0x4858
[   71.071780]  kasan_atomics+0x198/0x2e0
[   71.071798]  kunit_try_run_case+0x170/0x3f0
[   71.071816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.071837]  kthread+0x328/0x630
[   71.071852]  ret_from_fork+0x10/0x20
[   71.071868] 
[   71.145122] Allocated by task 363:
[   71.148579]  kasan_save_stack+0x3c/0x68
[   71.152477]  kasan_save_track+0x20/0x40
[   71.156375]  kasan_save_alloc_info+0x40/0x58
[   71.160713]  __kasan_kmalloc+0xd4/0xd8
[   71.164522]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.169123]  kasan_atomics+0xb8/0x2e0
[   71.172845]  kunit_try_run_case+0x170/0x3f0
[   71.177099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.182668]  kthread+0x328/0x630
[   71.185953]  ret_from_fork+0x10/0x20
[   71.189587] 
[   71.191111] The buggy address belongs to the object at ffff000080acff00
[   71.191111]  which belongs to the cache kmalloc-64 of size 64
[   71.203589] The buggy address is located 0 bytes to the right of
[   71.203589]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   71.216590] 
[   71.218112] The buggy address belongs to the physical page:
[   71.223757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   71.231865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.238472] page_type: f5(slab)
[   71.241673] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.249509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.257341] page dumped because: kasan: bad access detected
[   71.262987] 
[   71.264510] Memory state around the buggy address:
[   71.269366]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.276678]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.283989] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.291299]                                      ^
[   71.296154]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.303466]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   71.310777] ==================================================================
[   60.539584] ==================================================================
[   60.546895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   60.554299] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   60.561787] 
[   60.563312] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   60.563341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.563349] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.563359] Call trace:
[   60.563365]  show_stack+0x20/0x38 (C)
[   60.563382]  dump_stack_lvl+0x8c/0xd0
[   60.563399]  print_report+0x118/0x608
[   60.563417]  kasan_report+0xdc/0x128
[   60.563436]  kasan_check_range+0x100/0x1a8
[   60.563457]  __kasan_check_write+0x20/0x30
[   60.563472]  kasan_atomics_helper+0x5b4/0x4858
[   60.563491]  kasan_atomics+0x198/0x2e0
[   60.563507]  kunit_try_run_case+0x170/0x3f0
[   60.563525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.563545]  kthread+0x328/0x630
[   60.563558]  ret_from_fork+0x10/0x20
[   60.563574] 
[   60.636738] Allocated by task 363:
[   60.640195]  kasan_save_stack+0x3c/0x68
[   60.644093]  kasan_save_track+0x20/0x40
[   60.647990]  kasan_save_alloc_info+0x40/0x58
[   60.652328]  __kasan_kmalloc+0xd4/0xd8
[   60.656138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.660739]  kasan_atomics+0xb8/0x2e0
[   60.664460]  kunit_try_run_case+0x170/0x3f0
[   60.668714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.674282]  kthread+0x328/0x630
[   60.677567]  ret_from_fork+0x10/0x20
[   60.681201] 
[   60.682725] The buggy address belongs to the object at ffff000080acff00
[   60.682725]  which belongs to the cache kmalloc-64 of size 64
[   60.695204] The buggy address is located 0 bytes to the right of
[   60.695204]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   60.708204] 
[   60.709727] The buggy address belongs to the physical page:
[   60.715373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   60.723480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.730088] page_type: f5(slab)
[   60.733287] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   60.741124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.748956] page dumped because: kasan: bad access detected
[   60.754603] 
[   60.756125] Memory state around the buggy address:
[   60.760980]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.768291]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.775603] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.782914]                                      ^
[   60.787771]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.795083]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.802393] ==================================================================
[   59.458897] ==================================================================
[   59.466207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   59.473611] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   59.481101] 
[   59.482626] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   59.482655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.482663] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.482674] Call trace:
[   59.482681]  show_stack+0x20/0x38 (C)
[   59.482698]  dump_stack_lvl+0x8c/0xd0
[   59.482715]  print_report+0x118/0x608
[   59.482734]  kasan_report+0xdc/0x128
[   59.482753]  kasan_check_range+0x100/0x1a8
[   59.482774]  __kasan_check_write+0x20/0x30
[   59.482791]  kasan_atomics_helper+0x414/0x4858
[   59.482810]  kasan_atomics+0x198/0x2e0
[   59.482826]  kunit_try_run_case+0x170/0x3f0
[   59.482844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.482864]  kthread+0x328/0x630
[   59.482877]  ret_from_fork+0x10/0x20
[   59.482893] 
[   59.556058] Allocated by task 363:
[   59.559514]  kasan_save_stack+0x3c/0x68
[   59.563411]  kasan_save_track+0x20/0x40
[   59.567308]  kasan_save_alloc_info+0x40/0x58
[   59.571647]  __kasan_kmalloc+0xd4/0xd8
[   59.575455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.580057]  kasan_atomics+0xb8/0x2e0
[   59.583779]  kunit_try_run_case+0x170/0x3f0
[   59.588033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.593601]  kthread+0x328/0x630
[   59.596886]  ret_from_fork+0x10/0x20
[   59.600521] 
[   59.602044] The buggy address belongs to the object at ffff000080acff00
[   59.602044]  which belongs to the cache kmalloc-64 of size 64
[   59.614523] The buggy address is located 0 bytes to the right of
[   59.614523]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   59.627525] 
[   59.629048] The buggy address belongs to the physical page:
[   59.634694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   59.642801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.649410] page_type: f5(slab)
[   59.652609] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.660447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.668279] page dumped because: kasan: bad access detected
[   59.673926] 
[   59.675448] Memory state around the buggy address:
[   59.680303]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.687617]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.694928] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.702238]                                      ^
[   59.707094]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.714405]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   59.721715] ==================================================================
[   68.618065] ==================================================================
[   68.625377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   68.632869] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   68.640357] 
[   68.641883] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   68.641912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.641921] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.641930] Call trace:
[   68.641937]  show_stack+0x20/0x38 (C)
[   68.641955]  dump_stack_lvl+0x8c/0xd0
[   68.641973]  print_report+0x118/0x608
[   68.641991]  kasan_report+0xdc/0x128
[   68.642010]  kasan_check_range+0x100/0x1a8
[   68.642030]  __kasan_check_write+0x20/0x30
[   68.642045]  kasan_atomics_helper+0x1058/0x4858
[   68.642064]  kasan_atomics+0x198/0x2e0
[   68.642080]  kunit_try_run_case+0x170/0x3f0
[   68.642098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.642119]  kthread+0x328/0x630
[   68.642133]  ret_from_fork+0x10/0x20
[   68.642149] 
[   68.715390] Allocated by task 363:
[   68.718847]  kasan_save_stack+0x3c/0x68
[   68.722745]  kasan_save_track+0x20/0x40
[   68.726642]  kasan_save_alloc_info+0x40/0x58
[   68.730980]  __kasan_kmalloc+0xd4/0xd8
[   68.734788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.739390]  kasan_atomics+0xb8/0x2e0
[   68.743112]  kunit_try_run_case+0x170/0x3f0
[   68.747365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.752934]  kthread+0x328/0x630
[   68.756220]  ret_from_fork+0x10/0x20
[   68.759853] 
[   68.761377] The buggy address belongs to the object at ffff000080acff00
[   68.761377]  which belongs to the cache kmalloc-64 of size 64
[   68.773856] The buggy address is located 0 bytes to the right of
[   68.773856]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   68.786858] 
[   68.788382] The buggy address belongs to the physical page:
[   68.794028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   68.802134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.808741] page_type: f5(slab)
[   68.811940] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.819778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.827609] page dumped because: kasan: bad access detected
[   68.833255] 
[   68.834778] Memory state around the buggy address:
[   68.839633]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.846944]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.854255] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.861566]                                      ^
[   68.866423]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.873735]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   68.881044] ==================================================================
[   65.122723] ==================================================================
[   65.130032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   65.137524] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   65.144924] 
[   65.146449] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   65.146478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.146485] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.146495] Call trace:
[   65.146502]  show_stack+0x20/0x38 (C)
[   65.146518]  dump_stack_lvl+0x8c/0xd0
[   65.146536]  print_report+0x118/0x608
[   65.146555]  kasan_report+0xdc/0x128
[   65.146573]  __asan_report_load4_noabort+0x20/0x30
[   65.146589]  kasan_atomics_helper+0x3de4/0x4858
[   65.146608]  kasan_atomics+0x198/0x2e0
[   65.146624]  kunit_try_run_case+0x170/0x3f0
[   65.146641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.146660]  kthread+0x328/0x630
[   65.146674]  ret_from_fork+0x10/0x20
[   65.146691] 
[   65.216488] Allocated by task 363:
[   65.219944]  kasan_save_stack+0x3c/0x68
[   65.223843]  kasan_save_track+0x20/0x40
[   65.227740]  kasan_save_alloc_info+0x40/0x58
[   65.232078]  __kasan_kmalloc+0xd4/0xd8
[   65.235887]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.240489]  kasan_atomics+0xb8/0x2e0
[   65.244211]  kunit_try_run_case+0x170/0x3f0
[   65.248463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.254032]  kthread+0x328/0x630
[   65.257317]  ret_from_fork+0x10/0x20
[   65.260953] 
[   65.262476] The buggy address belongs to the object at ffff000080acff00
[   65.262476]  which belongs to the cache kmalloc-64 of size 64
[   65.274956] The buggy address is located 0 bytes to the right of
[   65.274956]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   65.287958] 
[   65.289482] The buggy address belongs to the physical page:
[   65.295128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   65.303236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.309844] page_type: f5(slab)
[   65.313042] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.320880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.328711] page dumped because: kasan: bad access detected
[   65.334357] 
[   65.335880] Memory state around the buggy address:
[   65.340736]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.348049]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.355361] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.362671]                                      ^
[   65.367528]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.374840]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.382150] ==================================================================
[   57.031457] ==================================================================
[   57.046538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   57.054036] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   57.061441] 
[   57.062976] CPU: 3 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   57.063009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.063019] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.063032] Call trace:
[   57.063041]  show_stack+0x20/0x38 (C)
[   57.063060]  dump_stack_lvl+0x8c/0xd0
[   57.063083]  print_report+0x118/0x608
[   57.063104]  kasan_report+0xdc/0x128
[   57.063125]  __asan_report_load4_noabort+0x20/0x30
[   57.063146]  kasan_atomics_helper+0x40a8/0x4858
[   57.063168]  kasan_atomics+0x198/0x2e0
[   57.063186]  kunit_try_run_case+0x170/0x3f0
[   57.063206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.063231]  kthread+0x328/0x630
[   57.063246]  ret_from_fork+0x10/0x20
[   57.063265] 
[   57.133078] Allocated by task 363:
[   57.136540]  kasan_save_stack+0x3c/0x68
[   57.140454]  kasan_save_track+0x20/0x40
[   57.144368]  kasan_save_alloc_info+0x40/0x58
[   57.148708]  __kasan_kmalloc+0xd4/0xd8
[   57.152524]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.157127]  kasan_atomics+0xb8/0x2e0
[   57.160854]  kunit_try_run_case+0x170/0x3f0
[   57.165109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.170685]  kthread+0x328/0x630
[   57.173977]  ret_from_fork+0x10/0x20
[   57.177619] 
[   57.179150] The buggy address belongs to the object at ffff000080acff00
[   57.179150]  which belongs to the cache kmalloc-64 of size 64
[   57.191634] The buggy address is located 0 bytes to the right of
[   57.191634]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   57.204646] 
[   57.206178] The buggy address belongs to the physical page:
[   57.211829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   57.219934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.226553] page_type: f5(slab)
[   57.229759] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   57.237606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.245451] page dumped because: kasan: bad access detected
[   57.251102] 
[   57.252629] Memory state around the buggy address:
[   57.257495]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.264812]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.272129] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.279446]                                      ^
[   57.284310]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.291628]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   57.298945] ==================================================================
[   72.666372] ==================================================================
[   72.673684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   72.681176] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   72.688665] 
[   72.690190] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   72.690219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.690228] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.690238] Call trace:
[   72.690246]  show_stack+0x20/0x38 (C)
[   72.690264]  dump_stack_lvl+0x8c/0xd0
[   72.690282]  print_report+0x118/0x608
[   72.690300]  kasan_report+0xdc/0x128
[   72.690320]  kasan_check_range+0x100/0x1a8
[   72.690339]  __kasan_check_write+0x20/0x30
[   72.690356]  kasan_atomics_helper+0x1644/0x4858
[   72.690375]  kasan_atomics+0x198/0x2e0
[   72.690391]  kunit_try_run_case+0x170/0x3f0
[   72.690410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.690430]  kthread+0x328/0x630
[   72.690444]  ret_from_fork+0x10/0x20
[   72.690463] 
[   72.763713] Allocated by task 363:
[   72.767169]  kasan_save_stack+0x3c/0x68
[   72.771067]  kasan_save_track+0x20/0x40
[   72.774964]  kasan_save_alloc_info+0x40/0x58
[   72.779303]  __kasan_kmalloc+0xd4/0xd8
[   72.783113]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.787715]  kasan_atomics+0xb8/0x2e0
[   72.791437]  kunit_try_run_case+0x170/0x3f0
[   72.795689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.801259]  kthread+0x328/0x630
[   72.804546]  ret_from_fork+0x10/0x20
[   72.808181] 
[   72.809703] The buggy address belongs to the object at ffff000080acff00
[   72.809703]  which belongs to the cache kmalloc-64 of size 64
[   72.822181] The buggy address is located 0 bytes to the right of
[   72.822181]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   72.835183] 
[   72.836706] The buggy address belongs to the physical page:
[   72.842352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   72.850460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.857068] page_type: f5(slab)
[   72.860267] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.868104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.875936] page dumped because: kasan: bad access detected
[   72.881583] 
[   72.883105] Memory state around the buggy address:
[   72.887959]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.895271]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.902583] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.909892]                                      ^
[   72.914749]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.922060]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.929370] ==================================================================
[   72.936732] ==================================================================
[   72.944044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   72.951536] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   72.958939] 
[   72.960464] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   72.960492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.960500] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.960512] Call trace:
[   72.960519]  show_stack+0x20/0x38 (C)
[   72.960537]  dump_stack_lvl+0x8c/0xd0
[   72.960555]  print_report+0x118/0x608
[   72.960574]  kasan_report+0xdc/0x128
[   72.960592]  __asan_report_load8_noabort+0x20/0x30
[   72.960609]  kasan_atomics_helper+0x3df4/0x4858
[   72.960628]  kasan_atomics+0x198/0x2e0
[   72.960645]  kunit_try_run_case+0x170/0x3f0
[   72.960662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.960682]  kthread+0x328/0x630
[   72.960695]  ret_from_fork+0x10/0x20
[   72.960711] 
[   73.030509] Allocated by task 363:
[   73.033965]  kasan_save_stack+0x3c/0x68
[   73.037863]  kasan_save_track+0x20/0x40
[   73.041761]  kasan_save_alloc_info+0x40/0x58
[   73.046099]  __kasan_kmalloc+0xd4/0xd8
[   73.049908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.054510]  kasan_atomics+0xb8/0x2e0
[   73.058232]  kunit_try_run_case+0x170/0x3f0
[   73.062484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.068052]  kthread+0x328/0x630
[   73.071338]  ret_from_fork+0x10/0x20
[   73.074972] 
[   73.076495] The buggy address belongs to the object at ffff000080acff00
[   73.076495]  which belongs to the cache kmalloc-64 of size 64
[   73.088972] The buggy address is located 0 bytes to the right of
[   73.088972]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   73.101973] 
[   73.103496] The buggy address belongs to the physical page:
[   73.109141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   73.117248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.123855] page_type: f5(slab)
[   73.127054] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.134890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.142722] page dumped because: kasan: bad access detected
[   73.148368] 
[   73.149902] Memory state around the buggy address:
[   73.154756]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.162067]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.169378] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.176687]                                      ^
[   73.181542]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.188853]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.196162] ==================================================================
[   63.778525] ==================================================================
[   63.785838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   63.793244] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   63.800734] 
[   63.802272] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   63.802302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.802310] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.802322] Call trace:
[   63.802329]  show_stack+0x20/0x38 (C)
[   63.802347]  dump_stack_lvl+0x8c/0xd0
[   63.802366]  print_report+0x118/0x608
[   63.802384]  kasan_report+0xdc/0x128
[   63.802401]  kasan_check_range+0x100/0x1a8
[   63.802420]  __kasan_check_write+0x20/0x30
[   63.802436]  kasan_atomics_helper+0xad4/0x4858
[   63.802454]  kasan_atomics+0x198/0x2e0
[   63.802472]  kunit_try_run_case+0x170/0x3f0
[   63.802490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.802510]  kthread+0x328/0x630
[   63.802524]  ret_from_fork+0x10/0x20
[   63.802540] 
[   63.875706] Allocated by task 363:
[   63.879164]  kasan_save_stack+0x3c/0x68
[   63.883063]  kasan_save_track+0x20/0x40
[   63.886961]  kasan_save_alloc_info+0x40/0x58
[   63.891299]  __kasan_kmalloc+0xd4/0xd8
[   63.895108]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.899710]  kasan_atomics+0xb8/0x2e0
[   63.903433]  kunit_try_run_case+0x170/0x3f0
[   63.907687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.913255]  kthread+0x328/0x630
[   63.916540]  ret_from_fork+0x10/0x20
[   63.920175] 
[   63.921699] The buggy address belongs to the object at ffff000080acff00
[   63.921699]  which belongs to the cache kmalloc-64 of size 64
[   63.934176] The buggy address is located 0 bytes to the right of
[   63.934176]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   63.947177] 
[   63.948700] The buggy address belongs to the physical page:
[   63.954345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   63.962450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.969058] page_type: f5(slab)
[   63.972257] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.980093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.987925] page dumped because: kasan: bad access detected
[   63.993571] 
[   63.995093] Memory state around the buggy address:
[   63.999948]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.007259]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.014570] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.021879]                                      ^
[   64.026736]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.034048]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.041358] ==================================================================
[   67.270428] ==================================================================
[   67.277738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   67.285230] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   67.292718] 
[   67.294243] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   67.294272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.294282] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.294293] Call trace:
[   67.294299]  show_stack+0x20/0x38 (C)
[   67.294317]  dump_stack_lvl+0x8c/0xd0
[   67.294335]  print_report+0x118/0x608
[   67.294354]  kasan_report+0xdc/0x128
[   67.294374]  __asan_report_store8_noabort+0x20/0x30
[   67.294390]  kasan_atomics_helper+0x3e5c/0x4858
[   67.294409]  kasan_atomics+0x198/0x2e0
[   67.294426]  kunit_try_run_case+0x170/0x3f0
[   67.294444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.294465]  kthread+0x328/0x630
[   67.294479]  ret_from_fork+0x10/0x20
[   67.294496] 
[   67.364377] Allocated by task 363:
[   67.367832]  kasan_save_stack+0x3c/0x68
[   67.371731]  kasan_save_track+0x20/0x40
[   67.375627]  kasan_save_alloc_info+0x40/0x58
[   67.379965]  __kasan_kmalloc+0xd4/0xd8
[   67.383776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.388378]  kasan_atomics+0xb8/0x2e0
[   67.392101]  kunit_try_run_case+0x170/0x3f0
[   67.396355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.401922]  kthread+0x328/0x630
[   67.405208]  ret_from_fork+0x10/0x20
[   67.408842] 
[   67.410365] The buggy address belongs to the object at ffff000080acff00
[   67.410365]  which belongs to the cache kmalloc-64 of size 64
[   67.422843] The buggy address is located 0 bytes to the right of
[   67.422843]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   67.435844] 
[   67.437367] The buggy address belongs to the physical page:
[   67.443014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   67.451121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.457728] page_type: f5(slab)
[   67.460928] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   67.468763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.476595] page dumped because: kasan: bad access detected
[   67.482240] 
[   67.483763] Memory state around the buggy address:
[   67.488619]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.495930]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.503242] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.510552]                                      ^
[   67.515407]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.522718]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.530028] ==================================================================
[   58.651577] ==================================================================
[   58.658885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   58.666285] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   58.673770] 
[   58.675296] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   58.675324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.675333] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.675343] Call trace:
[   58.675349]  show_stack+0x20/0x38 (C)
[   58.675368]  dump_stack_lvl+0x8c/0xd0
[   58.675385]  print_report+0x118/0x608
[   58.675403]  kasan_report+0xdc/0x128
[   58.675422]  kasan_check_range+0x100/0x1a8
[   58.675444]  __kasan_check_write+0x20/0x30
[   58.675460]  kasan_atomics_helper+0x32c/0x4858
[   58.675479]  kasan_atomics+0x198/0x2e0
[   58.675495]  kunit_try_run_case+0x170/0x3f0
[   58.675513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.675533]  kthread+0x328/0x630
[   58.675547]  ret_from_fork+0x10/0x20
[   58.675564] 
[   58.748728] Allocated by task 363:
[   58.752184]  kasan_save_stack+0x3c/0x68
[   58.756082]  kasan_save_track+0x20/0x40
[   58.759979]  kasan_save_alloc_info+0x40/0x58
[   58.764319]  __kasan_kmalloc+0xd4/0xd8
[   58.768128]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.772729]  kasan_atomics+0xb8/0x2e0
[   58.776450]  kunit_try_run_case+0x170/0x3f0
[   58.780703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.786272]  kthread+0x328/0x630
[   58.789557]  ret_from_fork+0x10/0x20
[   58.793193] 
[   58.794717] The buggy address belongs to the object at ffff000080acff00
[   58.794717]  which belongs to the cache kmalloc-64 of size 64
[   58.807196] The buggy address is located 0 bytes to the right of
[   58.807196]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   58.820197] 
[   58.821722] The buggy address belongs to the physical page:
[   58.827367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   58.835475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.842081] page_type: f5(slab)
[   58.845280] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.853117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.860948] page dumped because: kasan: bad access detected
[   58.866593] 
[   58.868116] Memory state around the buggy address:
[   58.872971]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.880282]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.887595] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.894906]                                      ^
[   58.899763]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.907073]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   58.914383] ==================================================================
[   67.537390] ==================================================================
[   67.544700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   67.552103] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   67.559592] 
[   67.561117] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   67.561145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.561153] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.561164] Call trace:
[   67.561170]  show_stack+0x20/0x38 (C)
[   67.561187]  dump_stack_lvl+0x8c/0xd0
[   67.561204]  print_report+0x118/0x608
[   67.561223]  kasan_report+0xdc/0x128
[   67.561241]  kasan_check_range+0x100/0x1a8
[   67.561261]  __kasan_check_write+0x20/0x30
[   67.561277]  kasan_atomics_helper+0xeb8/0x4858
[   67.561295]  kasan_atomics+0x198/0x2e0
[   67.561311]  kunit_try_run_case+0x170/0x3f0
[   67.561328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.561348]  kthread+0x328/0x630
[   67.561363]  ret_from_fork+0x10/0x20
[   67.561379] 
[   67.634542] Allocated by task 363:
[   67.637998]  kasan_save_stack+0x3c/0x68
[   67.641895]  kasan_save_track+0x20/0x40
[   67.645792]  kasan_save_alloc_info+0x40/0x58
[   67.650130]  __kasan_kmalloc+0xd4/0xd8
[   67.653938]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.658540]  kasan_atomics+0xb8/0x2e0
[   67.662261]  kunit_try_run_case+0x170/0x3f0
[   67.666514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.672083]  kthread+0x328/0x630
[   67.675369]  ret_from_fork+0x10/0x20
[   67.679003] 
[   67.680526] The buggy address belongs to the object at ffff000080acff00
[   67.680526]  which belongs to the cache kmalloc-64 of size 64
[   67.693003] The buggy address is located 0 bytes to the right of
[   67.693003]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   67.706003] 
[   67.707526] The buggy address belongs to the physical page:
[   67.713171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   67.721280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.727886] page_type: f5(slab)
[   67.731085] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   67.738921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.746754] page dumped because: kasan: bad access detected
[   67.752400] 
[   67.753933] Memory state around the buggy address:
[   67.758788]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.766099]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.773411] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.780721]                                      ^
[   67.785576]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.792887]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.800197] ==================================================================
[   65.389512] ==================================================================
[   65.396822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   65.404226] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   65.411716] 
[   65.413242] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   65.413271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.413278] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.413290] Call trace:
[   65.413296]  show_stack+0x20/0x38 (C)
[   65.413313]  dump_stack_lvl+0x8c/0xd0
[   65.413330]  print_report+0x118/0x608
[   65.413348]  kasan_report+0xdc/0x128
[   65.413366]  kasan_check_range+0x100/0x1a8
[   65.413386]  __kasan_check_write+0x20/0x30
[   65.413401]  kasan_atomics_helper+0xca0/0x4858
[   65.413419]  kasan_atomics+0x198/0x2e0
[   65.413435]  kunit_try_run_case+0x170/0x3f0
[   65.413453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.413475]  kthread+0x328/0x630
[   65.413489]  ret_from_fork+0x10/0x20
[   65.413505] 
[   65.486668] Allocated by task 363:
[   65.490123]  kasan_save_stack+0x3c/0x68
[   65.494021]  kasan_save_track+0x20/0x40
[   65.497918]  kasan_save_alloc_info+0x40/0x58
[   65.502256]  __kasan_kmalloc+0xd4/0xd8
[   65.506065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.510667]  kasan_atomics+0xb8/0x2e0
[   65.514388]  kunit_try_run_case+0x170/0x3f0
[   65.518640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.524209]  kthread+0x328/0x630
[   65.527495]  ret_from_fork+0x10/0x20
[   65.531129] 
[   65.532652] The buggy address belongs to the object at ffff000080acff00
[   65.532652]  which belongs to the cache kmalloc-64 of size 64
[   65.545128] The buggy address is located 0 bytes to the right of
[   65.545128]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   65.558129] 
[   65.559652] The buggy address belongs to the physical page:
[   65.565297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   65.573403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.580013] page_type: f5(slab)
[   65.583211] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.591047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.598878] page dumped because: kasan: bad access detected
[   65.604523] 
[   65.606045] Memory state around the buggy address:
[   65.610901]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.618211]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.625522] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.632831]                                      ^
[   65.637687]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.644999]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.652308] ==================================================================
[   69.969911] ==================================================================
[   69.977222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   69.984713] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   69.992200] 
[   69.993725] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   69.993754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.993761] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.993772] Call trace:
[   69.993779]  show_stack+0x20/0x38 (C)
[   69.993796]  dump_stack_lvl+0x8c/0xd0
[   69.993814]  print_report+0x118/0x608
[   69.993832]  kasan_report+0xdc/0x128
[   69.993850]  kasan_check_range+0x100/0x1a8
[   69.993870]  __kasan_check_write+0x20/0x30
[   69.993886]  kasan_atomics_helper+0x126c/0x4858
[   69.993904]  kasan_atomics+0x198/0x2e0
[   69.993920]  kunit_try_run_case+0x170/0x3f0
[   69.993938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.993958]  kthread+0x328/0x630
[   69.993971]  ret_from_fork+0x10/0x20
[   69.993988] 
[   70.067238] Allocated by task 363:
[   70.070693]  kasan_save_stack+0x3c/0x68
[   70.074593]  kasan_save_track+0x20/0x40
[   70.078490]  kasan_save_alloc_info+0x40/0x58
[   70.082830]  __kasan_kmalloc+0xd4/0xd8
[   70.086641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.091242]  kasan_atomics+0xb8/0x2e0
[   70.094964]  kunit_try_run_case+0x170/0x3f0
[   70.099218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.104787]  kthread+0x328/0x630
[   70.108074]  ret_from_fork+0x10/0x20
[   70.111709] 
[   70.113232] The buggy address belongs to the object at ffff000080acff00
[   70.113232]  which belongs to the cache kmalloc-64 of size 64
[   70.125708] The buggy address is located 0 bytes to the right of
[   70.125708]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   70.138708] 
[   70.140231] The buggy address belongs to the physical page:
[   70.145877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   70.153984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.160590] page_type: f5(slab)
[   70.163788] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.171623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.179456] page dumped because: kasan: bad access detected
[   70.185103] 
[   70.186626] Memory state around the buggy address:
[   70.191480]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.198791]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.206102] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.213411]                                      ^
[   70.218267]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.225577]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   70.232887] ==================================================================
[   70.510623] ==================================================================
[   70.517935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   70.525432] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   70.532925] 
[   70.534450] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   70.534479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.534488] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.534498] Call trace:
[   70.534504]  show_stack+0x20/0x38 (C)
[   70.534521]  dump_stack_lvl+0x8c/0xd0
[   70.534539]  print_report+0x118/0x608
[   70.534557]  kasan_report+0xdc/0x128
[   70.534575]  kasan_check_range+0x100/0x1a8
[   70.534595]  __kasan_check_write+0x20/0x30
[   70.534610]  kasan_atomics_helper+0x1384/0x4858
[   70.534629]  kasan_atomics+0x198/0x2e0
[   70.534646]  kunit_try_run_case+0x170/0x3f0
[   70.534664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.534685]  kthread+0x328/0x630
[   70.534698]  ret_from_fork+0x10/0x20
[   70.534715] 
[   70.607950] Allocated by task 363:
[   70.611406]  kasan_save_stack+0x3c/0x68
[   70.615306]  kasan_save_track+0x20/0x40
[   70.619203]  kasan_save_alloc_info+0x40/0x58
[   70.623541]  __kasan_kmalloc+0xd4/0xd8
[   70.627350]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.631953]  kasan_atomics+0xb8/0x2e0
[   70.635675]  kunit_try_run_case+0x170/0x3f0
[   70.639929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.645497]  kthread+0x328/0x630
[   70.648783]  ret_from_fork+0x10/0x20
[   70.652418] 
[   70.653940] The buggy address belongs to the object at ffff000080acff00
[   70.653940]  which belongs to the cache kmalloc-64 of size 64
[   70.666420] The buggy address is located 0 bytes to the right of
[   70.666420]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   70.679419] 
[   70.680942] The buggy address belongs to the physical page:
[   70.686589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   70.694696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.701305] page_type: f5(slab)
[   70.704504] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.712340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.720171] page dumped because: kasan: bad access detected
[   70.725817] 
[   70.727340] Memory state around the buggy address:
[   70.732196]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.739508]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.746820] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.754130]                                      ^
[   70.758986]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.766297]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   70.773607] ==================================================================
[   61.079930] ==================================================================
[   61.087240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   61.094642] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   61.102131] 
[   61.103657] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   61.103687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.103695] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.103705] Call trace:
[   61.103712]  show_stack+0x20/0x38 (C)
[   61.103730]  dump_stack_lvl+0x8c/0xd0
[   61.103748]  print_report+0x118/0x608
[   61.103766]  kasan_report+0xdc/0x128
[   61.103784]  kasan_check_range+0x100/0x1a8
[   61.103803]  __kasan_check_write+0x20/0x30
[   61.103818]  kasan_atomics_helper+0x684/0x4858
[   61.103837]  kasan_atomics+0x198/0x2e0
[   61.103853]  kunit_try_run_case+0x170/0x3f0
[   61.103873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.103893]  kthread+0x328/0x630
[   61.103906]  ret_from_fork+0x10/0x20
[   61.103922] 
[   61.177086] Allocated by task 363:
[   61.180543]  kasan_save_stack+0x3c/0x68
[   61.184443]  kasan_save_track+0x20/0x40
[   61.188341]  kasan_save_alloc_info+0x40/0x58
[   61.192680]  __kasan_kmalloc+0xd4/0xd8
[   61.196489]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.201092]  kasan_atomics+0xb8/0x2e0
[   61.204813]  kunit_try_run_case+0x170/0x3f0
[   61.209067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.214637]  kthread+0x328/0x630
[   61.217923]  ret_from_fork+0x10/0x20
[   61.221558] 
[   61.223081] The buggy address belongs to the object at ffff000080acff00
[   61.223081]  which belongs to the cache kmalloc-64 of size 64
[   61.235559] The buggy address is located 0 bytes to the right of
[   61.235559]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   61.248559] 
[   61.250083] The buggy address belongs to the physical page:
[   61.255729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   61.263836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.270444] page_type: f5(slab)
[   61.273643] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.281479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.289311] page dumped because: kasan: bad access detected
[   61.294957] 
[   61.296479] Memory state around the buggy address:
[   61.301335]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.308647]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.315959] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.323268]                                      ^
[   61.328124]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.335434]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.342744] ==================================================================
[   62.430930] ==================================================================
[   62.438241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   62.445733] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   62.453133] 
[   62.454659] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   62.454688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.454696] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.454707] Call trace:
[   62.454714]  show_stack+0x20/0x38 (C)
[   62.454731]  dump_stack_lvl+0x8c/0xd0
[   62.454749]  print_report+0x118/0x608
[   62.454767]  kasan_report+0xdc/0x128
[   62.454786]  __asan_report_load4_noabort+0x20/0x30
[   62.454804]  kasan_atomics_helper+0x42d8/0x4858
[   62.454822]  kasan_atomics+0x198/0x2e0
[   62.454838]  kunit_try_run_case+0x170/0x3f0
[   62.454858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.454879]  kthread+0x328/0x630
[   62.454893]  ret_from_fork+0x10/0x20
[   62.454911] 
[   62.524708] Allocated by task 363:
[   62.528165]  kasan_save_stack+0x3c/0x68
[   62.532063]  kasan_save_track+0x20/0x40
[   62.535960]  kasan_save_alloc_info+0x40/0x58
[   62.540297]  __kasan_kmalloc+0xd4/0xd8
[   62.544106]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.548708]  kasan_atomics+0xb8/0x2e0
[   62.552429]  kunit_try_run_case+0x170/0x3f0
[   62.556682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.562251]  kthread+0x328/0x630
[   62.565537]  ret_from_fork+0x10/0x20
[   62.569172] 
[   62.570696] The buggy address belongs to the object at ffff000080acff00
[   62.570696]  which belongs to the cache kmalloc-64 of size 64
[   62.583172] The buggy address is located 0 bytes to the right of
[   62.583172]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   62.596174] 
[   62.597698] The buggy address belongs to the physical page:
[   62.603343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   62.611449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.618056] page_type: f5(slab)
[   62.621254] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.629090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.636921] page dumped because: kasan: bad access detected
[   62.642568] 
[   62.644091] Memory state around the buggy address:
[   62.648945]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.656257]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.663568] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.670877]                                      ^
[   62.675732]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.683043]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.690351] ==================================================================
[   65.659681] ==================================================================
[   65.666990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   65.674481] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   65.681882] 
[   65.683407] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   65.683436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.683444] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.683454] Call trace:
[   65.683461]  show_stack+0x20/0x38 (C)
[   65.683479]  dump_stack_lvl+0x8c/0xd0
[   65.683497]  print_report+0x118/0x608
[   65.683515]  kasan_report+0xdc/0x128
[   65.683534]  __asan_report_load4_noabort+0x20/0x30
[   65.683552]  kasan_atomics_helper+0x3dd8/0x4858
[   65.683570]  kasan_atomics+0x198/0x2e0
[   65.683586]  kunit_try_run_case+0x170/0x3f0
[   65.683604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.683624]  kthread+0x328/0x630
[   65.683637]  ret_from_fork+0x10/0x20
[   65.683654] 
[   65.753451] Allocated by task 363:
[   65.756907]  kasan_save_stack+0x3c/0x68
[   65.760807]  kasan_save_track+0x20/0x40
[   65.764703]  kasan_save_alloc_info+0x40/0x58
[   65.769042]  __kasan_kmalloc+0xd4/0xd8
[   65.772851]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.777453]  kasan_atomics+0xb8/0x2e0
[   65.781174]  kunit_try_run_case+0x170/0x3f0
[   65.785428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.790995]  kthread+0x328/0x630
[   65.794282]  ret_from_fork+0x10/0x20
[   65.797917] 
[   65.799440] The buggy address belongs to the object at ffff000080acff00
[   65.799440]  which belongs to the cache kmalloc-64 of size 64
[   65.811920] The buggy address is located 0 bytes to the right of
[   65.811920]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   65.824922] 
[   65.826455] The buggy address belongs to the physical page:
[   65.832101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   65.840209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.846816] page_type: f5(slab)
[   65.850016] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.857852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.865684] page dumped because: kasan: bad access detected
[   65.871330] 
[   65.872853] Memory state around the buggy address:
[   65.877708]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.885020]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.892332] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.899641]                                      ^
[   65.904497]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.911808]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.919119] ==================================================================
[   71.588496] ==================================================================
[   71.595807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   71.603298] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   71.610787] 
[   71.612312] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   71.612341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.612350] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.612361] Call trace:
[   71.612367]  show_stack+0x20/0x38 (C)
[   71.612384]  dump_stack_lvl+0x8c/0xd0
[   71.612401]  print_report+0x118/0x608
[   71.612421]  kasan_report+0xdc/0x128
[   71.612439]  kasan_check_range+0x100/0x1a8
[   71.612459]  __kasan_check_write+0x20/0x30
[   71.612474]  kasan_atomics_helper+0x14e4/0x4858
[   71.612492]  kasan_atomics+0x198/0x2e0
[   71.612510]  kunit_try_run_case+0x170/0x3f0
[   71.612528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.612548]  kthread+0x328/0x630
[   71.612561]  ret_from_fork+0x10/0x20
[   71.612577] 
[   71.685829] Allocated by task 363:
[   71.689285]  kasan_save_stack+0x3c/0x68
[   71.693184]  kasan_save_track+0x20/0x40
[   71.697082]  kasan_save_alloc_info+0x40/0x58
[   71.701419]  __kasan_kmalloc+0xd4/0xd8
[   71.705227]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.709829]  kasan_atomics+0xb8/0x2e0
[   71.713550]  kunit_try_run_case+0x170/0x3f0
[   71.717803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.723372]  kthread+0x328/0x630
[   71.726657]  ret_from_fork+0x10/0x20
[   71.730292] 
[   71.731814] The buggy address belongs to the object at ffff000080acff00
[   71.731814]  which belongs to the cache kmalloc-64 of size 64
[   71.744292] The buggy address is located 0 bytes to the right of
[   71.744292]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   71.757293] 
[   71.758815] The buggy address belongs to the physical page:
[   71.764461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   71.772567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.779173] page_type: f5(slab)
[   71.782375] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.790212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.798043] page dumped because: kasan: bad access detected
[   71.803690] 
[   71.805213] Memory state around the buggy address:
[   71.810068]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.817382]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.824693] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.832002]                                      ^
[   71.836859]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.844170]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   71.851479] ==================================================================
[   71.318140] ==================================================================
[   71.325452] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   71.332944] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   71.340432] 
[   71.341957] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   71.341986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.341994] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.342005] Call trace:
[   71.342011]  show_stack+0x20/0x38 (C)
[   71.342027]  dump_stack_lvl+0x8c/0xd0
[   71.342046]  print_report+0x118/0x608
[   71.342066]  kasan_report+0xdc/0x128
[   71.342085]  kasan_check_range+0x100/0x1a8
[   71.342104]  __kasan_check_write+0x20/0x30
[   71.342119]  kasan_atomics_helper+0x147c/0x4858
[   71.342138]  kasan_atomics+0x198/0x2e0
[   71.342154]  kunit_try_run_case+0x170/0x3f0
[   71.342172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.342192]  kthread+0x328/0x630
[   71.342207]  ret_from_fork+0x10/0x20
[   71.342223] 
[   71.415474] Allocated by task 363:
[   71.418930]  kasan_save_stack+0x3c/0x68
[   71.422830]  kasan_save_track+0x20/0x40
[   71.426727]  kasan_save_alloc_info+0x40/0x58
[   71.431065]  __kasan_kmalloc+0xd4/0xd8
[   71.434873]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.439474]  kasan_atomics+0xb8/0x2e0
[   71.443196]  kunit_try_run_case+0x170/0x3f0
[   71.447449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.453018]  kthread+0x328/0x630
[   71.456305]  ret_from_fork+0x10/0x20
[   71.459939] 
[   71.461462] The buggy address belongs to the object at ffff000080acff00
[   71.461462]  which belongs to the cache kmalloc-64 of size 64
[   71.473942] The buggy address is located 0 bytes to the right of
[   71.473942]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   71.486941] 
[   71.488464] The buggy address belongs to the physical page:
[   71.494109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   71.502214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.508822] page_type: f5(slab)
[   71.512021] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.519858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.527690] page dumped because: kasan: bad access detected
[   71.533335] 
[   71.534857] Memory state around the buggy address:
[   71.539712]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.547024]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.554335] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.561644]                                      ^
[   71.566500]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.573811]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   71.581121] ==================================================================
[   69.158763] ==================================================================
[   69.166074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   69.173566] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   69.181055] 
[   69.182580] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   69.182609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.182616] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.182627] Call trace:
[   69.182633]  show_stack+0x20/0x38 (C)
[   69.182650]  dump_stack_lvl+0x8c/0xd0
[   69.182667]  print_report+0x118/0x608
[   69.182685]  kasan_report+0xdc/0x128
[   69.182703]  kasan_check_range+0x100/0x1a8
[   69.182724]  __kasan_check_write+0x20/0x30
[   69.182739]  kasan_atomics_helper+0x1128/0x4858
[   69.182759]  kasan_atomics+0x198/0x2e0
[   69.182776]  kunit_try_run_case+0x170/0x3f0
[   69.182793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.182814]  kthread+0x328/0x630
[   69.182829]  ret_from_fork+0x10/0x20
[   69.182845] 
[   69.256097] Allocated by task 363:
[   69.259553]  kasan_save_stack+0x3c/0x68
[   69.263451]  kasan_save_track+0x20/0x40
[   69.267350]  kasan_save_alloc_info+0x40/0x58
[   69.271689]  __kasan_kmalloc+0xd4/0xd8
[   69.275498]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.280098]  kasan_atomics+0xb8/0x2e0
[   69.283820]  kunit_try_run_case+0x170/0x3f0
[   69.288074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.293642]  kthread+0x328/0x630
[   69.296928]  ret_from_fork+0x10/0x20
[   69.300562] 
[   69.302085] The buggy address belongs to the object at ffff000080acff00
[   69.302085]  which belongs to the cache kmalloc-64 of size 64
[   69.314568] The buggy address is located 0 bytes to the right of
[   69.314568]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   69.327577] 
[   69.329103] The buggy address belongs to the physical page:
[   69.334750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   69.342860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.349469] page_type: f5(slab)
[   69.352669] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.360508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.368341] page dumped because: kasan: bad access detected
[   69.373987] 
[   69.375511] Memory state around the buggy address:
[   69.380367]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.387678]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.394989] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.402298]                                      ^
[   69.407155]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.414466]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   69.421776] ==================================================================
[   59.188727] ==================================================================
[   59.196037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   59.203440] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   59.210929] 
[   59.212454] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   59.212484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.212491] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.212501] Call trace:
[   59.212506]  show_stack+0x20/0x38 (C)
[   59.212523]  dump_stack_lvl+0x8c/0xd0
[   59.212541]  print_report+0x118/0x608
[   59.212559]  kasan_report+0xdc/0x128
[   59.212577]  kasan_check_range+0x100/0x1a8
[   59.212596]  __kasan_check_write+0x20/0x30
[   59.212613]  kasan_atomics_helper+0x3ac/0x4858
[   59.212633]  kasan_atomics+0x198/0x2e0
[   59.212650]  kunit_try_run_case+0x170/0x3f0
[   59.212667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.212688]  kthread+0x328/0x630
[   59.212701]  ret_from_fork+0x10/0x20
[   59.212719] 
[   59.285883] Allocated by task 363:
[   59.289338]  kasan_save_stack+0x3c/0x68
[   59.293237]  kasan_save_track+0x20/0x40
[   59.297135]  kasan_save_alloc_info+0x40/0x58
[   59.301473]  __kasan_kmalloc+0xd4/0xd8
[   59.305283]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.309884]  kasan_atomics+0xb8/0x2e0
[   59.313605]  kunit_try_run_case+0x170/0x3f0
[   59.317859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.323428]  kthread+0x328/0x630
[   59.326713]  ret_from_fork+0x10/0x20
[   59.330348] 
[   59.331870] The buggy address belongs to the object at ffff000080acff00
[   59.331870]  which belongs to the cache kmalloc-64 of size 64
[   59.344345] The buggy address is located 0 bytes to the right of
[   59.344345]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   59.357353] 
[   59.358876] The buggy address belongs to the physical page:
[   59.364522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   59.372629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.379236] page_type: f5(slab)
[   59.382434] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.390271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.398103] page dumped because: kasan: bad access detected
[   59.403749] 
[   59.405272] Memory state around the buggy address:
[   59.410127]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.417440]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.424751] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.432060]                                      ^
[   59.436916]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.444226]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   59.451535] ==================================================================
[   73.740641] ==================================================================
[   73.747952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   73.755441] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   73.762929] 
[   73.764453] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   73.764481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.764489] Hardware name: Thundercomm Dragonboard 845c (DT)
[   73.764498] Call trace:
[   73.764504]  show_stack+0x20/0x38 (C)
[   73.764521]  dump_stack_lvl+0x8c/0xd0
[   73.764538]  print_report+0x118/0x608
[   73.764556]  kasan_report+0xdc/0x128
[   73.764574]  kasan_check_range+0x100/0x1a8
[   73.764593]  __kasan_check_write+0x20/0x30
[   73.764608]  kasan_atomics_helper+0x175c/0x4858
[   73.764626]  kasan_atomics+0x198/0x2e0
[   73.764643]  kunit_try_run_case+0x170/0x3f0
[   73.764661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.764681]  kthread+0x328/0x630
[   73.764694]  ret_from_fork+0x10/0x20
[   73.764710] 
[   73.837961] Allocated by task 363:
[   73.841416]  kasan_save_stack+0x3c/0x68
[   73.845314]  kasan_save_track+0x20/0x40
[   73.849211]  kasan_save_alloc_info+0x40/0x58
[   73.853549]  __kasan_kmalloc+0xd4/0xd8
[   73.857358]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.861959]  kasan_atomics+0xb8/0x2e0
[   73.865680]  kunit_try_run_case+0x170/0x3f0
[   73.869932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.875499]  kthread+0x328/0x630
[   73.878785]  ret_from_fork+0x10/0x20
[   73.882419] 
[   73.883941] The buggy address belongs to the object at ffff000080acff00
[   73.883941]  which belongs to the cache kmalloc-64 of size 64
[   73.896418] The buggy address is located 0 bytes to the right of
[   73.896418]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   73.909417] 
[   73.910941] The buggy address belongs to the physical page:
[   73.916587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   73.924692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.931299] page_type: f5(slab)
[   73.934498] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.942333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.950163] page dumped because: kasan: bad access detected
[   73.955808] 
[   73.957331] Memory state around the buggy address:
[   73.962184]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.969495]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.976806] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.984115]                                      ^
[   73.988970]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.996280]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.003589] ==================================================================
[   59.729090] ==================================================================
[   59.736400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   59.743805] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   59.751293] 
[   59.752818] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   59.752847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.752854] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.752866] Call trace:
[   59.752872]  show_stack+0x20/0x38 (C)
[   59.752889]  dump_stack_lvl+0x8c/0xd0
[   59.752908]  print_report+0x118/0x608
[   59.752925]  kasan_report+0xdc/0x128
[   59.752944]  kasan_check_range+0x100/0x1a8
[   59.752962]  __kasan_check_write+0x20/0x30
[   59.752977]  kasan_atomics_helper+0x47c/0x4858
[   59.752997]  kasan_atomics+0x198/0x2e0
[   59.753014]  kunit_try_run_case+0x170/0x3f0
[   59.753031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.753051]  kthread+0x328/0x630
[   59.753065]  ret_from_fork+0x10/0x20
[   59.753081] 
[   59.826236] Allocated by task 363:
[   59.829692]  kasan_save_stack+0x3c/0x68
[   59.833589]  kasan_save_track+0x20/0x40
[   59.837486]  kasan_save_alloc_info+0x40/0x58
[   59.841823]  __kasan_kmalloc+0xd4/0xd8
[   59.845632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.850235]  kasan_atomics+0xb8/0x2e0
[   59.853957]  kunit_try_run_case+0x170/0x3f0
[   59.858210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.863778]  kthread+0x328/0x630
[   59.867064]  ret_from_fork+0x10/0x20
[   59.870699] 
[   59.872222] The buggy address belongs to the object at ffff000080acff00
[   59.872222]  which belongs to the cache kmalloc-64 of size 64
[   59.884698] The buggy address is located 0 bytes to the right of
[   59.884698]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   59.897699] 
[   59.899223] The buggy address belongs to the physical page:
[   59.904869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   59.912975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.919582] page_type: f5(slab)
[   59.922780] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.930616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.938449] page dumped because: kasan: bad access detected
[   59.944094] 
[   59.945618] Memory state around the buggy address:
[   59.950473]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.957784]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.965095] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.972404]                                      ^
[   59.977259]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.984572]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   59.991882] ==================================================================
[   57.306328] ==================================================================
[   57.313644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   57.321138] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   57.328637] 
[   57.330171] CPU: 3 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   57.330201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.330212] Hardware name: Thundercomm Dragonboard 845c (DT)
[   57.330224] Call trace:
[   57.330231]  show_stack+0x20/0x38 (C)
[   57.330251]  dump_stack_lvl+0x8c/0xd0
[   57.330272]  print_report+0x118/0x608
[   57.330293]  kasan_report+0xdc/0x128
[   57.330313]  __asan_report_store4_noabort+0x20/0x30
[   57.330333]  kasan_atomics_helper+0x3f7c/0x4858
[   57.330355]  kasan_atomics+0x198/0x2e0
[   57.330375]  kunit_try_run_case+0x170/0x3f0
[   57.330396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.330419]  kthread+0x328/0x630
[   57.330435]  ret_from_fork+0x10/0x20
[   57.330454] 
[   57.400377] Allocated by task 363:
[   57.403838]  kasan_save_stack+0x3c/0x68
[   57.407752]  kasan_save_track+0x20/0x40
[   57.411654]  kasan_save_alloc_info+0x40/0x58
[   57.415993]  __kasan_kmalloc+0xd4/0xd8
[   57.419807]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.424410]  kasan_atomics+0xb8/0x2e0
[   57.428145]  kunit_try_run_case+0x170/0x3f0
[   57.432400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.437976]  kthread+0x328/0x630
[   57.441269]  ret_from_fork+0x10/0x20
[   57.444910] 
[   57.446441] The buggy address belongs to the object at ffff000080acff00
[   57.446441]  which belongs to the cache kmalloc-64 of size 64
[   57.458926] The buggy address is located 0 bytes to the right of
[   57.458926]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   57.471938] 
[   57.473470] The buggy address belongs to the physical page:
[   57.479120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   57.487227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.493844] page_type: f5(slab)
[   57.497049] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   57.504899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.512745] page dumped because: kasan: bad access detected
[   57.518396] 
[   57.519933] Memory state around the buggy address:
[   57.524797]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.532122]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.539442] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.546757]                                      ^
[   57.551621]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.558938]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   57.566254] ==================================================================
[   70.240251] ==================================================================
[   70.247562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   70.255056] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   70.262545] 
[   70.264071] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   70.264101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.264110] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.264121] Call trace:
[   70.264128]  show_stack+0x20/0x38 (C)
[   70.264145]  dump_stack_lvl+0x8c/0xd0
[   70.264162]  print_report+0x118/0x608
[   70.264180]  kasan_report+0xdc/0x128
[   70.264198]  kasan_check_range+0x100/0x1a8
[   70.264217]  __kasan_check_write+0x20/0x30
[   70.264233]  kasan_atomics_helper+0x12d8/0x4858
[   70.264253]  kasan_atomics+0x198/0x2e0
[   70.264269]  kunit_try_run_case+0x170/0x3f0
[   70.264287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.264307]  kthread+0x328/0x630
[   70.264321]  ret_from_fork+0x10/0x20
[   70.264339] 
[   70.337592] Allocated by task 363:
[   70.341048]  kasan_save_stack+0x3c/0x68
[   70.344946]  kasan_save_track+0x20/0x40
[   70.348845]  kasan_save_alloc_info+0x40/0x58
[   70.353182]  __kasan_kmalloc+0xd4/0xd8
[   70.356992]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.361594]  kasan_atomics+0xb8/0x2e0
[   70.365315]  kunit_try_run_case+0x170/0x3f0
[   70.369568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.375138]  kthread+0x328/0x630
[   70.378423]  ret_from_fork+0x10/0x20
[   70.382058] 
[   70.383581] The buggy address belongs to the object at ffff000080acff00
[   70.383581]  which belongs to the cache kmalloc-64 of size 64
[   70.396058] The buggy address is located 0 bytes to the right of
[   70.396058]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   70.409060] 
[   70.410584] The buggy address belongs to the physical page:
[   70.416230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   70.424338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.430944] page_type: f5(slab)
[   70.434144] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.441980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.449812] page dumped because: kasan: bad access detected
[   70.455459] 
[   70.456981] Memory state around the buggy address:
[   70.461836]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.469148]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.476462] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.483771]                                      ^
[   70.488628]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.495938]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   70.503249] ==================================================================
[   62.967904] ==================================================================
[   62.975214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   62.982618] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   62.990106] 
[   62.991631] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   62.991661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.991669] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.991678] Call trace:
[   62.991684]  show_stack+0x20/0x38 (C)
[   62.991701]  dump_stack_lvl+0x8c/0xd0
[   62.991718]  print_report+0x118/0x608
[   62.991736]  kasan_report+0xdc/0x128
[   62.991754]  kasan_check_range+0x100/0x1a8
[   62.991774]  __kasan_check_write+0x20/0x30
[   62.991789]  kasan_atomics_helper+0x99c/0x4858
[   62.991808]  kasan_atomics+0x198/0x2e0
[   62.991824]  kunit_try_run_case+0x170/0x3f0
[   62.991842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.991863]  kthread+0x328/0x630
[   62.991876]  ret_from_fork+0x10/0x20
[   62.991892] 
[   63.065055] Allocated by task 363:
[   63.068510]  kasan_save_stack+0x3c/0x68
[   63.072408]  kasan_save_track+0x20/0x40
[   63.076305]  kasan_save_alloc_info+0x40/0x58
[   63.080642]  __kasan_kmalloc+0xd4/0xd8
[   63.084453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.089055]  kasan_atomics+0xb8/0x2e0
[   63.092776]  kunit_try_run_case+0x170/0x3f0
[   63.097029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.102600]  kthread+0x328/0x630
[   63.105885]  ret_from_fork+0x10/0x20
[   63.109522] 
[   63.111045] The buggy address belongs to the object at ffff000080acff00
[   63.111045]  which belongs to the cache kmalloc-64 of size 64
[   63.123524] The buggy address is located 0 bytes to the right of
[   63.123524]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   63.136527] 
[   63.138050] The buggy address belongs to the physical page:
[   63.143697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   63.151804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.158411] page_type: f5(slab)
[   63.161611] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.169446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.177279] page dumped because: kasan: bad access detected
[   63.182926] 
[   63.184450] Memory state around the buggy address:
[   63.189306]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.196617]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.203929] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.211239]                                      ^
[   63.216094]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.223407]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.230717] ==================================================================
[   67.807572] ==================================================================
[   67.814880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   67.822284] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   67.829771] 
[   67.831296] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   67.831324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.831332] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.831342] Call trace:
[   67.831349]  show_stack+0x20/0x38 (C)
[   67.831366]  dump_stack_lvl+0x8c/0xd0
[   67.831383]  print_report+0x118/0x608
[   67.831402]  kasan_report+0xdc/0x128
[   67.831419]  kasan_check_range+0x100/0x1a8
[   67.831439]  __kasan_check_write+0x20/0x30
[   67.831454]  kasan_atomics_helper+0xf20/0x4858
[   67.831472]  kasan_atomics+0x198/0x2e0
[   67.831489]  kunit_try_run_case+0x170/0x3f0
[   67.831507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.831527]  kthread+0x328/0x630
[   67.831540]  ret_from_fork+0x10/0x20
[   67.831557] 
[   67.904722] Allocated by task 363:
[   67.908177]  kasan_save_stack+0x3c/0x68
[   67.912076]  kasan_save_track+0x20/0x40
[   67.915974]  kasan_save_alloc_info+0x40/0x58
[   67.920311]  __kasan_kmalloc+0xd4/0xd8
[   67.924120]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.928722]  kasan_atomics+0xb8/0x2e0
[   67.932443]  kunit_try_run_case+0x170/0x3f0
[   67.936695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.942263]  kthread+0x328/0x630
[   67.945548]  ret_from_fork+0x10/0x20
[   67.949184] 
[   67.950706] The buggy address belongs to the object at ffff000080acff00
[   67.950706]  which belongs to the cache kmalloc-64 of size 64
[   67.963183] The buggy address is located 0 bytes to the right of
[   67.963183]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   67.976183] 
[   67.977705] The buggy address belongs to the physical page:
[   67.983350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   67.991456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.998063] page_type: f5(slab)
[   68.001263] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.009098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.016930] page dumped because: kasan: bad access detected
[   68.022577] 
[   68.024098] Memory state around the buggy address:
[   68.028953]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.036265]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.043575] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.050884]                                      ^
[   68.055740]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.063051]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   68.070361] ==================================================================
[   66.733431] ==================================================================
[   66.740740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   66.748230] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   66.755632] 
[   66.757157] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   66.757186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.757194] Hardware name: Thundercomm Dragonboard 845c (DT)
[   66.757207] Call trace:
[   66.757214]  show_stack+0x20/0x38 (C)
[   66.757231]  dump_stack_lvl+0x8c/0xd0
[   66.757249]  print_report+0x118/0x608
[   66.757268]  kasan_report+0xdc/0x128
[   66.757286]  __asan_report_load8_noabort+0x20/0x30
[   66.757304]  kasan_atomics_helper+0x3f58/0x4858
[   66.757323]  kasan_atomics+0x198/0x2e0
[   66.757339]  kunit_try_run_case+0x170/0x3f0
[   66.757357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.757377]  kthread+0x328/0x630
[   66.757390]  ret_from_fork+0x10/0x20
[   66.757408] 
[   66.827207] Allocated by task 363:
[   66.830662]  kasan_save_stack+0x3c/0x68
[   66.834560]  kasan_save_track+0x20/0x40
[   66.838458]  kasan_save_alloc_info+0x40/0x58
[   66.842798]  __kasan_kmalloc+0xd4/0xd8
[   66.846608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.851209]  kasan_atomics+0xb8/0x2e0
[   66.854931]  kunit_try_run_case+0x170/0x3f0
[   66.859184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.864753]  kthread+0x328/0x630
[   66.868038]  ret_from_fork+0x10/0x20
[   66.871674] 
[   66.873197] The buggy address belongs to the object at ffff000080acff00
[   66.873197]  which belongs to the cache kmalloc-64 of size 64
[   66.885676] The buggy address is located 0 bytes to the right of
[   66.885676]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   66.898677] 
[   66.900201] The buggy address belongs to the physical page:
[   66.905846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   66.913954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.920562] page_type: f5(slab)
[   66.923762] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.931599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.939432] page dumped because: kasan: bad access detected
[   66.945079] 
[   66.946603] Memory state around the buggy address:
[   66.951458]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.958770]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.966083] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.973392]                                      ^
[   66.978249]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.985560]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.992870] ==================================================================
[   64.585765] ==================================================================
[   64.593075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   64.600566] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   64.607968] 
[   64.609494] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   64.609523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.609532] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.609542] Call trace:
[   64.609548]  show_stack+0x20/0x38 (C)
[   64.609565]  dump_stack_lvl+0x8c/0xd0
[   64.609583]  print_report+0x118/0x608
[   64.609602]  kasan_report+0xdc/0x128
[   64.609621]  __asan_report_load4_noabort+0x20/0x30
[   64.609637]  kasan_atomics_helper+0x3dbc/0x4858
[   64.609655]  kasan_atomics+0x198/0x2e0
[   64.609672]  kunit_try_run_case+0x170/0x3f0
[   64.609689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.609710]  kthread+0x328/0x630
[   64.609724]  ret_from_fork+0x10/0x20
[   64.609742] 
[   64.679539] Allocated by task 363:
[   64.682995]  kasan_save_stack+0x3c/0x68
[   64.686894]  kasan_save_track+0x20/0x40
[   64.690792]  kasan_save_alloc_info+0x40/0x58
[   64.695130]  __kasan_kmalloc+0xd4/0xd8
[   64.698941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.703542]  kasan_atomics+0xb8/0x2e0
[   64.707264]  kunit_try_run_case+0x170/0x3f0
[   64.711517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.717086]  kthread+0x328/0x630
[   64.720373]  ret_from_fork+0x10/0x20
[   64.724008] 
[   64.725531] The buggy address belongs to the object at ffff000080acff00
[   64.725531]  which belongs to the cache kmalloc-64 of size 64
[   64.738008] The buggy address is located 0 bytes to the right of
[   64.738008]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   64.751012] 
[   64.752535] The buggy address belongs to the physical page:
[   64.758180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   64.766287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.772894] page_type: f5(slab)
[   64.776093] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.783928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.791760] page dumped because: kasan: bad access detected
[   64.797406] 
[   64.798929] Memory state around the buggy address:
[   64.803785]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.811097]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.818409] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.825720]                                      ^
[   64.830577]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.837890]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.845200] ==================================================================
[   61.890507] ==================================================================
[   61.897816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   61.905220] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   61.912708] 
[   61.914233] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   61.914262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.914271] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.914283] Call trace:
[   61.914290]  show_stack+0x20/0x38 (C)
[   61.914307]  dump_stack_lvl+0x8c/0xd0
[   61.914325]  print_report+0x118/0x608
[   61.914344]  kasan_report+0xdc/0x128
[   61.914363]  kasan_check_range+0x100/0x1a8
[   61.914383]  __kasan_check_write+0x20/0x30
[   61.914400]  kasan_atomics_helper+0x7cc/0x4858
[   61.914419]  kasan_atomics+0x198/0x2e0
[   61.914435]  kunit_try_run_case+0x170/0x3f0
[   61.914453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.914476]  kthread+0x328/0x630
[   61.914489]  ret_from_fork+0x10/0x20
[   61.914506] 
[   61.987669] Allocated by task 363:
[   61.991125]  kasan_save_stack+0x3c/0x68
[   61.995024]  kasan_save_track+0x20/0x40
[   61.998922]  kasan_save_alloc_info+0x40/0x58
[   62.003261]  __kasan_kmalloc+0xd4/0xd8
[   62.007072]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.011673]  kasan_atomics+0xb8/0x2e0
[   62.015395]  kunit_try_run_case+0x170/0x3f0
[   62.019650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.025219]  kthread+0x328/0x630
[   62.028505]  ret_from_fork+0x10/0x20
[   62.032139] 
[   62.033662] The buggy address belongs to the object at ffff000080acff00
[   62.033662]  which belongs to the cache kmalloc-64 of size 64
[   62.046142] The buggy address is located 0 bytes to the right of
[   62.046142]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   62.059144] 
[   62.060668] The buggy address belongs to the physical page:
[   62.066315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   62.074421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.081029] page_type: f5(slab)
[   62.084228] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.092065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.099898] page dumped because: kasan: bad access detected
[   62.105544] 
[   62.107066] Memory state around the buggy address:
[   62.111922]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.119234]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.126546] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.133857]                                      ^
[   62.138712]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.146024]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.153334] ==================================================================
[   60.269425] ==================================================================
[   60.276734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   60.284139] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363
[   60.291627] 
[   60.293153] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   60.293180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.293188] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.293197] Call trace:
[   60.293203]  show_stack+0x20/0x38 (C)
[   60.293220]  dump_stack_lvl+0x8c/0xd0
[   60.293237]  print_report+0x118/0x608
[   60.293256]  kasan_report+0xdc/0x128
[   60.293273]  kasan_check_range+0x100/0x1a8
[   60.293293]  __kasan_check_write+0x20/0x30
[   60.293308]  kasan_atomics_helper+0x54c/0x4858
[   60.293327]  kasan_atomics+0x198/0x2e0
[   60.293344]  kunit_try_run_case+0x170/0x3f0
[   60.293361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.293382]  kthread+0x328/0x630
[   60.293396]  ret_from_fork+0x10/0x20
[   60.293412] 
[   60.366577] Allocated by task 363:
[   60.370033]  kasan_save_stack+0x3c/0x68
[   60.373931]  kasan_save_track+0x20/0x40
[   60.377829]  kasan_save_alloc_info+0x40/0x58
[   60.382166]  __kasan_kmalloc+0xd4/0xd8
[   60.385974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.390575]  kasan_atomics+0xb8/0x2e0
[   60.394297]  kunit_try_run_case+0x170/0x3f0
[   60.398550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.404119]  kthread+0x328/0x630
[   60.407405]  ret_from_fork+0x10/0x20
[   60.411039] 
[   60.412563] The buggy address belongs to the object at ffff000080acff00
[   60.412563]  which belongs to the cache kmalloc-64 of size 64
[   60.425041] The buggy address is located 0 bytes to the right of
[   60.425041]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   60.438041] 
[   60.439564] The buggy address belongs to the physical page:
[   60.445210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   60.453316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.459923] page_type: f5(slab)
[   60.463122] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   60.470959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.478792] page dumped because: kasan: bad access detected
[   60.484438] 
[   60.485960] Memory state around the buggy address:
[   60.490816]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.498126]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.505436] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.512745]                                      ^
[   60.517601]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.524912]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.532222] ==================================================================
[   69.429164] ==================================================================
[   69.436475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   69.443968] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363
[   69.451459] 
[   69.452984] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   69.453015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.453023] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.453036] Call trace:
[   69.453043]  show_stack+0x20/0x38 (C)
[   69.453061]  dump_stack_lvl+0x8c/0xd0
[   69.453080]  print_report+0x118/0x608
[   69.453099]  kasan_report+0xdc/0x128
[   69.453118]  kasan_check_range+0x100/0x1a8
[   69.453139]  __kasan_check_write+0x20/0x30
[   69.453155]  kasan_atomics_helper+0x1190/0x4858
[   69.453173]  kasan_atomics+0x198/0x2e0
[   69.453190]  kunit_try_run_case+0x170/0x3f0
[   69.453209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.453232]  kthread+0x328/0x630
[   69.453245]  ret_from_fork+0x10/0x20
[   69.453263] 
[   69.526506] Allocated by task 363:
[   69.529963]  kasan_save_stack+0x3c/0x68
[   69.533865]  kasan_save_track+0x20/0x40
[   69.537763]  kasan_save_alloc_info+0x40/0x58
[   69.542103]  __kasan_kmalloc+0xd4/0xd8
[   69.545913]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.550515]  kasan_atomics+0xb8/0x2e0
[   69.554237]  kunit_try_run_case+0x170/0x3f0
[   69.558490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.564059]  kthread+0x328/0x630
[   69.567345]  ret_from_fork+0x10/0x20
[   69.570980] 
[   69.572504] The buggy address belongs to the object at ffff000080acff00
[   69.572504]  which belongs to the cache kmalloc-64 of size 64
[   69.584983] The buggy address is located 0 bytes to the right of
[   69.584983]  allocated 48-byte region [ffff000080acff00, ffff000080acff30)
[   69.597985] 
[   69.599508] The buggy address belongs to the physical page:
[   69.605155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf
[   69.613263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.619871] page_type: f5(slab)
[   69.623070] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.630906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.638739] page dumped because: kasan: bad access detected
[   69.644385] 
[   69.645909] Memory state around the buggy address:
[   69.650764]  ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.658076]  ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.665389] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.672698]                                      ^
[   69.677554]  ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.684865]  ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   69.692175] ==================================================================

[   37.464455] ==================================================================
[   37.465100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   37.465229] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.465410] 
[   37.465543] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.466062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.466391] Hardware name: linux,dummy-virt (DT)
[   37.467027] Call trace:
[   37.467139]  show_stack+0x20/0x38 (C)
[   37.467359]  dump_stack_lvl+0x8c/0xd0
[   37.467650]  print_report+0x118/0x608
[   37.467783]  kasan_report+0xdc/0x128
[   37.467987]  kasan_check_range+0x100/0x1a8
[   37.468464]  __kasan_check_write+0x20/0x30
[   37.468979]  kasan_atomics_helper+0x154c/0x4858
[   37.469438]  kasan_atomics+0x198/0x2e0
[   37.469590]  kunit_try_run_case+0x170/0x3f0
[   37.469946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.470609]  kthread+0x328/0x630
[   37.470752]  ret_from_fork+0x10/0x20
[   37.470911] 
[   37.470997] Allocated by task 276:
[   37.471080]  kasan_save_stack+0x3c/0x68
[   37.471306]  kasan_save_track+0x20/0x40
[   37.471610]  kasan_save_alloc_info+0x40/0x58
[   37.471720]  __kasan_kmalloc+0xd4/0xd8
[   37.471828]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.472017]  kasan_atomics+0xb8/0x2e0
[   37.472132]  kunit_try_run_case+0x170/0x3f0
[   37.472435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.472704]  kthread+0x328/0x630
[   37.472873]  ret_from_fork+0x10/0x20
[   37.472985] 
[   37.473044] The buggy address belongs to the object at fff00000c77ec800
[   37.473044]  which belongs to the cache kmalloc-64 of size 64
[   37.473266] The buggy address is located 0 bytes to the right of
[   37.473266]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.473860] 
[   37.473929] The buggy address belongs to the physical page:
[   37.474232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.474607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.474727] page_type: f5(slab)
[   37.475023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.475232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.475329] page dumped because: kasan: bad access detected
[   37.475376] 
[   37.475827] Memory state around the buggy address:
[   37.476486]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.476606]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.477664] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.477767]                                      ^
[   37.477855]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.478879]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.479005] ==================================================================
[   37.496132] ==================================================================
[   37.496239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   37.496373] Read of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.496785] 
[   37.497040] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.497808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.497906] Hardware name: linux,dummy-virt (DT)
[   37.497987] Call trace:
[   37.498041]  show_stack+0x20/0x38 (C)
[   37.498175]  dump_stack_lvl+0x8c/0xd0
[   37.498616]  print_report+0x118/0x608
[   37.498858]  kasan_report+0xdc/0x128
[   37.499013]  __asan_report_load8_noabort+0x20/0x30
[   37.499179]  kasan_atomics_helper+0x3db0/0x4858
[   37.499494]  kasan_atomics+0x198/0x2e0
[   37.499691]  kunit_try_run_case+0x170/0x3f0
[   37.500064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.500225]  kthread+0x328/0x630
[   37.500345]  ret_from_fork+0x10/0x20
[   37.500476] 
[   37.500564] Allocated by task 276:
[   37.500640]  kasan_save_stack+0x3c/0x68
[   37.500902]  kasan_save_track+0x20/0x40
[   37.501023]  kasan_save_alloc_info+0x40/0x58
[   37.501145]  __kasan_kmalloc+0xd4/0xd8
[   37.501258]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.501357]  kasan_atomics+0xb8/0x2e0
[   37.501517]  kunit_try_run_case+0x170/0x3f0
[   37.501685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.501807]  kthread+0x328/0x630
[   37.501906]  ret_from_fork+0x10/0x20
[   37.502031] 
[   37.502093] The buggy address belongs to the object at fff00000c77ec800
[   37.502093]  which belongs to the cache kmalloc-64 of size 64
[   37.502292] The buggy address is located 0 bytes to the right of
[   37.502292]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.502551] 
[   37.502605] The buggy address belongs to the physical page:
[   37.502754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.503146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.503852] page_type: f5(slab)
[   37.504142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.504298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.504412] page dumped because: kasan: bad access detected
[   37.505807] 
[   37.506141] Memory state around the buggy address:
[   37.506232]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.506364]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.507099] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.507389]                                      ^
[   37.508256]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.509112]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.509707] ==================================================================
[   37.285533] ==================================================================
[   37.285655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   37.285974] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.286110] 
[   37.286338] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.286562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.286633] Hardware name: linux,dummy-virt (DT)
[   37.286709] Call trace:
[   37.286775]  show_stack+0x20/0x38 (C)
[   37.286917]  dump_stack_lvl+0x8c/0xd0
[   37.287036]  print_report+0x118/0x608
[   37.287838]  kasan_report+0xdc/0x128
[   37.288010]  kasan_check_range+0x100/0x1a8
[   37.288145]  __kasan_check_write+0x20/0x30
[   37.288282]  kasan_atomics_helper+0xf88/0x4858
[   37.288414]  kasan_atomics+0x198/0x2e0
[   37.288535]  kunit_try_run_case+0x170/0x3f0
[   37.290051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.290378]  kthread+0x328/0x630
[   37.290710]  ret_from_fork+0x10/0x20
[   37.290835] 
[   37.290937] Allocated by task 276:
[   37.291114]  kasan_save_stack+0x3c/0x68
[   37.291229]  kasan_save_track+0x20/0x40
[   37.291487]  kasan_save_alloc_info+0x40/0x58
[   37.291613]  __kasan_kmalloc+0xd4/0xd8
[   37.291726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.291848]  kasan_atomics+0xb8/0x2e0
[   37.292002]  kunit_try_run_case+0x170/0x3f0
[   37.292120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.292301]  kthread+0x328/0x630
[   37.292523]  ret_from_fork+0x10/0x20
[   37.292633] 
[   37.292685] The buggy address belongs to the object at fff00000c77ec800
[   37.292685]  which belongs to the cache kmalloc-64 of size 64
[   37.292826] The buggy address is located 0 bytes to the right of
[   37.292826]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.293018] 
[   37.293085] The buggy address belongs to the physical page:
[   37.293384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.293520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.293645] page_type: f5(slab)
[   37.293744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.293866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.293989] page dumped because: kasan: bad access detected
[   37.294083] 
[   37.294216] Memory state around the buggy address:
[   37.294406]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.294587]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.294694] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.294794]                                      ^
[   37.294877]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.295019]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.295132] ==================================================================
[   37.125414] ==================================================================
[   37.125520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   37.125630] Read of size 4 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.125752] 
[   37.125825] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.126054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.126260] Hardware name: linux,dummy-virt (DT)
[   37.126497] Call trace:
[   37.126564]  show_stack+0x20/0x38 (C)
[   37.126687]  dump_stack_lvl+0x8c/0xd0
[   37.126816]  print_report+0x118/0x608
[   37.127667]  kasan_report+0xdc/0x128
[   37.128018]  __asan_report_load4_noabort+0x20/0x30
[   37.128434]  kasan_atomics_helper+0x3dd8/0x4858
[   37.128753]  kasan_atomics+0x198/0x2e0
[   37.128919]  kunit_try_run_case+0x170/0x3f0
[   37.129149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.129299]  kthread+0x328/0x630
[   37.129414]  ret_from_fork+0x10/0x20
[   37.129596] 
[   37.129663] Allocated by task 276:
[   37.129751]  kasan_save_stack+0x3c/0x68
[   37.129846]  kasan_save_track+0x20/0x40
[   37.129970]  kasan_save_alloc_info+0x40/0x58
[   37.130072]  __kasan_kmalloc+0xd4/0xd8
[   37.130440]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.130702]  kasan_atomics+0xb8/0x2e0
[   37.130932]  kunit_try_run_case+0x170/0x3f0
[   37.131044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.131218]  kthread+0x328/0x630
[   37.131787]  ret_from_fork+0x10/0x20
[   37.131947] 
[   37.132011] The buggy address belongs to the object at fff00000c77ec800
[   37.132011]  which belongs to the cache kmalloc-64 of size 64
[   37.132160] The buggy address is located 0 bytes to the right of
[   37.132160]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.132562] 
[   37.132620] The buggy address belongs to the physical page:
[   37.132796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.132990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.133210] page_type: f5(slab)
[   37.133758] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.134027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.134139] page dumped because: kasan: bad access detected
[   37.134248] 
[   37.134345] Memory state around the buggy address:
[   37.134438]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.134769]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.135012] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.135218]                                      ^
[   37.135320]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.135454]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.135917] ==================================================================
[   37.390318] ==================================================================
[   37.390431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   37.390582] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.390857] 
[   37.391262] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.392017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.392096] Hardware name: linux,dummy-virt (DT)
[   37.392172] Call trace:
[   37.392238]  show_stack+0x20/0x38 (C)
[   37.392490]  dump_stack_lvl+0x8c/0xd0
[   37.392813]  print_report+0x118/0x608
[   37.393403]  kasan_report+0xdc/0x128
[   37.393967]  kasan_check_range+0x100/0x1a8
[   37.394588]  __kasan_check_write+0x20/0x30
[   37.394714]  kasan_atomics_helper+0x12d8/0x4858
[   37.394854]  kasan_atomics+0x198/0x2e0
[   37.395225]  kunit_try_run_case+0x170/0x3f0
[   37.395376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.396084]  kthread+0x328/0x630
[   37.397012]  ret_from_fork+0x10/0x20
[   37.397380] 
[   37.397451] Allocated by task 276:
[   37.397677]  kasan_save_stack+0x3c/0x68
[   37.398182]  kasan_save_track+0x20/0x40
[   37.398667]  kasan_save_alloc_info+0x40/0x58
[   37.398799]  __kasan_kmalloc+0xd4/0xd8
[   37.398921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.399030]  kasan_atomics+0xb8/0x2e0
[   37.399176]  kunit_try_run_case+0x170/0x3f0
[   37.399305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.399786]  kthread+0x328/0x630
[   37.399900]  ret_from_fork+0x10/0x20
[   37.400021] 
[   37.400477] The buggy address belongs to the object at fff00000c77ec800
[   37.400477]  which belongs to the cache kmalloc-64 of size 64
[   37.400751] The buggy address is located 0 bytes to the right of
[   37.400751]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.400963] 
[   37.401083] The buggy address belongs to the physical page:
[   37.401272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.401477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.401621] page_type: f5(slab)
[   37.401907] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.402053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.402172] page dumped because: kasan: bad access detected
[   37.402780] 
[   37.402904] Memory state around the buggy address:
[   37.403002]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.403136]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.403248] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.403674]                                      ^
[   37.403790]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.404361]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.404506] ==================================================================
[   37.026279] ==================================================================
[   37.026413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   37.026672] Write of size 4 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.026864] 
[   37.026974] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.027212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.027298] Hardware name: linux,dummy-virt (DT)
[   37.027392] Call trace:
[   37.027466]  show_stack+0x20/0x38 (C)
[   37.027665]  dump_stack_lvl+0x8c/0xd0
[   37.027795]  print_report+0x118/0x608
[   37.027942]  kasan_report+0xdc/0x128
[   37.028078]  kasan_check_range+0x100/0x1a8
[   37.028217]  __kasan_check_write+0x20/0x30
[   37.028349]  kasan_atomics_helper+0xa6c/0x4858
[   37.028488]  kasan_atomics+0x198/0x2e0
[   37.028738]  kunit_try_run_case+0x170/0x3f0
[   37.028855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.029090]  kthread+0x328/0x630
[   37.029243]  ret_from_fork+0x10/0x20
[   37.029371] 
[   37.029417] Allocated by task 276:
[   37.029497]  kasan_save_stack+0x3c/0x68
[   37.029602]  kasan_save_track+0x20/0x40
[   37.029718]  kasan_save_alloc_info+0x40/0x58
[   37.029875]  __kasan_kmalloc+0xd4/0xd8
[   37.030013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.030130]  kasan_atomics+0xb8/0x2e0
[   37.030256]  kunit_try_run_case+0x170/0x3f0
[   37.030381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.030497]  kthread+0x328/0x630
[   37.030577]  ret_from_fork+0x10/0x20
[   37.030684] 
[   37.030757] The buggy address belongs to the object at fff00000c77ec800
[   37.030757]  which belongs to the cache kmalloc-64 of size 64
[   37.030963] The buggy address is located 0 bytes to the right of
[   37.030963]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.031145] 
[   37.031207] The buggy address belongs to the physical page:
[   37.031275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.031409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.031530] page_type: f5(slab)
[   37.031623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.031767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.032119] page dumped because: kasan: bad access detected
[   37.032315] 
[   37.032404] Memory state around the buggy address:
[   37.032591]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.032706]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.032973] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.033079]                                      ^
[   37.033243]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.033545]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.033773] ==================================================================
[   37.379922] ==================================================================
[   37.380759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   37.381096] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.381217] 
[   37.381696] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.382392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.383152] Hardware name: linux,dummy-virt (DT)
[   37.383285] Call trace:
[   37.383324]  show_stack+0x20/0x38 (C)
[   37.383391]  dump_stack_lvl+0x8c/0xd0
[   37.383497]  print_report+0x118/0x608
[   37.383571]  kasan_report+0xdc/0x128
[   37.383631]  kasan_check_range+0x100/0x1a8
[   37.383693]  __kasan_check_write+0x20/0x30
[   37.383747]  kasan_atomics_helper+0x126c/0x4858
[   37.383808]  kasan_atomics+0x198/0x2e0
[   37.383865]  kunit_try_run_case+0x170/0x3f0
[   37.384063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.384260]  kthread+0x328/0x630
[   37.384650]  ret_from_fork+0x10/0x20
[   37.385386] 
[   37.386299] Allocated by task 276:
[   37.386577]  kasan_save_stack+0x3c/0x68
[   37.387539]  kasan_save_track+0x20/0x40
[   37.387657]  kasan_save_alloc_info+0x40/0x58
[   37.387839]  __kasan_kmalloc+0xd4/0xd8
[   37.388494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.388563]  kasan_atomics+0xb8/0x2e0
[   37.388661]  kunit_try_run_case+0x170/0x3f0
[   37.388717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.388775]  kthread+0x328/0x630
[   37.388818]  ret_from_fork+0x10/0x20
[   37.388865] 
[   37.388920] The buggy address belongs to the object at fff00000c77ec800
[   37.388920]  which belongs to the cache kmalloc-64 of size 64
[   37.389076] The buggy address is located 0 bytes to the right of
[   37.389076]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.389184] 
[   37.389214] The buggy address belongs to the physical page:
[   37.389256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.389324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.389384] page_type: f5(slab)
[   37.389434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.389496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.389547] page dumped because: kasan: bad access detected
[   37.389587] 
[   37.389611] Memory state around the buggy address:
[   37.389653]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.389706]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.389759] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.389806]                                      ^
[   37.389853]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.389935]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.389989] ==================================================================
[   37.344562] ==================================================================
[   37.345080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   37.346044] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.346171] 
[   37.346255] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.346469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.346542] Hardware name: linux,dummy-virt (DT)
[   37.348054] Call trace:
[   37.348344]  show_stack+0x20/0x38 (C)
[   37.348966]  dump_stack_lvl+0x8c/0xd0
[   37.349753]  print_report+0x118/0x608
[   37.350512]  kasan_report+0xdc/0x128
[   37.351037]  kasan_check_range+0x100/0x1a8
[   37.352181]  __kasan_check_write+0x20/0x30
[   37.352526]  kasan_atomics_helper+0x1128/0x4858
[   37.353271]  kasan_atomics+0x198/0x2e0
[   37.353442]  kunit_try_run_case+0x170/0x3f0
[   37.353674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.353941]  kthread+0x328/0x630
[   37.354128]  ret_from_fork+0x10/0x20
[   37.354393] 
[   37.354526] Allocated by task 276:
[   37.354672]  kasan_save_stack+0x3c/0x68
[   37.354788]  kasan_save_track+0x20/0x40
[   37.355138]  kasan_save_alloc_info+0x40/0x58
[   37.355230]  __kasan_kmalloc+0xd4/0xd8
[   37.355336]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.355397]  kasan_atomics+0xb8/0x2e0
[   37.355444]  kunit_try_run_case+0x170/0x3f0
[   37.355496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.355555]  kthread+0x328/0x630
[   37.355595]  ret_from_fork+0x10/0x20
[   37.355644] 
[   37.355670] The buggy address belongs to the object at fff00000c77ec800
[   37.355670]  which belongs to the cache kmalloc-64 of size 64
[   37.355744] The buggy address is located 0 bytes to the right of
[   37.355744]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.355822] 
[   37.355850] The buggy address belongs to the physical page:
[   37.355915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.355988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.356053] page_type: f5(slab)
[   37.356102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.356164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.356213] page dumped because: kasan: bad access detected
[   37.356255] 
[   37.356278] Memory state around the buggy address:
[   37.356319]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.356374]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.356429] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.356477]                                      ^
[   37.356523]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.356579]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.356629] ==================================================================
[   37.272575] ==================================================================
[   37.273138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   37.273280] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.273867] 
[   37.275025] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.275327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.275370] Hardware name: linux,dummy-virt (DT)
[   37.275413] Call trace:
[   37.275443]  show_stack+0x20/0x38 (C)
[   37.275508]  dump_stack_lvl+0x8c/0xd0
[   37.275573]  print_report+0x118/0x608
[   37.275633]  kasan_report+0xdc/0x128
[   37.275691]  kasan_check_range+0x100/0x1a8
[   37.275751]  __kasan_check_write+0x20/0x30
[   37.275808]  kasan_atomics_helper+0xf20/0x4858
[   37.275869]  kasan_atomics+0x198/0x2e0
[   37.276002]  kunit_try_run_case+0x170/0x3f0
[   37.276135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.276370]  kthread+0x328/0x630
[   37.276592]  ret_from_fork+0x10/0x20
[   37.277375] 
[   37.277613] Allocated by task 276:
[   37.277701]  kasan_save_stack+0x3c/0x68
[   37.277827]  kasan_save_track+0x20/0x40
[   37.278175]  kasan_save_alloc_info+0x40/0x58
[   37.278623]  __kasan_kmalloc+0xd4/0xd8
[   37.278729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.278837]  kasan_atomics+0xb8/0x2e0
[   37.278956]  kunit_try_run_case+0x170/0x3f0
[   37.279096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.279408]  kthread+0x328/0x630
[   37.279506]  ret_from_fork+0x10/0x20
[   37.279611] 
[   37.279723] The buggy address belongs to the object at fff00000c77ec800
[   37.279723]  which belongs to the cache kmalloc-64 of size 64
[   37.279875] The buggy address is located 0 bytes to the right of
[   37.279875]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.280320] 
[   37.280385] The buggy address belongs to the physical page:
[   37.280470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.280720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.281160] page_type: f5(slab)
[   37.281276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.281879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.282405] page dumped because: kasan: bad access detected
[   37.282522] 
[   37.282576] Memory state around the buggy address:
[   37.282657]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.283528]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.283778] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.284044]                                      ^
[   37.284271]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.284484]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.284586] ==================================================================
[   37.159145] ==================================================================
[   37.159255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   37.159611] Read of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.159743] 
[   37.159848] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.160247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.160329] Hardware name: linux,dummy-virt (DT)
[   37.160524] Call trace:
[   37.160593]  show_stack+0x20/0x38 (C)
[   37.161019]  dump_stack_lvl+0x8c/0xd0
[   37.161279]  print_report+0x118/0x608
[   37.161457]  kasan_report+0xdc/0x128
[   37.161748]  kasan_check_range+0x100/0x1a8
[   37.161962]  __kasan_check_read+0x20/0x30
[   37.162092]  kasan_atomics_helper+0xdd4/0x4858
[   37.162220]  kasan_atomics+0x198/0x2e0
[   37.162376]  kunit_try_run_case+0x170/0x3f0
[   37.163100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.163258]  kthread+0x328/0x630
[   37.163735]  ret_from_fork+0x10/0x20
[   37.163903] 
[   37.163992] Allocated by task 276:
[   37.164072]  kasan_save_stack+0x3c/0x68
[   37.164184]  kasan_save_track+0x20/0x40
[   37.164483]  kasan_save_alloc_info+0x40/0x58
[   37.164599]  __kasan_kmalloc+0xd4/0xd8
[   37.164703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.165019]  kasan_atomics+0xb8/0x2e0
[   37.165219]  kunit_try_run_case+0x170/0x3f0
[   37.165377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.165504]  kthread+0x328/0x630
[   37.165617]  ret_from_fork+0x10/0x20
[   37.166033] 
[   37.166095] The buggy address belongs to the object at fff00000c77ec800
[   37.166095]  which belongs to the cache kmalloc-64 of size 64
[   37.166236] The buggy address is located 0 bytes to the right of
[   37.166236]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.166411] 
[   37.166485] The buggy address belongs to the physical page:
[   37.166759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.166917] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.167473] page_type: f5(slab)
[   37.167918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.168182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.168408] page dumped because: kasan: bad access detected
[   37.168660] 
[   37.168850] Memory state around the buggy address:
[   37.168996]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.169154]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.169630] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.169936]                                      ^
[   37.170690]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.170840]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.170967] ==================================================================
[   37.357396] ==================================================================
[   37.357677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   37.357797] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.357953] 
[   37.358042] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.358254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.358325] Hardware name: linux,dummy-virt (DT)
[   37.358418] Call trace:
[   37.358547]  show_stack+0x20/0x38 (C)
[   37.358696]  dump_stack_lvl+0x8c/0xd0
[   37.358824]  print_report+0x118/0x608
[   37.358964]  kasan_report+0xdc/0x128
[   37.359073]  kasan_check_range+0x100/0x1a8
[   37.359217]  __kasan_check_write+0x20/0x30
[   37.359329]  kasan_atomics_helper+0x1190/0x4858
[   37.359447]  kasan_atomics+0x198/0x2e0
[   37.360095]  kunit_try_run_case+0x170/0x3f0
[   37.360328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.360604]  kthread+0x328/0x630
[   37.360785]  ret_from_fork+0x10/0x20
[   37.361000] 
[   37.361160] Allocated by task 276:
[   37.361356]  kasan_save_stack+0x3c/0x68
[   37.361495]  kasan_save_track+0x20/0x40
[   37.362155]  kasan_save_alloc_info+0x40/0x58
[   37.362273]  __kasan_kmalloc+0xd4/0xd8
[   37.363160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.363288]  kasan_atomics+0xb8/0x2e0
[   37.363416]  kunit_try_run_case+0x170/0x3f0
[   37.363565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.363853]  kthread+0x328/0x630
[   37.363981]  ret_from_fork+0x10/0x20
[   37.364515] 
[   37.365022] The buggy address belongs to the object at fff00000c77ec800
[   37.365022]  which belongs to the cache kmalloc-64 of size 64
[   37.365339] The buggy address is located 0 bytes to the right of
[   37.365339]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.365572] 
[   37.365693] The buggy address belongs to the physical page:
[   37.365860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.366216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.366445] page_type: f5(slab)
[   37.366631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.366780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.366902] page dumped because: kasan: bad access detected
[   37.366987] 
[   37.367035] Memory state around the buggy address:
[   37.367443]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.367582]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.368167] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.368291]                                      ^
[   37.368401]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.368584]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.368715] ==================================================================
[   37.416966] ==================================================================
[   37.417129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   37.417255] Read of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.417381] 
[   37.417715] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.418109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.418228] Hardware name: linux,dummy-virt (DT)
[   37.418713] Call trace:
[   37.418930]  show_stack+0x20/0x38 (C)
[   37.419205]  dump_stack_lvl+0x8c/0xd0
[   37.419356]  print_report+0x118/0x608
[   37.419547]  kasan_report+0xdc/0x128
[   37.419684]  __asan_report_load8_noabort+0x20/0x30
[   37.419810]  kasan_atomics_helper+0x3f04/0x4858
[   37.419996]  kasan_atomics+0x198/0x2e0
[   37.420122]  kunit_try_run_case+0x170/0x3f0
[   37.420244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.420438]  kthread+0x328/0x630
[   37.420555]  ret_from_fork+0x10/0x20
[   37.420713] 
[   37.420771] Allocated by task 276:
[   37.421532]  kasan_save_stack+0x3c/0x68
[   37.421708]  kasan_save_track+0x20/0x40
[   37.421965]  kasan_save_alloc_info+0x40/0x58
[   37.422338]  __kasan_kmalloc+0xd4/0xd8
[   37.423147]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.423237]  kasan_atomics+0xb8/0x2e0
[   37.423328]  kunit_try_run_case+0x170/0x3f0
[   37.423383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.423449]  kthread+0x328/0x630
[   37.423540]  ret_from_fork+0x10/0x20
[   37.423595] 
[   37.423621] The buggy address belongs to the object at fff00000c77ec800
[   37.423621]  which belongs to the cache kmalloc-64 of size 64
[   37.423694] The buggy address is located 0 bytes to the right of
[   37.423694]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.423773] 
[   37.423801] The buggy address belongs to the physical page:
[   37.423840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.425275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.425370] page_type: f5(slab)
[   37.425453] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.425519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.425572] page dumped because: kasan: bad access detected
[   37.425612] 
[   37.425635] Memory state around the buggy address:
[   37.425678]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.425735]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.425792] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.425842]                                      ^
[   37.425912]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.426042]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.426152] ==================================================================
[   37.437967] ==================================================================
[   37.438116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   37.438279] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.438494] 
[   37.438578] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.438807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.438877] Hardware name: linux,dummy-virt (DT)
[   37.439053] Call trace:
[   37.439190]  show_stack+0x20/0x38 (C)
[   37.439479]  dump_stack_lvl+0x8c/0xd0
[   37.439604]  print_report+0x118/0x608
[   37.439759]  kasan_report+0xdc/0x128
[   37.439899]  kasan_check_range+0x100/0x1a8
[   37.440025]  __kasan_check_write+0x20/0x30
[   37.440147]  kasan_atomics_helper+0x147c/0x4858
[   37.440283]  kasan_atomics+0x198/0x2e0
[   37.440399]  kunit_try_run_case+0x170/0x3f0
[   37.441296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.441483]  kthread+0x328/0x630
[   37.441599]  ret_from_fork+0x10/0x20
[   37.442150] 
[   37.442295] Allocated by task 276:
[   37.442424]  kasan_save_stack+0x3c/0x68
[   37.442527]  kasan_save_track+0x20/0x40
[   37.442718]  kasan_save_alloc_info+0x40/0x58
[   37.442822]  __kasan_kmalloc+0xd4/0xd8
[   37.442940]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.443175]  kasan_atomics+0xb8/0x2e0
[   37.444882]  kunit_try_run_case+0x170/0x3f0
[   37.445027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.445161]  kthread+0x328/0x630
[   37.445267]  ret_from_fork+0x10/0x20
[   37.445373] 
[   37.445429] The buggy address belongs to the object at fff00000c77ec800
[   37.445429]  which belongs to the cache kmalloc-64 of size 64
[   37.445506] The buggy address is located 0 bytes to the right of
[   37.445506]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.445584] 
[   37.445611] The buggy address belongs to the physical page:
[   37.445651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.445715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.445772] page_type: f5(slab)
[   37.445822] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.445880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.445960] page dumped because: kasan: bad access detected
[   37.446001] 
[   37.446024] Memory state around the buggy address:
[   37.446066]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.446120]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.446174] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.446222]                                      ^
[   37.446267]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.446327]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.446386] ==================================================================
[   37.405326] ==================================================================
[   37.405443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   37.405555] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.405674] 
[   37.405769] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.405993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.406066] Hardware name: linux,dummy-virt (DT)
[   37.406141] Call trace:
[   37.406202]  show_stack+0x20/0x38 (C)
[   37.406318]  dump_stack_lvl+0x8c/0xd0
[   37.406451]  print_report+0x118/0x608
[   37.406578]  kasan_report+0xdc/0x128
[   37.407224]  kasan_check_range+0x100/0x1a8
[   37.407795]  __kasan_check_write+0x20/0x30
[   37.408324]  kasan_atomics_helper+0x1384/0x4858
[   37.408552]  kasan_atomics+0x198/0x2e0
[   37.408795]  kunit_try_run_case+0x170/0x3f0
[   37.409145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.409351]  kthread+0x328/0x630
[   37.409846]  ret_from_fork+0x10/0x20
[   37.410127] 
[   37.410208] Allocated by task 276:
[   37.410386]  kasan_save_stack+0x3c/0x68
[   37.410535]  kasan_save_track+0x20/0x40
[   37.410647]  kasan_save_alloc_info+0x40/0x58
[   37.410824]  __kasan_kmalloc+0xd4/0xd8
[   37.410951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.411397]  kasan_atomics+0xb8/0x2e0
[   37.411692]  kunit_try_run_case+0x170/0x3f0
[   37.411848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.412186]  kthread+0x328/0x630
[   37.412331]  ret_from_fork+0x10/0x20
[   37.412846] 
[   37.412925] The buggy address belongs to the object at fff00000c77ec800
[   37.412925]  which belongs to the cache kmalloc-64 of size 64
[   37.413370] The buggy address is located 0 bytes to the right of
[   37.413370]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.413606] 
[   37.413662] The buggy address belongs to the physical page:
[   37.413748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.413879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.414032] page_type: f5(slab)
[   37.414153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.414644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.414812] page dumped because: kasan: bad access detected
[   37.414912] 
[   37.414967] Memory state around the buggy address:
[   37.415348]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.415593]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.415858] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.415975]                                      ^
[   37.416064]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.416173]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.416370] ==================================================================
[   37.510146] ==================================================================
[   37.510254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   37.510376] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.510496] 
[   37.510579] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.510776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.510845] Hardware name: linux,dummy-virt (DT)
[   37.514723] Call trace:
[   37.514794]  show_stack+0x20/0x38 (C)
[   37.515996]  dump_stack_lvl+0x8c/0xd0
[   37.516487]  print_report+0x118/0x608
[   37.516977]  kasan_report+0xdc/0x128
[   37.517780]  kasan_check_range+0x100/0x1a8
[   37.518169]  __kasan_check_write+0x20/0x30
[   37.518290]  kasan_atomics_helper+0x1644/0x4858
[   37.518430]  kasan_atomics+0x198/0x2e0
[   37.518552]  kunit_try_run_case+0x170/0x3f0
[   37.519965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.521063]  kthread+0x328/0x630
[   37.521174]  ret_from_fork+0x10/0x20
[   37.522313] 
[   37.522906] Allocated by task 276:
[   37.523146]  kasan_save_stack+0x3c/0x68
[   37.524100]  kasan_save_track+0x20/0x40
[   37.524275]  kasan_save_alloc_info+0x40/0x58
[   37.524376]  __kasan_kmalloc+0xd4/0xd8
[   37.525683]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.526689]  kasan_atomics+0xb8/0x2e0
[   37.527409]  kunit_try_run_case+0x170/0x3f0
[   37.527563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.528674]  kthread+0x328/0x630
[   37.528804]  ret_from_fork+0x10/0x20
[   37.530118] 
[   37.530637] The buggy address belongs to the object at fff00000c77ec800
[   37.530637]  which belongs to the cache kmalloc-64 of size 64
[   37.530798] The buggy address is located 0 bytes to the right of
[   37.530798]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.532461] 
[   37.532531] The buggy address belongs to the physical page:
[   37.532620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.533821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.533966] page_type: f5(slab)
[   37.534579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.534656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.534729] page dumped because: kasan: bad access detected
[   37.534801] 
[   37.534828] Memory state around the buggy address:
[   37.534873]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.534957]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.535016] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.535066]                                      ^
[   37.535145]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.535207]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.535258] ==================================================================
[   37.427584] ==================================================================
[   37.428242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   37.428419] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.428585] 
[   37.428680] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.429158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.429236] Hardware name: linux,dummy-virt (DT)
[   37.429318] Call trace:
[   37.429382]  show_stack+0x20/0x38 (C)
[   37.429501]  dump_stack_lvl+0x8c/0xd0
[   37.429625]  print_report+0x118/0x608
[   37.429740]  kasan_report+0xdc/0x128
[   37.429856]  kasan_check_range+0x100/0x1a8
[   37.429999]  __kasan_check_write+0x20/0x30
[   37.430122]  kasan_atomics_helper+0x1414/0x4858
[   37.430476]  kasan_atomics+0x198/0x2e0
[   37.430824]  kunit_try_run_case+0x170/0x3f0
[   37.431084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.431406]  kthread+0x328/0x630
[   37.431539]  ret_from_fork+0x10/0x20
[   37.432073] 
[   37.432136] Allocated by task 276:
[   37.432219]  kasan_save_stack+0x3c/0x68
[   37.432481]  kasan_save_track+0x20/0x40
[   37.432693]  kasan_save_alloc_info+0x40/0x58
[   37.432830]  __kasan_kmalloc+0xd4/0xd8
[   37.433138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.433413]  kasan_atomics+0xb8/0x2e0
[   37.433516]  kunit_try_run_case+0x170/0x3f0
[   37.433619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.433770]  kthread+0x328/0x630
[   37.434342]  ret_from_fork+0x10/0x20
[   37.434671] 
[   37.434735] The buggy address belongs to the object at fff00000c77ec800
[   37.434735]  which belongs to the cache kmalloc-64 of size 64
[   37.434882] The buggy address is located 0 bytes to the right of
[   37.434882]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.435077] 
[   37.435137] The buggy address belongs to the physical page:
[   37.435339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.435539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.435664] page_type: f5(slab)
[   37.435778] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.435922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.436077] page dumped because: kasan: bad access detected
[   37.436171] 
[   37.436222] Memory state around the buggy address:
[   37.436301]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.436526]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.436732] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.436874]                                      ^
[   37.437057]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.437290]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.437391] ==================================================================
[   37.295730] ==================================================================
[   37.295877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   37.296021] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.296180] 
[   37.296329] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.296709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.296789] Hardware name: linux,dummy-virt (DT)
[   37.296865] Call trace:
[   37.296946]  show_stack+0x20/0x38 (C)
[   37.297291]  dump_stack_lvl+0x8c/0xd0
[   37.297616]  print_report+0x118/0x608
[   37.297921]  kasan_report+0xdc/0x128
[   37.298059]  kasan_check_range+0x100/0x1a8
[   37.298390]  __kasan_check_write+0x20/0x30
[   37.298535]  kasan_atomics_helper+0xff0/0x4858
[   37.298664]  kasan_atomics+0x198/0x2e0
[   37.298798]  kunit_try_run_case+0x170/0x3f0
[   37.298946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.299171]  kthread+0x328/0x630
[   37.299370]  ret_from_fork+0x10/0x20
[   37.299502] 
[   37.299574] Allocated by task 276:
[   37.299735]  kasan_save_stack+0x3c/0x68
[   37.299845]  kasan_save_track+0x20/0x40
[   37.299970]  kasan_save_alloc_info+0x40/0x58
[   37.300086]  __kasan_kmalloc+0xd4/0xd8
[   37.300496]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.300646]  kasan_atomics+0xb8/0x2e0
[   37.300750]  kunit_try_run_case+0x170/0x3f0
[   37.301379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.302000]  kthread+0x328/0x630
[   37.302327]  ret_from_fork+0x10/0x20
[   37.303411] 
[   37.303587] The buggy address belongs to the object at fff00000c77ec800
[   37.303587]  which belongs to the cache kmalloc-64 of size 64
[   37.304015] The buggy address is located 0 bytes to the right of
[   37.304015]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.304415] 
[   37.304593] The buggy address belongs to the physical page:
[   37.304734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.305133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.305391] page_type: f5(slab)
[   37.306331] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.306479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.306583] page dumped because: kasan: bad access detected
[   37.306668] 
[   37.306731] Memory state around the buggy address:
[   37.306998]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.307376]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.307494] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.307607]                                      ^
[   37.308029]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.308236]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.308348] ==================================================================
[   37.479804] ==================================================================
[   37.479932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   37.480290] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.480426] 
[   37.481150] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.481390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.481460] Hardware name: linux,dummy-virt (DT)
[   37.481540] Call trace:
[   37.481598]  show_stack+0x20/0x38 (C)
[   37.481720]  dump_stack_lvl+0x8c/0xd0
[   37.481836]  print_report+0x118/0x608
[   37.482107]  kasan_report+0xdc/0x128
[   37.482234]  kasan_check_range+0x100/0x1a8
[   37.482388]  __kasan_check_write+0x20/0x30
[   37.482511]  kasan_atomics_helper+0x15b4/0x4858
[   37.482634]  kasan_atomics+0x198/0x2e0
[   37.482744]  kunit_try_run_case+0x170/0x3f0
[   37.482898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.484289]  kthread+0x328/0x630
[   37.484754]  ret_from_fork+0x10/0x20
[   37.485247] 
[   37.485310] Allocated by task 276:
[   37.485717]  kasan_save_stack+0x3c/0x68
[   37.485910]  kasan_save_track+0x20/0x40
[   37.486625]  kasan_save_alloc_info+0x40/0x58
[   37.486828]  __kasan_kmalloc+0xd4/0xd8
[   37.486958]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.487067]  kasan_atomics+0xb8/0x2e0
[   37.487863]  kunit_try_run_case+0x170/0x3f0
[   37.488221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.488972]  kthread+0x328/0x630
[   37.489076]  ret_from_fork+0x10/0x20
[   37.489375] 
[   37.489507] The buggy address belongs to the object at fff00000c77ec800
[   37.489507]  which belongs to the cache kmalloc-64 of size 64
[   37.490170] The buggy address is located 0 bytes to the right of
[   37.490170]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.490593] 
[   37.490668] The buggy address belongs to the physical page:
[   37.490757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.491191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.491321] page_type: f5(slab)
[   37.492173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.492309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.492759] page dumped because: kasan: bad access detected
[   37.493222] 
[   37.493561] Memory state around the buggy address:
[   37.493683]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.493798]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.494279] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.494488]                                      ^
[   37.495026]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.495444]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.495551] ==================================================================
[   37.137035] ==================================================================
[   37.137153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   37.137273] Write of size 4 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.137399] 
[   37.137486] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.137689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.137762] Hardware name: linux,dummy-virt (DT)
[   37.137860] Call trace:
[   37.137951]  show_stack+0x20/0x38 (C)
[   37.138539]  dump_stack_lvl+0x8c/0xd0
[   37.138669]  print_report+0x118/0x608
[   37.139480]  kasan_report+0xdc/0x128
[   37.140170]  kasan_check_range+0x100/0x1a8
[   37.140662]  __kasan_check_write+0x20/0x30
[   37.140803]  kasan_atomics_helper+0xd3c/0x4858
[   37.140875]  kasan_atomics+0x198/0x2e0
[   37.141010]  kunit_try_run_case+0x170/0x3f0
[   37.141081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.141151]  kthread+0x328/0x630
[   37.141205]  ret_from_fork+0x10/0x20
[   37.141266] 
[   37.141294] Allocated by task 276:
[   37.141333]  kasan_save_stack+0x3c/0x68
[   37.141387]  kasan_save_track+0x20/0x40
[   37.141434]  kasan_save_alloc_info+0x40/0x58
[   37.141482]  __kasan_kmalloc+0xd4/0xd8
[   37.141530]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.141584]  kasan_atomics+0xb8/0x2e0
[   37.141631]  kunit_try_run_case+0x170/0x3f0
[   37.141680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.141734]  kthread+0x328/0x630
[   37.141774]  ret_from_fork+0x10/0x20
[   37.141820] 
[   37.141846] The buggy address belongs to the object at fff00000c77ec800
[   37.141846]  which belongs to the cache kmalloc-64 of size 64
[   37.141964] The buggy address is located 0 bytes to the right of
[   37.141964]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.142118] 
[   37.142553] The buggy address belongs to the physical page:
[   37.142676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.143012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.143178] page_type: f5(slab)
[   37.143309] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.143480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.143685] page dumped because: kasan: bad access detected
[   37.143768] 
[   37.143816] Memory state around the buggy address:
[   37.143915]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.144032]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.144950] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.145074]                                      ^
[   37.145372]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.146103]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.146239] ==================================================================
[   37.446703] ==================================================================
[   37.446804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   37.447059] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.447363] 
[   37.447451] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.449037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.449118] Hardware name: linux,dummy-virt (DT)
[   37.449206] Call trace:
[   37.449265]  show_stack+0x20/0x38 (C)
[   37.450954]  dump_stack_lvl+0x8c/0xd0
[   37.451108]  print_report+0x118/0x608
[   37.451317]  kasan_report+0xdc/0x128
[   37.451572]  kasan_check_range+0x100/0x1a8
[   37.451709]  __kasan_check_write+0x20/0x30
[   37.452357]  kasan_atomics_helper+0x14e4/0x4858
[   37.452618]  kasan_atomics+0x198/0x2e0
[   37.453213]  kunit_try_run_case+0x170/0x3f0
[   37.453909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.454198]  kthread+0x328/0x630
[   37.454399]  ret_from_fork+0x10/0x20
[   37.454821] 
[   37.455074] Allocated by task 276:
[   37.455216]  kasan_save_stack+0x3c/0x68
[   37.455592]  kasan_save_track+0x20/0x40
[   37.455876]  kasan_save_alloc_info+0x40/0x58
[   37.456115]  __kasan_kmalloc+0xd4/0xd8
[   37.456479]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.456834]  kasan_atomics+0xb8/0x2e0
[   37.457093]  kunit_try_run_case+0x170/0x3f0
[   37.457258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.457382]  kthread+0x328/0x630
[   37.458001]  ret_from_fork+0x10/0x20
[   37.458125] 
[   37.458180] The buggy address belongs to the object at fff00000c77ec800
[   37.458180]  which belongs to the cache kmalloc-64 of size 64
[   37.458319] The buggy address is located 0 bytes to the right of
[   37.458319]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.458603] 
[   37.458658] The buggy address belongs to the physical page:
[   37.458737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.458866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.459041] page_type: f5(slab)
[   37.459524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.459700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.459836] page dumped because: kasan: bad access detected
[   37.460669] 
[   37.461221] Memory state around the buggy address:
[   37.461320]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.461654]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.461933] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.462149]                                      ^
[   37.462623]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.462909]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.463020] ==================================================================
[   37.309242] ==================================================================
[   37.309358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   37.309479] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.309598] 
[   37.309682] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.309904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.309980] Hardware name: linux,dummy-virt (DT)
[   37.310054] Call trace:
[   37.310114]  show_stack+0x20/0x38 (C)
[   37.310230]  dump_stack_lvl+0x8c/0xd0
[   37.310349]  print_report+0x118/0x608
[   37.310478]  kasan_report+0xdc/0x128
[   37.310590]  kasan_check_range+0x100/0x1a8
[   37.310707]  __kasan_check_write+0x20/0x30
[   37.310824]  kasan_atomics_helper+0x1058/0x4858
[   37.310995]  kasan_atomics+0x198/0x2e0
[   37.311222]  kunit_try_run_case+0x170/0x3f0
[   37.311412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.311569]  kthread+0x328/0x630
[   37.311859]  ret_from_fork+0x10/0x20
[   37.312186] 
[   37.312240] Allocated by task 276:
[   37.312315]  kasan_save_stack+0x3c/0x68
[   37.312420]  kasan_save_track+0x20/0x40
[   37.312525]  kasan_save_alloc_info+0x40/0x58
[   37.314254]  __kasan_kmalloc+0xd4/0xd8
[   37.314421]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.315193]  kasan_atomics+0xb8/0x2e0
[   37.315348]  kunit_try_run_case+0x170/0x3f0
[   37.315572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.315698]  kthread+0x328/0x630
[   37.315834]  ret_from_fork+0x10/0x20
[   37.316044] 
[   37.316197] The buggy address belongs to the object at fff00000c77ec800
[   37.316197]  which belongs to the cache kmalloc-64 of size 64
[   37.316550] The buggy address is located 0 bytes to the right of
[   37.316550]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.316776] 
[   37.316896] The buggy address belongs to the physical page:
[   37.316987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.317110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.317230] page_type: f5(slab)
[   37.317326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.317451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.317563] page dumped because: kasan: bad access detected
[   37.317771] 
[   37.317823] Memory state around the buggy address:
[   37.318804]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.319030]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.319225] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.319337]                                      ^
[   37.321661]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.321728]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.321779] ==================================================================
[   37.597538] ==================================================================
[   37.597651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   37.597973] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.598322] 
[   37.598411] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.598620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.598687] Hardware name: linux,dummy-virt (DT)
[   37.598801] Call trace:
[   37.598874]  show_stack+0x20/0x38 (C)
[   37.599634]  dump_stack_lvl+0x8c/0xd0
[   37.599760]  print_report+0x118/0x608
[   37.599905]  kasan_report+0xdc/0x128
[   37.600040]  kasan_check_range+0x100/0x1a8
[   37.600430]  __kasan_check_write+0x20/0x30
[   37.600640]  kasan_atomics_helper+0x17ec/0x4858
[   37.600864]  kasan_atomics+0x198/0x2e0
[   37.601053]  kunit_try_run_case+0x170/0x3f0
[   37.601246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.601386]  kthread+0x328/0x630
[   37.601500]  ret_from_fork+0x10/0x20
[   37.601673] 
[   37.601730] Allocated by task 276:
[   37.601830]  kasan_save_stack+0x3c/0x68
[   37.601990]  kasan_save_track+0x20/0x40
[   37.602109]  kasan_save_alloc_info+0x40/0x58
[   37.603081]  __kasan_kmalloc+0xd4/0xd8
[   37.603651]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.604019]  kasan_atomics+0xb8/0x2e0
[   37.604129]  kunit_try_run_case+0x170/0x3f0
[   37.604233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.604593]  kthread+0x328/0x630
[   37.605302]  ret_from_fork+0x10/0x20
[   37.605609] 
[   37.605745] The buggy address belongs to the object at fff00000c77ec800
[   37.605745]  which belongs to the cache kmalloc-64 of size 64
[   37.605942] The buggy address is located 0 bytes to the right of
[   37.605942]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.606101] 
[   37.606166] The buggy address belongs to the physical page:
[   37.606370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.606597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.606904] page_type: f5(slab)
[   37.607021] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.607252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.608011] page dumped because: kasan: bad access detected
[   37.608075] 
[   37.608133] Memory state around the buggy address:
[   37.608180]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.608240]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.608295] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.608344]                                      ^
[   37.608389]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.608443]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.608490] ==================================================================
[   36.962069] ==================================================================
[   36.962171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   36.962276] Read of size 4 at addr fff00000c77ec830 by task kunit_try_catch/276
[   36.962406] 
[   36.962473] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   36.962669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.962790] Hardware name: linux,dummy-virt (DT)
[   36.962974] Call trace:
[   36.963633]  show_stack+0x20/0x38 (C)
[   36.963950]  dump_stack_lvl+0x8c/0xd0
[   36.964850]  print_report+0x118/0x608
[   36.966854]  kasan_atomics+0x198/0x2e0
[   36.971075]  kunit_try_run_case+0x170/0x3f0
[   36.974734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.978733] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.981555] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   36.984942]  __kasan_kmalloc+0xd4/0xd8
[   36.985043]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.985395]  kasan_atomics+0xb8/0x2e0
[   36.985517]  kunit_try_run_case+0x170/0x3f0
[   36.985619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.985737]  kthread+0x328/0x630
[   36.985846]  ret_from_fork+0x10/0x20
[   36.986142] 
[   36.986212] The buggy address belongs to the object at fff00000c77ec800
[   36.986212]  which belongs to the cache kmalloc-64 of size 64
[   36.986377] The buggy address is located 0 bytes to the right of
[   36.986377]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   36.986772] 
[   36.986936] The buggy address belongs to the physical page:
[   36.987171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   36.987508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.987743] page_type: f5(slab)
[   36.987853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.988001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.988197] page dumped because: kasan: bad access detected
[   36.988313] 
[   36.988360] Memory state around the buggy address:
[   36.988443]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.988570]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.988681] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.988878]                                      ^
[   36.989098]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.989263]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.989499] ==================================================================
[   37.369748] ==================================================================
[   37.369856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   37.369988] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.370109] 
[   37.370196] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.370405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.370475] Hardware name: linux,dummy-virt (DT)
[   37.370549] Call trace:
[   37.370610]  show_stack+0x20/0x38 (C)
[   37.370725]  dump_stack_lvl+0x8c/0xd0
[   37.370845]  print_report+0x118/0x608
[   37.370988]  kasan_report+0xdc/0x128
[   37.371121]  kasan_check_range+0x100/0x1a8
[   37.371247]  __kasan_check_write+0x20/0x30
[   37.371359]  kasan_atomics_helper+0x11f8/0x4858
[   37.371480]  kasan_atomics+0x198/0x2e0
[   37.371597]  kunit_try_run_case+0x170/0x3f0
[   37.371719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.371851]  kthread+0x328/0x630
[   37.372035]  ret_from_fork+0x10/0x20
[   37.372185] 
[   37.372252] Allocated by task 276:
[   37.372342]  kasan_save_stack+0x3c/0x68
[   37.372464]  kasan_save_track+0x20/0x40
[   37.373231]  kasan_save_alloc_info+0x40/0x58
[   37.373482]  __kasan_kmalloc+0xd4/0xd8
[   37.374142]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.374292]  kasan_atomics+0xb8/0x2e0
[   37.374407]  kunit_try_run_case+0x170/0x3f0
[   37.375169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.375313]  kthread+0x328/0x630
[   37.375391]  ret_from_fork+0x10/0x20
[   37.375446] 
[   37.375492] The buggy address belongs to the object at fff00000c77ec800
[   37.375492]  which belongs to the cache kmalloc-64 of size 64
[   37.375594] The buggy address is located 0 bytes to the right of
[   37.375594]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.375676] 
[   37.375705] The buggy address belongs to the physical page:
[   37.375746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.375812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.375871] page_type: f5(slab)
[   37.376002] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.376239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.376356] page dumped because: kasan: bad access detected
[   37.376609] 
[   37.376855] Memory state around the buggy address:
[   37.376962]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.377318]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.377654] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.378116]                                      ^
[   37.378410]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.378523]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.378618] ==================================================================
[   37.171682] ==================================================================
[   37.171789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   37.171934] Read of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.172106] 
[   37.172198] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.172570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.173658] Hardware name: linux,dummy-virt (DT)
[   37.173770] Call trace:
[   37.173923]  show_stack+0x20/0x38 (C)
[   37.174493]  dump_stack_lvl+0x8c/0xd0
[   37.174710]  print_report+0x118/0x608
[   37.174832]  kasan_report+0xdc/0x128
[   37.175756]  __asan_report_load8_noabort+0x20/0x30
[   37.176052]  kasan_atomics_helper+0x3f58/0x4858
[   37.176209]  kasan_atomics+0x198/0x2e0
[   37.176403]  kunit_try_run_case+0x170/0x3f0
[   37.176572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.176730]  kthread+0x328/0x630
[   37.177068]  ret_from_fork+0x10/0x20
[   37.177531] 
[   37.177744] Allocated by task 276:
[   37.178017]  kasan_save_stack+0x3c/0x68
[   37.178131]  kasan_save_track+0x20/0x40
[   37.178274]  kasan_save_alloc_info+0x40/0x58
[   37.178428]  __kasan_kmalloc+0xd4/0xd8
[   37.178858]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.179463]  kasan_atomics+0xb8/0x2e0
[   37.179991]  kunit_try_run_case+0x170/0x3f0
[   37.180393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.180544]  kthread+0x328/0x630
[   37.181766]  ret_from_fork+0x10/0x20
[   37.181925] 
[   37.181985] The buggy address belongs to the object at fff00000c77ec800
[   37.181985]  which belongs to the cache kmalloc-64 of size 64
[   37.182120] The buggy address is located 0 bytes to the right of
[   37.182120]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.182270] 
[   37.182328] The buggy address belongs to the physical page:
[   37.182420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.182552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.182675] page_type: f5(slab)
[   37.182774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.182916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.183020] page dumped because: kasan: bad access detected
[   37.183100] 
[   37.187206] Memory state around the buggy address:
[   37.187302]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.187413]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.187578] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.187692]                                      ^
[   37.187796]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.187937]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.188028] ==================================================================
[   37.584936] ==================================================================
[   37.585269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   37.585404] Read of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.585754] 
[   37.585859] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.586220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.586494] Hardware name: linux,dummy-virt (DT)
[   37.586572] Call trace:
[   37.586630]  show_stack+0x20/0x38 (C)
[   37.586747]  dump_stack_lvl+0x8c/0xd0
[   37.586867]  print_report+0x118/0x608
[   37.587003]  kasan_report+0xdc/0x128
[   37.587359]  __asan_report_load8_noabort+0x20/0x30
[   37.588005]  kasan_atomics_helper+0x3e20/0x4858
[   37.588149]  kasan_atomics+0x198/0x2e0
[   37.588287]  kunit_try_run_case+0x170/0x3f0
[   37.588963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.589113]  kthread+0x328/0x630
[   37.589299]  ret_from_fork+0x10/0x20
[   37.589497] 
[   37.589653] Allocated by task 276:
[   37.589786]  kasan_save_stack+0x3c/0x68
[   37.590077]  kasan_save_track+0x20/0x40
[   37.590513]  kasan_save_alloc_info+0x40/0x58
[   37.590628]  __kasan_kmalloc+0xd4/0xd8
[   37.590745]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.590956]  kasan_atomics+0xb8/0x2e0
[   37.591296]  kunit_try_run_case+0x170/0x3f0
[   37.591453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.591585]  kthread+0x328/0x630
[   37.592225]  ret_from_fork+0x10/0x20
[   37.592333] 
[   37.592513] The buggy address belongs to the object at fff00000c77ec800
[   37.592513]  which belongs to the cache kmalloc-64 of size 64
[   37.592672] The buggy address is located 0 bytes to the right of
[   37.592672]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.592829] 
[   37.592877] The buggy address belongs to the physical page:
[   37.593449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.593588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.593719] page_type: f5(slab)
[   37.594026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.594158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.594260] page dumped because: kasan: bad access detected
[   37.594346] 
[   37.594491] Memory state around the buggy address:
[   37.594735]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.594850]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.594978] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.595640]                                      ^
[   37.595817]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.596418]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.596564] ==================================================================
[   37.241589] ==================================================================
[   37.242571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   37.242735] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.242856] 
[   37.242960] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.245068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.246278] Hardware name: linux,dummy-virt (DT)
[   37.246573] Call trace:
[   37.246637]  show_stack+0x20/0x38 (C)
[   37.247442]  dump_stack_lvl+0x8c/0xd0
[   37.247563]  print_report+0x118/0x608
[   37.247692]  kasan_report+0xdc/0x128
[   37.250103]  kasan_check_range+0x100/0x1a8
[   37.250437]  __kasan_check_write+0x20/0x30
[   37.250979]  kasan_atomics_helper+0xeb8/0x4858
[   37.251830]  kasan_atomics+0x198/0x2e0
[   37.252006]  kunit_try_run_case+0x170/0x3f0
[   37.253296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.254523]  kthread+0x328/0x630
[   37.254926]  ret_from_fork+0x10/0x20
[   37.255934] 
[   37.256112] Allocated by task 276:
[   37.256329]  kasan_save_stack+0x3c/0x68
[   37.256929]  kasan_save_track+0x20/0x40
[   37.258153]  kasan_save_alloc_info+0x40/0x58
[   37.258386]  __kasan_kmalloc+0xd4/0xd8
[   37.259328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.260490]  kasan_atomics+0xb8/0x2e0
[   37.260632]  kunit_try_run_case+0x170/0x3f0
[   37.260776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.262078]  kthread+0x328/0x630
[   37.262513]  ret_from_fork+0x10/0x20
[   37.263441] 
[   37.263731] The buggy address belongs to the object at fff00000c77ec800
[   37.263731]  which belongs to the cache kmalloc-64 of size 64
[   37.263882] The buggy address is located 0 bytes to the right of
[   37.263882]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.264062] 
[   37.264119] The buggy address belongs to the physical page:
[   37.265510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.267030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.268126] page_type: f5(slab)
[   37.268619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.268753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.268865] page dumped because: kasan: bad access detected
[   37.268969] 
[   37.270599] Memory state around the buggy address:
[   37.270929]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.271081]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.271369] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.271517]                                      ^
[   37.271743]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.271855]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.271973] ==================================================================
[   37.216147] ==================================================================
[   37.216266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   37.216390] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.216511] 
[   37.216595] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.216795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.216861] Hardware name: linux,dummy-virt (DT)
[   37.216964] Call trace:
[   37.217026]  show_stack+0x20/0x38 (C)
[   37.217152]  dump_stack_lvl+0x8c/0xd0
[   37.217275]  print_report+0x118/0x608
[   37.217396]  kasan_report+0xdc/0x128
[   37.217514]  __asan_report_store8_noabort+0x20/0x30
[   37.221024]  kasan_atomics_helper+0x3e5c/0x4858
[   37.221787]  kasan_atomics+0x198/0x2e0
[   37.222659]  kunit_try_run_case+0x170/0x3f0
[   37.223936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.224636]  kthread+0x328/0x630
[   37.225870]  ret_from_fork+0x10/0x20
[   37.227065] 
[   37.227337] Allocated by task 276:
[   37.227972]  kasan_save_stack+0x3c/0x68
[   37.228215]  kasan_save_track+0x20/0x40
[   37.228575]  kasan_save_alloc_info+0x40/0x58
[   37.228956]  __kasan_kmalloc+0xd4/0xd8
[   37.229832]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.230906]  kasan_atomics+0xb8/0x2e0
[   37.231035]  kunit_try_run_case+0x170/0x3f0
[   37.232095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.232308]  kthread+0x328/0x630
[   37.233320]  ret_from_fork+0x10/0x20
[   37.234034] 
[   37.234122] The buggy address belongs to the object at fff00000c77ec800
[   37.234122]  which belongs to the cache kmalloc-64 of size 64
[   37.234715] The buggy address is located 0 bytes to the right of
[   37.234715]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.235239] 
[   37.235327] The buggy address belongs to the physical page:
[   37.235418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.236465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.236618] page_type: f5(slab)
[   37.236718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.236840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.237470] page dumped because: kasan: bad access detected
[   37.238121] 
[   37.238279] Memory state around the buggy address:
[   37.238370]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.238486]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.238593] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.239213]                                      ^
[   37.239659]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.239726]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.239842] ==================================================================
[   36.990812] ==================================================================
[   36.990974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   36.991299] Write of size 4 at addr fff00000c77ec830 by task kunit_try_catch/276
[   36.992254] 
[   36.992647] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   36.993772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.995170] Hardware name: linux,dummy-virt (DT)
[   36.995265] Call trace:
[   36.995341]  show_stack+0x20/0x38 (C)
[   36.995468]  dump_stack_lvl+0x8c/0xd0
[   36.995700]  print_report+0x118/0x608
[   36.995836]  kasan_report+0xdc/0x128
[   36.995985]  kasan_check_range+0x100/0x1a8
[   36.996162]  __kasan_check_write+0x20/0x30
[   36.996559]  kasan_atomics_helper+0x99c/0x4858
[   36.996870]  kasan_atomics+0x198/0x2e0
[   36.997013]  kunit_try_run_case+0x170/0x3f0
[   36.997430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.997576]  kthread+0x328/0x630
[   36.997684]  ret_from_fork+0x10/0x20
[   36.997810] 
[   36.997868] Allocated by task 276:
[   36.997958]  kasan_save_stack+0x3c/0x68
[   36.998095]  kasan_save_track+0x20/0x40
[   36.998194]  kasan_save_alloc_info+0x40/0x58
[   36.998291]  __kasan_kmalloc+0xd4/0xd8
[   36.998406]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.998514]  kasan_atomics+0xb8/0x2e0
[   36.998635]  kunit_try_run_case+0x170/0x3f0
[   36.998740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.998881]  kthread+0x328/0x630
[   36.998993]  ret_from_fork+0x10/0x20
[   36.999497] 
[   37.000088] The buggy address belongs to the object at fff00000c77ec800
[   37.000088]  which belongs to the cache kmalloc-64 of size 64
[   37.000248] The buggy address is located 0 bytes to the right of
[   37.000248]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.001382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.003604]                                      ^
[   37.007436] Write of size 4 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.017427] The buggy address is located 0 bytes to the right of
[   37.017427]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.017983] 
[   37.018505] The buggy address belongs to the physical page:
[   37.018908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.019661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.020396] page_type: f5(slab)
[   37.020507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.020633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.020735] page dumped because: kasan: bad access detected
[   37.020817] 
[   37.021550] Memory state around the buggy address:
[   37.022350]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.022503]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.022626] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.023245]                                      ^
[   37.023555]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.023668]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.024014] ==================================================================
[   37.548299] ==================================================================
[   37.548493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   37.548923] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.549153] 
[   37.549277] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.549490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.549561] Hardware name: linux,dummy-virt (DT)
[   37.549639] Call trace:
[   37.549693]  show_stack+0x20/0x38 (C)
[   37.549832]  dump_stack_lvl+0x8c/0xd0
[   37.550037]  print_report+0x118/0x608
[   37.550180]  kasan_report+0xdc/0x128
[   37.550530]  kasan_check_range+0x100/0x1a8
[   37.550645]  __kasan_check_write+0x20/0x30
[   37.550762]  kasan_atomics_helper+0x16d0/0x4858
[   37.551078]  kasan_atomics+0x198/0x2e0
[   37.551396]  kunit_try_run_case+0x170/0x3f0
[   37.551623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.551787]  kthread+0x328/0x630
[   37.552158]  ret_from_fork+0x10/0x20
[   37.552570] 
[   37.552695] Allocated by task 276:
[   37.553131]  kasan_save_stack+0x3c/0x68
[   37.553541]  kasan_save_track+0x20/0x40
[   37.553607]  kasan_save_alloc_info+0x40/0x58
[   37.553657]  __kasan_kmalloc+0xd4/0xd8
[   37.553734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.553814]  kasan_atomics+0xb8/0x2e0
[   37.553864]  kunit_try_run_case+0x170/0x3f0
[   37.554071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.554331]  kthread+0x328/0x630
[   37.554425]  ret_from_fork+0x10/0x20
[   37.554516] 
[   37.554546] The buggy address belongs to the object at fff00000c77ec800
[   37.554546]  which belongs to the cache kmalloc-64 of size 64
[   37.554619] The buggy address is located 0 bytes to the right of
[   37.554619]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.554755] 
[   37.554788] The buggy address belongs to the physical page:
[   37.554828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.554919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.554988] page_type: f5(slab)
[   37.555036] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.555322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.555436] page dumped because: kasan: bad access detected
[   37.555693] 
[   37.555767] Memory state around the buggy address:
[   37.555960]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.556071]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.556186] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.556280]                                      ^
[   37.556362]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.556620]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.556771] ==================================================================
[   37.189264] ==================================================================
[   37.189386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   37.189520] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.189657] 
[   37.189747] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.189994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.190257] Hardware name: linux,dummy-virt (DT)
[   37.190439] Call trace:
[   37.190502]  show_stack+0x20/0x38 (C)
[   37.191844]  dump_stack_lvl+0x8c/0xd0
[   37.192247]  print_report+0x118/0x608
[   37.192923]  kasan_report+0xdc/0x128
[   37.193689]  kasan_check_range+0x100/0x1a8
[   37.193952]  __kasan_check_write+0x20/0x30
[   37.194669]  kasan_atomics_helper+0xe44/0x4858
[   37.195363]  kasan_atomics+0x198/0x2e0
[   37.195498]  kunit_try_run_case+0x170/0x3f0
[   37.195635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.197779]  kthread+0x328/0x630
[   37.198504]  ret_from_fork+0x10/0x20
[   37.198921] 
[   37.198980] Allocated by task 276:
[   37.199378]  kasan_save_stack+0x3c/0x68
[   37.201073]  kasan_save_track+0x20/0x40
[   37.201516]  kasan_save_alloc_info+0x40/0x58
[   37.201785]  __kasan_kmalloc+0xd4/0xd8
[   37.202958]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.203308]  kasan_atomics+0xb8/0x2e0
[   37.203600]  kunit_try_run_case+0x170/0x3f0
[   37.203792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.204131]  kthread+0x328/0x630
[   37.204277]  ret_from_fork+0x10/0x20
[   37.204397] 
[   37.204460] The buggy address belongs to the object at fff00000c77ec800
[   37.204460]  which belongs to the cache kmalloc-64 of size 64
[   37.204618] The buggy address is located 0 bytes to the right of
[   37.204618]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.204785] 
[   37.204847] The buggy address belongs to the physical page:
[   37.204952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.205539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.205669] page_type: f5(slab)
[   37.205772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.205951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.206157] page dumped because: kasan: bad access detected
[   37.206246] 
[   37.206364] Memory state around the buggy address:
[   37.206541]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.206809]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.208536] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.208869]                                      ^
[   37.209495]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.209610]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.209706] ==================================================================
[   37.147919] ==================================================================
[   37.148028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   37.148147] Read of size 4 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.148273] 
[   37.148364] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.148925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.149129] Hardware name: linux,dummy-virt (DT)
[   37.149355] Call trace:
[   37.149415]  show_stack+0x20/0x38 (C)
[   37.149539]  dump_stack_lvl+0x8c/0xd0
[   37.149661]  print_report+0x118/0x608
[   37.149780]  kasan_report+0xdc/0x128
[   37.149917]  __asan_report_load4_noabort+0x20/0x30
[   37.150059]  kasan_atomics_helper+0x3e04/0x4858
[   37.151385]  kasan_atomics+0x198/0x2e0
[   37.151585]  kunit_try_run_case+0x170/0x3f0
[   37.151722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.151867]  kthread+0x328/0x630
[   37.152052]  ret_from_fork+0x10/0x20
[   37.152406] 
[   37.152458] Allocated by task 276:
[   37.152648]  kasan_save_stack+0x3c/0x68
[   37.152856]  kasan_save_track+0x20/0x40
[   37.153029]  kasan_save_alloc_info+0x40/0x58
[   37.153379]  __kasan_kmalloc+0xd4/0xd8
[   37.153721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.154024]  kasan_atomics+0xb8/0x2e0
[   37.154136]  kunit_try_run_case+0x170/0x3f0
[   37.154318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.154461]  kthread+0x328/0x630
[   37.154620]  ret_from_fork+0x10/0x20
[   37.154718] 
[   37.154780] The buggy address belongs to the object at fff00000c77ec800
[   37.154780]  which belongs to the cache kmalloc-64 of size 64
[   37.155147] The buggy address is located 0 bytes to the right of
[   37.155147]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.155546] 
[   37.155688] The buggy address belongs to the physical page:
[   37.155796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.155943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.156077] page_type: f5(slab)
[   37.156232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.156379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.156494] page dumped because: kasan: bad access detected
[   37.156578] 
[   37.156628] Memory state around the buggy address:
[   37.156963]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.157175]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.157477] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.157920]                                      ^
[   37.158053]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.158168]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.158283] ==================================================================
[   37.536685] ==================================================================
[   37.536801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   37.536939] Read of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.537061] 
[   37.537161] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.537574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.537653] Hardware name: linux,dummy-virt (DT)
[   37.537736] Call trace:
[   37.537794]  show_stack+0x20/0x38 (C)
[   37.537963]  dump_stack_lvl+0x8c/0xd0
[   37.538327]  print_report+0x118/0x608
[   37.538794]  kasan_report+0xdc/0x128
[   37.538955]  __asan_report_load8_noabort+0x20/0x30
[   37.539092]  kasan_atomics_helper+0x3df4/0x4858
[   37.540382]  kasan_atomics+0x198/0x2e0
[   37.540520]  kunit_try_run_case+0x170/0x3f0
[   37.540667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.541064]  kthread+0x328/0x630
[   37.541189]  ret_from_fork+0x10/0x20
[   37.541417] 
[   37.541478] Allocated by task 276:
[   37.541580]  kasan_save_stack+0x3c/0x68
[   37.541779]  kasan_save_track+0x20/0x40
[   37.541979]  kasan_save_alloc_info+0x40/0x58
[   37.542095]  __kasan_kmalloc+0xd4/0xd8
[   37.542435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.542552]  kasan_atomics+0xb8/0x2e0
[   37.542676]  kunit_try_run_case+0x170/0x3f0
[   37.542932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.543071]  kthread+0x328/0x630
[   37.543178]  ret_from_fork+0x10/0x20
[   37.543338] 
[   37.543395] The buggy address belongs to the object at fff00000c77ec800
[   37.543395]  which belongs to the cache kmalloc-64 of size 64
[   37.543790] The buggy address is located 0 bytes to the right of
[   37.543790]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.543972] 
[   37.544050] The buggy address belongs to the physical page:
[   37.544331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.544522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.544651] page_type: f5(slab)
[   37.544765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.545203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.545451] page dumped because: kasan: bad access detected
[   37.545573] 
[   37.545669] Memory state around the buggy address:
[   37.545791]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.545917]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.546187] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.546295]                                      ^
[   37.546547]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.546661]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.546761] ==================================================================
[   37.323657] ==================================================================
[   37.323804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   37.324309] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.324630] 
[   37.324685] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.324796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.324834] Hardware name: linux,dummy-virt (DT)
[   37.324873] Call trace:
[   37.324946]  show_stack+0x20/0x38 (C)
[   37.325163]  dump_stack_lvl+0x8c/0xd0
[   37.325432]  print_report+0x118/0x608
[   37.325584]  kasan_report+0xdc/0x128
[   37.325700]  kasan_check_range+0x100/0x1a8
[   37.325818]  __kasan_check_write+0x20/0x30
[   37.325954]  kasan_atomics_helper+0x10c0/0x4858
[   37.326137]  kasan_atomics+0x198/0x2e0
[   37.326290]  kunit_try_run_case+0x170/0x3f0
[   37.326439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.326578]  kthread+0x328/0x630
[   37.326692]  ret_from_fork+0x10/0x20
[   37.326815] 
[   37.326866] Allocated by task 276:
[   37.327655]  kasan_save_stack+0x3c/0x68
[   37.327880]  kasan_save_track+0x20/0x40
[   37.328116]  kasan_save_alloc_info+0x40/0x58
[   37.328228]  __kasan_kmalloc+0xd4/0xd8
[   37.328348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.328917]  kasan_atomics+0xb8/0x2e0
[   37.329626]  kunit_try_run_case+0x170/0x3f0
[   37.330318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.331553]  kthread+0x328/0x630
[   37.331951]  ret_from_fork+0x10/0x20
[   37.332517] 
[   37.332575] The buggy address belongs to the object at fff00000c77ec800
[   37.332575]  which belongs to the cache kmalloc-64 of size 64
[   37.333506] The buggy address is located 0 bytes to the right of
[   37.333506]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.335041] 
[   37.335349] The buggy address belongs to the physical page:
[   37.335756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.336252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.336384] page_type: f5(slab)
[   37.336481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.336607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.338309] page dumped because: kasan: bad access detected
[   37.338704] 
[   37.339002] Memory state around the buggy address:
[   37.339114]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.339813]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.340118] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.340492]                                      ^
[   37.341399]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.341518]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.341616] ==================================================================
[   37.572702] ==================================================================
[   37.572999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.573300] Write of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.573573] 
[   37.573691] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.573956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.574029] Hardware name: linux,dummy-virt (DT)
[   37.574113] Call trace:
[   37.574294]  show_stack+0x20/0x38 (C)
[   37.574643]  dump_stack_lvl+0x8c/0xd0
[   37.574822]  print_report+0x118/0x608
[   37.574968]  kasan_report+0xdc/0x128
[   37.575162]  kasan_check_range+0x100/0x1a8
[   37.575543]  __kasan_check_write+0x20/0x30
[   37.575924]  kasan_atomics_helper+0x175c/0x4858
[   37.576253]  kasan_atomics+0x198/0x2e0
[   37.576380]  kunit_try_run_case+0x170/0x3f0
[   37.577235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.577384]  kthread+0x328/0x630
[   37.577495]  ret_from_fork+0x10/0x20
[   37.577658] 
[   37.577825] Allocated by task 276:
[   37.577959]  kasan_save_stack+0x3c/0x68
[   37.578081]  kasan_save_track+0x20/0x40
[   37.578232]  kasan_save_alloc_info+0x40/0x58
[   37.578346]  __kasan_kmalloc+0xd4/0xd8
[   37.578456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.578562]  kasan_atomics+0xb8/0x2e0
[   37.579312]  kunit_try_run_case+0x170/0x3f0
[   37.579608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.579755]  kthread+0x328/0x630
[   37.579981]  ret_from_fork+0x10/0x20
[   37.580122] 
[   37.580184] The buggy address belongs to the object at fff00000c77ec800
[   37.580184]  which belongs to the cache kmalloc-64 of size 64
[   37.580440] The buggy address is located 0 bytes to the right of
[   37.580440]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.580597] 
[   37.580681] The buggy address belongs to the physical page:
[   37.580855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.581008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.581150] page_type: f5(slab)
[   37.581260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.581785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.581910] page dumped because: kasan: bad access detected
[   37.582009] 
[   37.582065] Memory state around the buggy address:
[   37.582145]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.582255]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.583584] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.583922]                                      ^
[   37.584041]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.584247]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.584395] ==================================================================
[   37.034733] ==================================================================
[   37.034855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   37.035005] Write of size 4 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.035130] 
[   37.035231] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.035445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.035535] Hardware name: linux,dummy-virt (DT)
[   37.037622]  ret_from_fork+0x10/0x20
[   37.039622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.039755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.039879] page_type: f5(slab)
[   37.039991] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.040189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.040322] page dumped because: kasan: bad access detected
[   37.040438] 
[   37.041469] ==================================================================
[   37.557434] ==================================================================
[   37.557550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.557675] Read of size 8 at addr fff00000c77ec830 by task kunit_try_catch/276
[   37.557862] 
[   37.557965] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.558277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.558427] Hardware name: linux,dummy-virt (DT)
[   37.558585] Call trace:
[   37.558663]  show_stack+0x20/0x38 (C)
[   37.558877]  dump_stack_lvl+0x8c/0xd0
[   37.559040]  print_report+0x118/0x608
[   37.560419]  kasan_report+0xdc/0x128
[   37.560588]  __asan_report_load8_noabort+0x20/0x30
[   37.560723]  kasan_atomics_helper+0x3e10/0x4858
[   37.560959]  kasan_atomics+0x198/0x2e0
[   37.561118]  kunit_try_run_case+0x170/0x3f0
[   37.561265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.561423]  kthread+0x328/0x630
[   37.561541]  ret_from_fork+0x10/0x20
[   37.561662] 
[   37.561747] Allocated by task 276:
[   37.561823]  kasan_save_stack+0x3c/0x68
[   37.561976]  kasan_save_track+0x20/0x40
[   37.562080]  kasan_save_alloc_info+0x40/0x58
[   37.562176]  __kasan_kmalloc+0xd4/0xd8
[   37.562276]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.562386]  kasan_atomics+0xb8/0x2e0
[   37.562483]  kunit_try_run_case+0x170/0x3f0
[   37.562582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.562687]  kthread+0x328/0x630
[   37.562785]  ret_from_fork+0x10/0x20
[   37.563133] 
[   37.563198] The buggy address belongs to the object at fff00000c77ec800
[   37.563198]  which belongs to the cache kmalloc-64 of size 64
[   37.563844] The buggy address is located 0 bytes to the right of
[   37.563844]  allocated 48-byte region [fff00000c77ec800, fff00000c77ec830)
[   37.564689] 
[   37.565227] The buggy address belongs to the physical page:
[   37.565312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ec
[   37.565678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.565940] page_type: f5(slab)
[   37.566350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.566791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.566933] page dumped because: kasan: bad access detected
[   37.567018] 
[   37.567447] Memory state around the buggy address:
[   37.567551]  fff00000c77ec700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.568241]  fff00000c77ec780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.568476] >fff00000c77ec800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.568689]                                      ^
[   37.569039]  fff00000c77ec880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.569375]  fff00000c77ec900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.570451] ==================================================================

[   33.452668] ==================================================================
[   33.453044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   33.453468] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.454203] 
[   33.454505] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.454695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.454734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.454808] Call Trace:
[   33.454854]  <TASK>
[   33.454902]  dump_stack_lvl+0x73/0xb0
[   33.455009]  print_report+0xd1/0x650
[   33.455072]  ? __virt_addr_valid+0x1db/0x2d0
[   33.455139]  ? kasan_atomics_helper+0x4a36/0x5450
[   33.455203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.455278]  ? kasan_atomics_helper+0x4a36/0x5450
[   33.455343]  kasan_report+0x141/0x180
[   33.455407]  ? kasan_atomics_helper+0x4a36/0x5450
[   33.455484]  __asan_report_load4_noabort+0x18/0x20
[   33.455570]  kasan_atomics_helper+0x4a36/0x5450
[   33.455672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.455744]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.455816]  ? kasan_atomics+0x152/0x310
[   33.455903]  kasan_atomics+0x1dc/0x310
[   33.455968]  ? __pfx_kasan_atomics+0x10/0x10
[   33.456034]  ? __pfx_read_tsc+0x10/0x10
[   33.456091]  ? ktime_get_ts64+0x86/0x230
[   33.456159]  kunit_try_run_case+0x1a5/0x480
[   33.456229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.456296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.456368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.456441]  ? __kthread_parkme+0x82/0x180
[   33.456503]  ? preempt_count_sub+0x50/0x80
[   33.456589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.456694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.456749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.456786]  kthread+0x337/0x6f0
[   33.456817]  ? trace_preempt_on+0x20/0xc0
[   33.456852]  ? __pfx_kthread+0x10/0x10
[   33.456883]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.456915]  ? calculate_sigpending+0x7b/0xa0
[   33.456948]  ? __pfx_kthread+0x10/0x10
[   33.456977]  ret_from_fork+0x116/0x1d0
[   33.457004]  ? __pfx_kthread+0x10/0x10
[   33.457034]  ret_from_fork_asm+0x1a/0x30
[   33.457074]  </TASK>
[   33.457090] 
[   33.472379] Allocated by task 295:
[   33.472804]  kasan_save_stack+0x45/0x70
[   33.473192]  kasan_save_track+0x18/0x40
[   33.473596]  kasan_save_alloc_info+0x3b/0x50
[   33.473994]  __kasan_kmalloc+0xb7/0xc0
[   33.474356]  __kmalloc_cache_noprof+0x189/0x420
[   33.474794]  kasan_atomics+0x95/0x310
[   33.475048]  kunit_try_run_case+0x1a5/0x480
[   33.475290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.475855]  kthread+0x337/0x6f0
[   33.476242]  ret_from_fork+0x116/0x1d0
[   33.476674]  ret_from_fork_asm+0x1a/0x30
[   33.477101] 
[   33.477275] The buggy address belongs to the object at ffff888102daa080
[   33.477275]  which belongs to the cache kmalloc-64 of size 64
[   33.478088] The buggy address is located 0 bytes to the right of
[   33.478088]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.479044] 
[   33.479195] The buggy address belongs to the physical page:
[   33.479672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.480427] flags: 0x200000000000000(node=0|zone=2)
[   33.480821] page_type: f5(slab)
[   33.481045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.481767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.482349] page dumped because: kasan: bad access detected
[   33.482813] 
[   33.483071] Memory state around the buggy address:
[   33.483470]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.484101]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.484624] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.485512]                                      ^
[   33.485818]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.486165]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.486841] ==================================================================
[   34.091907] ==================================================================
[   34.092587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   34.093334] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.094134] 
[   34.094316] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.094423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.094454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.094505] Call Trace:
[   34.094567]  <TASK>
[   34.094612]  dump_stack_lvl+0x73/0xb0
[   34.094689]  print_report+0xd1/0x650
[   34.094753]  ? __virt_addr_valid+0x1db/0x2d0
[   34.094818]  ? kasan_atomics_helper+0x1818/0x5450
[   34.094875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.094946]  ? kasan_atomics_helper+0x1818/0x5450
[   34.095009]  kasan_report+0x141/0x180
[   34.095071]  ? kasan_atomics_helper+0x1818/0x5450
[   34.095145]  kasan_check_range+0x10c/0x1c0
[   34.095212]  __kasan_check_write+0x18/0x20
[   34.095277]  kasan_atomics_helper+0x1818/0x5450
[   34.095364]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.095436]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.095509]  ? kasan_atomics+0x152/0x310
[   34.095598]  kasan_atomics+0x1dc/0x310
[   34.095763]  ? __pfx_kasan_atomics+0x10/0x10
[   34.095847]  ? __pfx_read_tsc+0x10/0x10
[   34.095915]  ? ktime_get_ts64+0x86/0x230
[   34.095987]  kunit_try_run_case+0x1a5/0x480
[   34.096061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.096127]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.096201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.096264]  ? __kthread_parkme+0x82/0x180
[   34.096296]  ? preempt_count_sub+0x50/0x80
[   34.096332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.096365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.096400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.096433]  kthread+0x337/0x6f0
[   34.096461]  ? trace_preempt_on+0x20/0xc0
[   34.096494]  ? __pfx_kthread+0x10/0x10
[   34.096523]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.096578]  ? calculate_sigpending+0x7b/0xa0
[   34.096612]  ? __pfx_kthread+0x10/0x10
[   34.096683]  ret_from_fork+0x116/0x1d0
[   34.096715]  ? __pfx_kthread+0x10/0x10
[   34.096744]  ret_from_fork_asm+0x1a/0x30
[   34.096786]  </TASK>
[   34.096803] 
[   34.111470] Allocated by task 295:
[   34.111781]  kasan_save_stack+0x45/0x70
[   34.112077]  kasan_save_track+0x18/0x40
[   34.112316]  kasan_save_alloc_info+0x3b/0x50
[   34.112811]  __kasan_kmalloc+0xb7/0xc0
[   34.113229]  __kmalloc_cache_noprof+0x189/0x420
[   34.113743]  kasan_atomics+0x95/0x310
[   34.114208]  kunit_try_run_case+0x1a5/0x480
[   34.114735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.115307]  kthread+0x337/0x6f0
[   34.115794]  ret_from_fork+0x116/0x1d0
[   34.116269]  ret_from_fork_asm+0x1a/0x30
[   34.116777] 
[   34.117056] The buggy address belongs to the object at ffff888102daa080
[   34.117056]  which belongs to the cache kmalloc-64 of size 64
[   34.117986] The buggy address is located 0 bytes to the right of
[   34.117986]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.118831] 
[   34.119105] The buggy address belongs to the physical page:
[   34.119589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.120033] flags: 0x200000000000000(node=0|zone=2)
[   34.120487] page_type: f5(slab)
[   34.120920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.121611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.122271] page dumped because: kasan: bad access detected
[   34.122864] 
[   34.123032] Memory state around the buggy address:
[   34.123418]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.124043]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.124393] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.125164]                                      ^
[   34.125770]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.126467]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.126948] ==================================================================
[   32.698519] ==================================================================
[   32.699007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   32.700442] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.701107] 
[   32.701446] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.701618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.701655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.701708] Call Trace:
[   32.701754]  <TASK>
[   32.701800]  dump_stack_lvl+0x73/0xb0
[   32.701881]  print_report+0xd1/0x650
[   32.701948]  ? __virt_addr_valid+0x1db/0x2d0
[   32.702016]  ? kasan_atomics_helper+0x4b54/0x5450
[   32.702078]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.702190]  ? kasan_atomics_helper+0x4b54/0x5450
[   32.702224]  kasan_report+0x141/0x180
[   32.702257]  ? kasan_atomics_helper+0x4b54/0x5450
[   32.702294]  __asan_report_load4_noabort+0x18/0x20
[   32.702328]  kasan_atomics_helper+0x4b54/0x5450
[   32.702359]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.702389]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.702424]  ? kasan_atomics+0x152/0x310
[   32.702459]  kasan_atomics+0x1dc/0x310
[   32.702490]  ? __pfx_kasan_atomics+0x10/0x10
[   32.702523]  ? __pfx_read_tsc+0x10/0x10
[   32.702579]  ? ktime_get_ts64+0x86/0x230
[   32.702614]  kunit_try_run_case+0x1a5/0x480
[   32.702675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.702708]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.702744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.702778]  ? __kthread_parkme+0x82/0x180
[   32.702808]  ? preempt_count_sub+0x50/0x80
[   32.702841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.702874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.702907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.702940]  kthread+0x337/0x6f0
[   32.702969]  ? trace_preempt_on+0x20/0xc0
[   32.703002]  ? __pfx_kthread+0x10/0x10
[   32.703031]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.703063]  ? calculate_sigpending+0x7b/0xa0
[   32.703095]  ? __pfx_kthread+0x10/0x10
[   32.703125]  ret_from_fork+0x116/0x1d0
[   32.703152]  ? __pfx_kthread+0x10/0x10
[   32.703181]  ret_from_fork_asm+0x1a/0x30
[   32.703221]  </TASK>
[   32.703236] 
[   32.716673] Allocated by task 295:
[   32.717096]  kasan_save_stack+0x45/0x70
[   32.717518]  kasan_save_track+0x18/0x40
[   32.718000]  kasan_save_alloc_info+0x3b/0x50
[   32.718445]  __kasan_kmalloc+0xb7/0xc0
[   32.718854]  __kmalloc_cache_noprof+0x189/0x420
[   32.719321]  kasan_atomics+0x95/0x310
[   32.719746]  kunit_try_run_case+0x1a5/0x480
[   32.720159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.720815]  kthread+0x337/0x6f0
[   32.721236]  ret_from_fork+0x116/0x1d0
[   32.721662]  ret_from_fork_asm+0x1a/0x30
[   32.721996] 
[   32.722213] The buggy address belongs to the object at ffff888102daa080
[   32.722213]  which belongs to the cache kmalloc-64 of size 64
[   32.723063] The buggy address is located 0 bytes to the right of
[   32.723063]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.723997] 
[   32.724313] The buggy address belongs to the physical page:
[   32.724899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.725658] flags: 0x200000000000000(node=0|zone=2)
[   32.726102] page_type: f5(slab)
[   32.726503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.727159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.727950] page dumped because: kasan: bad access detected
[   32.728321] 
[   32.728593] Memory state around the buggy address:
[   32.729130]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.729720]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.730278] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.730896]                                      ^
[   32.731340]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.731877]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.732367] ==================================================================
[   32.988352] ==================================================================
[   32.989068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   32.990387] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.991389] 
[   32.991601] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.991779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.991812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.991896] Call Trace:
[   32.991942]  <TASK>
[   32.991991]  dump_stack_lvl+0x73/0xb0
[   32.992068]  print_report+0xd1/0x650
[   32.992115]  ? __virt_addr_valid+0x1db/0x2d0
[   32.992152]  ? kasan_atomics_helper+0x860/0x5450
[   32.992184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.992220]  ? kasan_atomics_helper+0x860/0x5450
[   32.992251]  kasan_report+0x141/0x180
[   32.992281]  ? kasan_atomics_helper+0x860/0x5450
[   32.992316]  kasan_check_range+0x10c/0x1c0
[   32.992348]  __kasan_check_write+0x18/0x20
[   32.992379]  kasan_atomics_helper+0x860/0x5450
[   32.992410]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.992439]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.992473]  ? kasan_atomics+0x152/0x310
[   32.992508]  kasan_atomics+0x1dc/0x310
[   32.992558]  ? __pfx_kasan_atomics+0x10/0x10
[   32.992594]  ? __pfx_read_tsc+0x10/0x10
[   32.992641]  ? ktime_get_ts64+0x86/0x230
[   32.992698]  kunit_try_run_case+0x1a5/0x480
[   32.992734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.992766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.992801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.992835]  ? __kthread_parkme+0x82/0x180
[   32.992865]  ? preempt_count_sub+0x50/0x80
[   32.992899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.992932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.992966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.992999]  kthread+0x337/0x6f0
[   32.993027]  ? trace_preempt_on+0x20/0xc0
[   32.993060]  ? __pfx_kthread+0x10/0x10
[   32.993089]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.993121]  ? calculate_sigpending+0x7b/0xa0
[   32.993153]  ? __pfx_kthread+0x10/0x10
[   32.993183]  ret_from_fork+0x116/0x1d0
[   32.993210]  ? __pfx_kthread+0x10/0x10
[   32.993239]  ret_from_fork_asm+0x1a/0x30
[   32.993280]  </TASK>
[   32.993296] 
[   33.007586] Allocated by task 295:
[   33.008066]  kasan_save_stack+0x45/0x70
[   33.008510]  kasan_save_track+0x18/0x40
[   33.009006]  kasan_save_alloc_info+0x3b/0x50
[   33.009434]  __kasan_kmalloc+0xb7/0xc0
[   33.009911]  __kmalloc_cache_noprof+0x189/0x420
[   33.010329]  kasan_atomics+0x95/0x310
[   33.010812]  kunit_try_run_case+0x1a5/0x480
[   33.011093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.011389]  kthread+0x337/0x6f0
[   33.011618]  ret_from_fork+0x116/0x1d0
[   33.011914]  ret_from_fork_asm+0x1a/0x30
[   33.012362] 
[   33.012584] The buggy address belongs to the object at ffff888102daa080
[   33.012584]  which belongs to the cache kmalloc-64 of size 64
[   33.013772] The buggy address is located 0 bytes to the right of
[   33.013772]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.015115] 
[   33.015335] The buggy address belongs to the physical page:
[   33.015888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.016600] flags: 0x200000000000000(node=0|zone=2)
[   33.017050] page_type: f5(slab)
[   33.017341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.018067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.018851] page dumped because: kasan: bad access detected
[   33.019398] 
[   33.019653] Memory state around the buggy address:
[   33.019996]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.020704]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.021279] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.021953]                                      ^
[   33.022325]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.022961]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.023585] ==================================================================
[   33.630282] ==================================================================
[   33.631817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   33.632224] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.632908] 
[   33.633097] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.633210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.633244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.633299] Call Trace:
[   33.633344]  <TASK>
[   33.633389]  dump_stack_lvl+0x73/0xb0
[   33.633469]  print_report+0xd1/0x650
[   33.633549]  ? __virt_addr_valid+0x1db/0x2d0
[   33.633619]  ? kasan_atomics_helper+0x1217/0x5450
[   33.633683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.633756]  ? kasan_atomics_helper+0x1217/0x5450
[   33.633821]  kasan_report+0x141/0x180
[   33.633883]  ? kasan_atomics_helper+0x1217/0x5450
[   33.633953]  kasan_check_range+0x10c/0x1c0
[   33.634014]  __kasan_check_write+0x18/0x20
[   33.634077]  kasan_atomics_helper+0x1217/0x5450
[   33.634175]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.634270]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.634335]  ? kasan_atomics+0x152/0x310
[   33.634397]  kasan_atomics+0x1dc/0x310
[   33.634460]  ? __pfx_kasan_atomics+0x10/0x10
[   33.634787]  ? __pfx_read_tsc+0x10/0x10
[   33.634861]  ? ktime_get_ts64+0x86/0x230
[   33.634931]  kunit_try_run_case+0x1a5/0x480
[   33.635005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.635072]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.635143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.635184]  ? __kthread_parkme+0x82/0x180
[   33.635216]  ? preempt_count_sub+0x50/0x80
[   33.635250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.635285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.635321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.635355]  kthread+0x337/0x6f0
[   33.635383]  ? trace_preempt_on+0x20/0xc0
[   33.635416]  ? __pfx_kthread+0x10/0x10
[   33.635446]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.635478]  ? calculate_sigpending+0x7b/0xa0
[   33.635511]  ? __pfx_kthread+0x10/0x10
[   33.635563]  ret_from_fork+0x116/0x1d0
[   33.635592]  ? __pfx_kthread+0x10/0x10
[   33.635623]  ret_from_fork_asm+0x1a/0x30
[   33.635681]  </TASK>
[   33.635697] 
[   33.648141] Allocated by task 295:
[   33.648479]  kasan_save_stack+0x45/0x70
[   33.648994]  kasan_save_track+0x18/0x40
[   33.649254]  kasan_save_alloc_info+0x3b/0x50
[   33.649516]  __kasan_kmalloc+0xb7/0xc0
[   33.649948]  __kmalloc_cache_noprof+0x189/0x420
[   33.650520]  kasan_atomics+0x95/0x310
[   33.651041]  kunit_try_run_case+0x1a5/0x480
[   33.651487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.652153]  kthread+0x337/0x6f0
[   33.652497]  ret_from_fork+0x116/0x1d0
[   33.652973]  ret_from_fork_asm+0x1a/0x30
[   33.653400] 
[   33.653556] The buggy address belongs to the object at ffff888102daa080
[   33.653556]  which belongs to the cache kmalloc-64 of size 64
[   33.654132] The buggy address is located 0 bytes to the right of
[   33.654132]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.654884] 
[   33.655104] The buggy address belongs to the physical page:
[   33.655655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.656390] flags: 0x200000000000000(node=0|zone=2)
[   33.656979] page_type: f5(slab)
[   33.657331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.658136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.658716] page dumped because: kasan: bad access detected
[   33.659073] 
[   33.659341] Memory state around the buggy address:
[   33.659857]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.660218]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.660579] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.661241]                                      ^
[   33.661812]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.662476]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.663144] ==================================================================
[   33.948748] ==================================================================
[   33.949402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   33.950030] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.950552] 
[   33.950952] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.951074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.951109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.951159] Call Trace:
[   33.951202]  <TASK>
[   33.951248]  dump_stack_lvl+0x73/0xb0
[   33.951325]  print_report+0xd1/0x650
[   33.951387]  ? __virt_addr_valid+0x1db/0x2d0
[   33.951447]  ? kasan_atomics_helper+0x15b6/0x5450
[   33.951501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.951587]  ? kasan_atomics_helper+0x15b6/0x5450
[   33.951686]  kasan_report+0x141/0x180
[   33.951750]  ? kasan_atomics_helper+0x15b6/0x5450
[   33.951836]  kasan_check_range+0x10c/0x1c0
[   33.951905]  __kasan_check_write+0x18/0x20
[   33.951961]  kasan_atomics_helper+0x15b6/0x5450
[   33.951996]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.952028]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.952064]  ? kasan_atomics+0x152/0x310
[   33.952100]  kasan_atomics+0x1dc/0x310
[   33.952132]  ? __pfx_kasan_atomics+0x10/0x10
[   33.952164]  ? __pfx_read_tsc+0x10/0x10
[   33.952198]  ? ktime_get_ts64+0x86/0x230
[   33.952232]  kunit_try_run_case+0x1a5/0x480
[   33.952266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.952298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.952334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.952367]  ? __kthread_parkme+0x82/0x180
[   33.952396]  ? preempt_count_sub+0x50/0x80
[   33.952428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.952461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.952494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.952527]  kthread+0x337/0x6f0
[   33.952579]  ? trace_preempt_on+0x20/0xc0
[   33.952614]  ? __pfx_kthread+0x10/0x10
[   33.952669]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.952703]  ? calculate_sigpending+0x7b/0xa0
[   33.952737]  ? __pfx_kthread+0x10/0x10
[   33.952767]  ret_from_fork+0x116/0x1d0
[   33.952795]  ? __pfx_kthread+0x10/0x10
[   33.952824]  ret_from_fork_asm+0x1a/0x30
[   33.952865]  </TASK>
[   33.952882] 
[   33.967597] Allocated by task 295:
[   33.968337]  kasan_save_stack+0x45/0x70
[   33.968894]  kasan_save_track+0x18/0x40
[   33.969376]  kasan_save_alloc_info+0x3b/0x50
[   33.969816]  __kasan_kmalloc+0xb7/0xc0
[   33.970298]  __kmalloc_cache_noprof+0x189/0x420
[   33.970729]  kasan_atomics+0x95/0x310
[   33.971155]  kunit_try_run_case+0x1a5/0x480
[   33.971767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.972143]  kthread+0x337/0x6f0
[   33.972605]  ret_from_fork+0x116/0x1d0
[   33.973131]  ret_from_fork_asm+0x1a/0x30
[   33.973614] 
[   33.973872] The buggy address belongs to the object at ffff888102daa080
[   33.973872]  which belongs to the cache kmalloc-64 of size 64
[   33.974647] The buggy address is located 0 bytes to the right of
[   33.974647]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.975906] 
[   33.976063] The buggy address belongs to the physical page:
[   33.976690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.977352] flags: 0x200000000000000(node=0|zone=2)
[   33.977821] page_type: f5(slab)
[   33.978300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.978953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.979667] page dumped because: kasan: bad access detected
[   33.980139] 
[   33.980377] Memory state around the buggy address:
[   33.980908]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.981471]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.982121] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.982713]                                      ^
[   33.982983]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.983745]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.984226] ==================================================================
[   32.916130] ==================================================================
[   32.916602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   32.917356] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.918049] 
[   32.918271] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.918413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.918464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.918518] Call Trace:
[   32.918579]  <TASK>
[   32.918638]  dump_stack_lvl+0x73/0xb0
[   32.918713]  print_report+0xd1/0x650
[   32.918776]  ? __virt_addr_valid+0x1db/0x2d0
[   32.918840]  ? kasan_atomics_helper+0x72f/0x5450
[   32.918899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.918962]  ? kasan_atomics_helper+0x72f/0x5450
[   32.919049]  kasan_report+0x141/0x180
[   32.919113]  ? kasan_atomics_helper+0x72f/0x5450
[   32.919189]  kasan_check_range+0x10c/0x1c0
[   32.919256]  __kasan_check_write+0x18/0x20
[   32.919318]  kasan_atomics_helper+0x72f/0x5450
[   32.919352]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.919384]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.919419]  ? kasan_atomics+0x152/0x310
[   32.919454]  kasan_atomics+0x1dc/0x310
[   32.919485]  ? __pfx_kasan_atomics+0x10/0x10
[   32.919517]  ? __pfx_read_tsc+0x10/0x10
[   32.919571]  ? ktime_get_ts64+0x86/0x230
[   32.919606]  kunit_try_run_case+0x1a5/0x480
[   32.919654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.919690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.919729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.919763]  ? __kthread_parkme+0x82/0x180
[   32.919792]  ? preempt_count_sub+0x50/0x80
[   32.919837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.919871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.919904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.919937]  kthread+0x337/0x6f0
[   32.919965]  ? trace_preempt_on+0x20/0xc0
[   32.919998]  ? __pfx_kthread+0x10/0x10
[   32.920027]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.920059]  ? calculate_sigpending+0x7b/0xa0
[   32.920092]  ? __pfx_kthread+0x10/0x10
[   32.920121]  ret_from_fork+0x116/0x1d0
[   32.920148]  ? __pfx_kthread+0x10/0x10
[   32.920176]  ret_from_fork_asm+0x1a/0x30
[   32.920217]  </TASK>
[   32.920233] 
[   32.936955] Allocated by task 295:
[   32.937231]  kasan_save_stack+0x45/0x70
[   32.937695]  kasan_save_track+0x18/0x40
[   32.937997]  kasan_save_alloc_info+0x3b/0x50
[   32.938382]  __kasan_kmalloc+0xb7/0xc0
[   32.938768]  __kmalloc_cache_noprof+0x189/0x420
[   32.939176]  kasan_atomics+0x95/0x310
[   32.939615]  kunit_try_run_case+0x1a5/0x480
[   32.939936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.940533]  kthread+0x337/0x6f0
[   32.941026]  ret_from_fork+0x116/0x1d0
[   32.941433]  ret_from_fork_asm+0x1a/0x30
[   32.941888] 
[   32.942119] The buggy address belongs to the object at ffff888102daa080
[   32.942119]  which belongs to the cache kmalloc-64 of size 64
[   32.943053] The buggy address is located 0 bytes to the right of
[   32.943053]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.943918] 
[   32.944187] The buggy address belongs to the physical page:
[   32.944825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.945465] flags: 0x200000000000000(node=0|zone=2)
[   32.945900] page_type: f5(slab)
[   32.946278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.946950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.947595] page dumped because: kasan: bad access detected
[   32.948077] 
[   32.948286] Memory state around the buggy address:
[   32.948725]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.949396]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.950058] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.950609]                                      ^
[   32.951150]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.951707]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.952288] ==================================================================
[   34.020306] ==================================================================
[   34.021144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   34.021752] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.022203] 
[   34.022444] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.022604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.022665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.022720] Call Trace:
[   34.022763]  <TASK>
[   34.022808]  dump_stack_lvl+0x73/0xb0
[   34.022886]  print_report+0xd1/0x650
[   34.022949]  ? __virt_addr_valid+0x1db/0x2d0
[   34.023011]  ? kasan_atomics_helper+0x16e7/0x5450
[   34.023067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.023134]  ? kasan_atomics_helper+0x16e7/0x5450
[   34.023194]  kasan_report+0x141/0x180
[   34.023259]  ? kasan_atomics_helper+0x16e7/0x5450
[   34.023327]  kasan_check_range+0x10c/0x1c0
[   34.023389]  __kasan_check_write+0x18/0x20
[   34.023449]  kasan_atomics_helper+0x16e7/0x5450
[   34.023507]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.023587]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.023692]  ? kasan_atomics+0x152/0x310
[   34.023761]  kasan_atomics+0x1dc/0x310
[   34.023830]  ? __pfx_kasan_atomics+0x10/0x10
[   34.023898]  ? __pfx_read_tsc+0x10/0x10
[   34.023956]  ? ktime_get_ts64+0x86/0x230
[   34.024018]  kunit_try_run_case+0x1a5/0x480
[   34.024059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.024094]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.024131]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.024165]  ? __kthread_parkme+0x82/0x180
[   34.024195]  ? preempt_count_sub+0x50/0x80
[   34.024227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.024299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.024334]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.024368]  kthread+0x337/0x6f0
[   34.024396]  ? trace_preempt_on+0x20/0xc0
[   34.024429]  ? __pfx_kthread+0x10/0x10
[   34.024459]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.024491]  ? calculate_sigpending+0x7b/0xa0
[   34.024524]  ? __pfx_kthread+0x10/0x10
[   34.024579]  ret_from_fork+0x116/0x1d0
[   34.024608]  ? __pfx_kthread+0x10/0x10
[   34.024662]  ret_from_fork_asm+0x1a/0x30
[   34.024708]  </TASK>
[   34.024726] 
[   34.039267] Allocated by task 295:
[   34.039770]  kasan_save_stack+0x45/0x70
[   34.040256]  kasan_save_track+0x18/0x40
[   34.040748]  kasan_save_alloc_info+0x3b/0x50
[   34.041123]  __kasan_kmalloc+0xb7/0xc0
[   34.041586]  __kmalloc_cache_noprof+0x189/0x420
[   34.042117]  kasan_atomics+0x95/0x310
[   34.042411]  kunit_try_run_case+0x1a5/0x480
[   34.042874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.043275]  kthread+0x337/0x6f0
[   34.043700]  ret_from_fork+0x116/0x1d0
[   34.044044]  ret_from_fork_asm+0x1a/0x30
[   34.044355] 
[   34.044606] The buggy address belongs to the object at ffff888102daa080
[   34.044606]  which belongs to the cache kmalloc-64 of size 64
[   34.045460] The buggy address is located 0 bytes to the right of
[   34.045460]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.046397] 
[   34.046671] The buggy address belongs to the physical page:
[   34.047089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.047795] flags: 0x200000000000000(node=0|zone=2)
[   34.048120] page_type: f5(slab)
[   34.048525] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.049232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.049920] page dumped because: kasan: bad access detected
[   34.050245] 
[   34.050393] Memory state around the buggy address:
[   34.050818]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.051398]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.051951] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.052482]                                      ^
[   34.052986]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.053497]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.054066] ==================================================================
[   34.305849] ==================================================================
[   34.306390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   34.307095] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.307478] 
[   34.307813] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.307951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.307988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.308038] Call Trace:
[   34.308079]  <TASK>
[   34.308137]  dump_stack_lvl+0x73/0xb0
[   34.308234]  print_report+0xd1/0x650
[   34.308300]  ? __virt_addr_valid+0x1db/0x2d0
[   34.308363]  ? kasan_atomics_helper+0x1c18/0x5450
[   34.308424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.308502]  ? kasan_atomics_helper+0x1c18/0x5450
[   34.308589]  kasan_report+0x141/0x180
[   34.308691]  ? kasan_atomics_helper+0x1c18/0x5450
[   34.308765]  kasan_check_range+0x10c/0x1c0
[   34.308840]  __kasan_check_write+0x18/0x20
[   34.308925]  kasan_atomics_helper+0x1c18/0x5450
[   34.308985]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.309025]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.309063]  ? kasan_atomics+0x152/0x310
[   34.309100]  kasan_atomics+0x1dc/0x310
[   34.309135]  ? __pfx_kasan_atomics+0x10/0x10
[   34.309192]  ? __pfx_read_tsc+0x10/0x10
[   34.309253]  ? ktime_get_ts64+0x86/0x230
[   34.309330]  kunit_try_run_case+0x1a5/0x480
[   34.309418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.309478]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.309560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.309660]  ? __kthread_parkme+0x82/0x180
[   34.309740]  ? preempt_count_sub+0x50/0x80
[   34.309825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.309867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.309902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.309936]  kthread+0x337/0x6f0
[   34.309965]  ? trace_preempt_on+0x20/0xc0
[   34.310000]  ? __pfx_kthread+0x10/0x10
[   34.310030]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.310064]  ? calculate_sigpending+0x7b/0xa0
[   34.310098]  ? __pfx_kthread+0x10/0x10
[   34.310128]  ret_from_fork+0x116/0x1d0
[   34.310155]  ? __pfx_kthread+0x10/0x10
[   34.310183]  ret_from_fork_asm+0x1a/0x30
[   34.310225]  </TASK>
[   34.310241] 
[   34.324123] Allocated by task 295:
[   34.324584]  kasan_save_stack+0x45/0x70
[   34.325037]  kasan_save_track+0x18/0x40
[   34.325291]  kasan_save_alloc_info+0x3b/0x50
[   34.325598]  __kasan_kmalloc+0xb7/0xc0
[   34.326107]  __kmalloc_cache_noprof+0x189/0x420
[   34.326591]  kasan_atomics+0x95/0x310
[   34.327003]  kunit_try_run_case+0x1a5/0x480
[   34.327414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.327948]  kthread+0x337/0x6f0
[   34.328346]  ret_from_fork+0x116/0x1d0
[   34.328866]  ret_from_fork_asm+0x1a/0x30
[   34.329221] 
[   34.329362] The buggy address belongs to the object at ffff888102daa080
[   34.329362]  which belongs to the cache kmalloc-64 of size 64
[   34.330407] The buggy address is located 0 bytes to the right of
[   34.330407]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.331514] 
[   34.331815] The buggy address belongs to the physical page:
[   34.332237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.332893] flags: 0x200000000000000(node=0|zone=2)
[   34.333345] page_type: f5(slab)
[   34.333760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.334433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.335030] page dumped because: kasan: bad access detected
[   34.335324] 
[   34.335452] Memory state around the buggy address:
[   34.335917]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.336712]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.337444] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.337979]                                      ^
[   34.338434]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.338960]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.339331] ==================================================================
[   34.197923] ==================================================================
[   34.198564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   34.199792] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.200434] 
[   34.200710] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.200830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.200863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.200916] Call Trace:
[   34.200961]  <TASK>
[   34.201003]  dump_stack_lvl+0x73/0xb0
[   34.201084]  print_report+0xd1/0x650
[   34.201147]  ? __virt_addr_valid+0x1db/0x2d0
[   34.201215]  ? kasan_atomics_helper+0x19e3/0x5450
[   34.201276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.201399]  ? kasan_atomics_helper+0x19e3/0x5450
[   34.201467]  kasan_report+0x141/0x180
[   34.201533]  ? kasan_atomics_helper+0x19e3/0x5450
[   34.201654]  kasan_check_range+0x10c/0x1c0
[   34.201703]  __kasan_check_write+0x18/0x20
[   34.201739]  kasan_atomics_helper+0x19e3/0x5450
[   34.201771]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.201803]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.201837]  ? kasan_atomics+0x152/0x310
[   34.201872]  kasan_atomics+0x1dc/0x310
[   34.201904]  ? __pfx_kasan_atomics+0x10/0x10
[   34.201936]  ? __pfx_read_tsc+0x10/0x10
[   34.201969]  ? ktime_get_ts64+0x86/0x230
[   34.202002]  kunit_try_run_case+0x1a5/0x480
[   34.202036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.202068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.202103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.202135]  ? __kthread_parkme+0x82/0x180
[   34.202164]  ? preempt_count_sub+0x50/0x80
[   34.202197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.202230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.202262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.202295]  kthread+0x337/0x6f0
[   34.202323]  ? trace_preempt_on+0x20/0xc0
[   34.202355]  ? __pfx_kthread+0x10/0x10
[   34.202383]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.202415]  ? calculate_sigpending+0x7b/0xa0
[   34.202447]  ? __pfx_kthread+0x10/0x10
[   34.202476]  ret_from_fork+0x116/0x1d0
[   34.202503]  ? __pfx_kthread+0x10/0x10
[   34.202531]  ret_from_fork_asm+0x1a/0x30
[   34.202592]  </TASK>
[   34.202609] 
[   34.214665] Allocated by task 295:
[   34.215009]  kasan_save_stack+0x45/0x70
[   34.215462]  kasan_save_track+0x18/0x40
[   34.215967]  kasan_save_alloc_info+0x3b/0x50
[   34.216415]  __kasan_kmalloc+0xb7/0xc0
[   34.216823]  __kmalloc_cache_noprof+0x189/0x420
[   34.217341]  kasan_atomics+0x95/0x310
[   34.217760]  kunit_try_run_case+0x1a5/0x480
[   34.218176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.218491]  kthread+0x337/0x6f0
[   34.218735]  ret_from_fork+0x116/0x1d0
[   34.218977]  ret_from_fork_asm+0x1a/0x30
[   34.219297] 
[   34.219524] The buggy address belongs to the object at ffff888102daa080
[   34.219524]  which belongs to the cache kmalloc-64 of size 64
[   34.220659] The buggy address is located 0 bytes to the right of
[   34.220659]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.221793] 
[   34.222017] The buggy address belongs to the physical page:
[   34.222517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.223145] flags: 0x200000000000000(node=0|zone=2)
[   34.223433] page_type: f5(slab)
[   34.223670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.224224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.224980] page dumped because: kasan: bad access detected
[   34.225510] 
[   34.225772] Memory state around the buggy address:
[   34.226238]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.226862]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.227221] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.227696]                                      ^
[   34.228182]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.228884]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.229486] ==================================================================
[   33.664364] ==================================================================
[   33.665035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   33.666071] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.667124] 
[   33.667387] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.667511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.667559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.667615] Call Trace:
[   33.667689]  <TASK>
[   33.667733]  dump_stack_lvl+0x73/0xb0
[   33.667834]  print_report+0xd1/0x650
[   33.667919]  ? __virt_addr_valid+0x1db/0x2d0
[   33.667983]  ? kasan_atomics_helper+0x49e8/0x5450
[   33.668039]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.668106]  ? kasan_atomics_helper+0x49e8/0x5450
[   33.668178]  kasan_report+0x141/0x180
[   33.668262]  ? kasan_atomics_helper+0x49e8/0x5450
[   33.668327]  __asan_report_load4_noabort+0x18/0x20
[   33.668393]  kasan_atomics_helper+0x49e8/0x5450
[   33.668455]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.668519]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.668615]  ? kasan_atomics+0x152/0x310
[   33.668726]  kasan_atomics+0x1dc/0x310
[   33.668796]  ? __pfx_kasan_atomics+0x10/0x10
[   33.668867]  ? __pfx_read_tsc+0x10/0x10
[   33.668922]  ? ktime_get_ts64+0x86/0x230
[   33.668971]  kunit_try_run_case+0x1a5/0x480
[   33.669009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.669043]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.669078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.669111]  ? __kthread_parkme+0x82/0x180
[   33.669140]  ? preempt_count_sub+0x50/0x80
[   33.669174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.669206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.669240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.669273]  kthread+0x337/0x6f0
[   33.669300]  ? trace_preempt_on+0x20/0xc0
[   33.669333]  ? __pfx_kthread+0x10/0x10
[   33.669363]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.669394]  ? calculate_sigpending+0x7b/0xa0
[   33.669427]  ? __pfx_kthread+0x10/0x10
[   33.669457]  ret_from_fork+0x116/0x1d0
[   33.669484]  ? __pfx_kthread+0x10/0x10
[   33.669512]  ret_from_fork_asm+0x1a/0x30
[   33.669576]  </TASK>
[   33.669592] 
[   33.685402] Allocated by task 295:
[   33.686059]  kasan_save_stack+0x45/0x70
[   33.686400]  kasan_save_track+0x18/0x40
[   33.686723]  kasan_save_alloc_info+0x3b/0x50
[   33.687144]  __kasan_kmalloc+0xb7/0xc0
[   33.687870]  __kmalloc_cache_noprof+0x189/0x420
[   33.688182]  kasan_atomics+0x95/0x310
[   33.688479]  kunit_try_run_case+0x1a5/0x480
[   33.688975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.689360]  kthread+0x337/0x6f0
[   33.689653]  ret_from_fork+0x116/0x1d0
[   33.689995]  ret_from_fork_asm+0x1a/0x30
[   33.690393] 
[   33.690552] The buggy address belongs to the object at ffff888102daa080
[   33.690552]  which belongs to the cache kmalloc-64 of size 64
[   33.691447] The buggy address is located 0 bytes to the right of
[   33.691447]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.692325] 
[   33.692556] The buggy address belongs to the physical page:
[   33.692937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.693431] flags: 0x200000000000000(node=0|zone=2)
[   33.693954] page_type: f5(slab)
[   33.694298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.694831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.695292] page dumped because: kasan: bad access detected
[   33.695831] 
[   33.696038] Memory state around the buggy address:
[   33.696449]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.697077]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.697594] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.698096]                                      ^
[   33.698432]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.700099]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.700775] ==================================================================
[   34.340578] ==================================================================
[   34.341247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   34.341833] Read of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.342360] 
[   34.342626] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.342735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.342769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.342861] Call Trace:
[   34.342925]  <TASK>
[   34.342972]  dump_stack_lvl+0x73/0xb0
[   34.343049]  print_report+0xd1/0x650
[   34.343108]  ? __virt_addr_valid+0x1db/0x2d0
[   34.343224]  ? kasan_atomics_helper+0x4f30/0x5450
[   34.343314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.343386]  ? kasan_atomics_helper+0x4f30/0x5450
[   34.343450]  kasan_report+0x141/0x180
[   34.343573]  ? kasan_atomics_helper+0x4f30/0x5450
[   34.343654]  __asan_report_load8_noabort+0x18/0x20
[   34.343724]  kasan_atomics_helper+0x4f30/0x5450
[   34.343783]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.343847]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.343904]  ? kasan_atomics+0x152/0x310
[   34.343972]  kasan_atomics+0x1dc/0x310
[   34.344077]  ? __pfx_kasan_atomics+0x10/0x10
[   34.344167]  ? __pfx_read_tsc+0x10/0x10
[   34.344322]  ? ktime_get_ts64+0x86/0x230
[   34.344465]  kunit_try_run_case+0x1a5/0x480
[   34.344584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.344701]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.344782]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.344854]  ? __kthread_parkme+0x82/0x180
[   34.344918]  ? preempt_count_sub+0x50/0x80
[   34.344987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.345053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.345159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.345256]  kthread+0x337/0x6f0
[   34.345315]  ? trace_preempt_on+0x20/0xc0
[   34.345380]  ? __pfx_kthread+0x10/0x10
[   34.345478]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.345581]  ? calculate_sigpending+0x7b/0xa0
[   34.345656]  ? __pfx_kthread+0x10/0x10
[   34.345704]  ret_from_fork+0x116/0x1d0
[   34.345736]  ? __pfx_kthread+0x10/0x10
[   34.345768]  ret_from_fork_asm+0x1a/0x30
[   34.345811]  </TASK>
[   34.345827] 
[   34.359198] Allocated by task 295:
[   34.359593]  kasan_save_stack+0x45/0x70
[   34.360080]  kasan_save_track+0x18/0x40
[   34.360529]  kasan_save_alloc_info+0x3b/0x50
[   34.361050]  __kasan_kmalloc+0xb7/0xc0
[   34.361363]  __kmalloc_cache_noprof+0x189/0x420
[   34.361783]  kasan_atomics+0x95/0x310
[   34.362176]  kunit_try_run_case+0x1a5/0x480
[   34.362748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.363344]  kthread+0x337/0x6f0
[   34.363772]  ret_from_fork+0x116/0x1d0
[   34.364089]  ret_from_fork_asm+0x1a/0x30
[   34.364630] 
[   34.364847] The buggy address belongs to the object at ffff888102daa080
[   34.364847]  which belongs to the cache kmalloc-64 of size 64
[   34.365767] The buggy address is located 0 bytes to the right of
[   34.365767]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.366759] 
[   34.366979] The buggy address belongs to the physical page:
[   34.367511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.368120] flags: 0x200000000000000(node=0|zone=2)
[   34.368571] page_type: f5(slab)
[   34.368995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.369401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.369969] page dumped because: kasan: bad access detected
[   34.370523] 
[   34.370862] Memory state around the buggy address:
[   34.371223]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.371864]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.372226] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.372870]                                      ^
[   34.373480]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.374217]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.374884] ==================================================================
[   32.629641] ==================================================================
[   32.630178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   32.630704] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.631239] 
[   32.631601] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.631761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.631798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.631901] Call Trace:
[   32.631937]  <TASK>
[   32.631998]  dump_stack_lvl+0x73/0xb0
[   32.632134]  print_report+0xd1/0x650
[   32.632200]  ? __virt_addr_valid+0x1db/0x2d0
[   32.632271]  ? kasan_atomics_helper+0x4b6e/0x5450
[   32.632332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.632384]  ? kasan_atomics_helper+0x4b6e/0x5450
[   32.632416]  kasan_report+0x141/0x180
[   32.632449]  ? kasan_atomics_helper+0x4b6e/0x5450
[   32.632485]  __asan_report_store4_noabort+0x1b/0x30
[   32.632520]  kasan_atomics_helper+0x4b6e/0x5450
[   32.632572]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.632604]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.632667]  ? kasan_atomics+0x152/0x310
[   32.632705]  kasan_atomics+0x1dc/0x310
[   32.632737]  ? __pfx_kasan_atomics+0x10/0x10
[   32.632770]  ? __pfx_read_tsc+0x10/0x10
[   32.632803]  ? ktime_get_ts64+0x86/0x230
[   32.632837]  kunit_try_run_case+0x1a5/0x480
[   32.632871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.632903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.632939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.632973]  ? __kthread_parkme+0x82/0x180
[   32.633003]  ? preempt_count_sub+0x50/0x80
[   32.633035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.633068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.633101]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.633134]  kthread+0x337/0x6f0
[   32.633161]  ? trace_preempt_on+0x20/0xc0
[   32.633192]  ? __pfx_kthread+0x10/0x10
[   32.633220]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.633252]  ? calculate_sigpending+0x7b/0xa0
[   32.633284]  ? __pfx_kthread+0x10/0x10
[   32.633313]  ret_from_fork+0x116/0x1d0
[   32.633340]  ? __pfx_kthread+0x10/0x10
[   32.633368]  ret_from_fork_asm+0x1a/0x30
[   32.633410]  </TASK>
[   32.633426] 
[   32.647917] Allocated by task 295:
[   32.648369]  kasan_save_stack+0x45/0x70
[   32.648915]  kasan_save_track+0x18/0x40
[   32.649614]  kasan_save_alloc_info+0x3b/0x50
[   32.650078]  __kasan_kmalloc+0xb7/0xc0
[   32.650445]  __kmalloc_cache_noprof+0x189/0x420
[   32.650984]  kasan_atomics+0x95/0x310
[   32.651263]  kunit_try_run_case+0x1a5/0x480
[   32.651806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.652257]  kthread+0x337/0x6f0
[   32.652733]  ret_from_fork+0x116/0x1d0
[   32.653320]  ret_from_fork_asm+0x1a/0x30
[   32.653699] 
[   32.653863] The buggy address belongs to the object at ffff888102daa080
[   32.653863]  which belongs to the cache kmalloc-64 of size 64
[   32.654774] The buggy address is located 0 bytes to the right of
[   32.654774]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.655604] 
[   32.655850] The buggy address belongs to the physical page:
[   32.656273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.657171] flags: 0x200000000000000(node=0|zone=2)
[   32.657658] page_type: f5(slab)
[   32.658210] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.659064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.659571] page dumped because: kasan: bad access detected
[   32.659995] 
[   32.660162] Memory state around the buggy address:
[   32.660552]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.660965]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.661602] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.662058]                                      ^
[   32.662395]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.662931]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.663424] ==================================================================
[   32.664780] ==================================================================
[   32.665180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   32.665557] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.666115] 
[   32.666344] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.666464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.666500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.666608] Call Trace:
[   32.666681]  <TASK>
[   32.666728]  dump_stack_lvl+0x73/0xb0
[   32.666807]  print_report+0xd1/0x650
[   32.666864]  ? __virt_addr_valid+0x1db/0x2d0
[   32.666929]  ? kasan_atomics_helper+0x3df/0x5450
[   32.666989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.667062]  ? kasan_atomics_helper+0x3df/0x5450
[   32.667126]  kasan_report+0x141/0x180
[   32.667188]  ? kasan_atomics_helper+0x3df/0x5450
[   32.667250]  kasan_check_range+0x10c/0x1c0
[   32.667307]  __kasan_check_read+0x15/0x20
[   32.667360]  kasan_atomics_helper+0x3df/0x5450
[   32.667413]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.667473]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.667559]  ? kasan_atomics+0x152/0x310
[   32.667668]  kasan_atomics+0x1dc/0x310
[   32.667740]  ? __pfx_kasan_atomics+0x10/0x10
[   32.667810]  ? __pfx_read_tsc+0x10/0x10
[   32.667888]  ? ktime_get_ts64+0x86/0x230
[   32.667946]  kunit_try_run_case+0x1a5/0x480
[   32.668014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.668117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.668179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.668232]  ? __kthread_parkme+0x82/0x180
[   32.668276]  ? preempt_count_sub+0x50/0x80
[   32.668326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.668374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.668427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.668479]  kthread+0x337/0x6f0
[   32.668522]  ? trace_preempt_on+0x20/0xc0
[   32.668596]  ? __pfx_kthread+0x10/0x10
[   32.668679]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.668739]  ? calculate_sigpending+0x7b/0xa0
[   32.668800]  ? __pfx_kthread+0x10/0x10
[   32.668854]  ret_from_fork+0x116/0x1d0
[   32.668911]  ? __pfx_kthread+0x10/0x10
[   32.668970]  ret_from_fork_asm+0x1a/0x30
[   32.669074]  </TASK>
[   32.669108] 
[   32.681511] Allocated by task 295:
[   32.681798]  kasan_save_stack+0x45/0x70
[   32.682076]  kasan_save_track+0x18/0x40
[   32.682308]  kasan_save_alloc_info+0x3b/0x50
[   32.682791]  __kasan_kmalloc+0xb7/0xc0
[   32.683195]  __kmalloc_cache_noprof+0x189/0x420
[   32.683700]  kasan_atomics+0x95/0x310
[   32.684098]  kunit_try_run_case+0x1a5/0x480
[   32.684565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.685109]  kthread+0x337/0x6f0
[   32.685346]  ret_from_fork+0x116/0x1d0
[   32.685661]  ret_from_fork_asm+0x1a/0x30
[   32.686064] 
[   32.686267] The buggy address belongs to the object at ffff888102daa080
[   32.686267]  which belongs to the cache kmalloc-64 of size 64
[   32.687300] The buggy address is located 0 bytes to the right of
[   32.687300]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.688226] 
[   32.688378] The buggy address belongs to the physical page:
[   32.688811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.689484] flags: 0x200000000000000(node=0|zone=2)
[   32.689898] page_type: f5(slab)
[   32.690129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.690493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.691195] page dumped because: kasan: bad access detected
[   32.691774] 
[   32.692021] Memory state around the buggy address:
[   32.693901]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.694575]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.695048] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.695399]                                      ^
[   32.696047]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.696869]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.697429] ==================================================================
[   34.553008] ==================================================================
[   34.553865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   34.554387] Read of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.555062] 
[   34.555325] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.555438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.555471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.555522] Call Trace:
[   34.555579]  <TASK>
[   34.555624]  dump_stack_lvl+0x73/0xb0
[   34.555701]  print_report+0xd1/0x650
[   34.555764]  ? __virt_addr_valid+0x1db/0x2d0
[   34.555837]  ? kasan_atomics_helper+0x4f71/0x5450
[   34.555896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.555968]  ? kasan_atomics_helper+0x4f71/0x5450
[   34.556032]  kasan_report+0x141/0x180
[   34.556098]  ? kasan_atomics_helper+0x4f71/0x5450
[   34.556173]  __asan_report_load8_noabort+0x18/0x20
[   34.556246]  kasan_atomics_helper+0x4f71/0x5450
[   34.556312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.556370]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.556429]  ? kasan_atomics+0x152/0x310
[   34.556499]  kasan_atomics+0x1dc/0x310
[   34.556582]  ? __pfx_kasan_atomics+0x10/0x10
[   34.556629]  ? __pfx_read_tsc+0x10/0x10
[   34.556690]  ? ktime_get_ts64+0x86/0x230
[   34.556726]  kunit_try_run_case+0x1a5/0x480
[   34.556766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.556798]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.556832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.556867]  ? __kthread_parkme+0x82/0x180
[   34.556897]  ? preempt_count_sub+0x50/0x80
[   34.556929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.556962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.556995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.557028]  kthread+0x337/0x6f0
[   34.557056]  ? trace_preempt_on+0x20/0xc0
[   34.557088]  ? __pfx_kthread+0x10/0x10
[   34.557118]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.557149]  ? calculate_sigpending+0x7b/0xa0
[   34.557182]  ? __pfx_kthread+0x10/0x10
[   34.557211]  ret_from_fork+0x116/0x1d0
[   34.557237]  ? __pfx_kthread+0x10/0x10
[   34.557266]  ret_from_fork_asm+0x1a/0x30
[   34.557306]  </TASK>
[   34.557322] 
[   34.568987] Allocated by task 295:
[   34.569365]  kasan_save_stack+0x45/0x70
[   34.569836]  kasan_save_track+0x18/0x40
[   34.570246]  kasan_save_alloc_info+0x3b/0x50
[   34.570569]  __kasan_kmalloc+0xb7/0xc0
[   34.570962]  __kmalloc_cache_noprof+0x189/0x420
[   34.571326]  kasan_atomics+0x95/0x310
[   34.571757]  kunit_try_run_case+0x1a5/0x480
[   34.572191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.572574]  kthread+0x337/0x6f0
[   34.572877]  ret_from_fork+0x116/0x1d0
[   34.573259]  ret_from_fork_asm+0x1a/0x30
[   34.573520] 
[   34.573675] The buggy address belongs to the object at ffff888102daa080
[   34.573675]  which belongs to the cache kmalloc-64 of size 64
[   34.574598] The buggy address is located 0 bytes to the right of
[   34.574598]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.575623] 
[   34.575843] The buggy address belongs to the physical page:
[   34.576241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.576794] flags: 0x200000000000000(node=0|zone=2)
[   34.577208] page_type: f5(slab)
[   34.577434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.578233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.578909] page dumped because: kasan: bad access detected
[   34.579263] 
[   34.579400] Memory state around the buggy address:
[   34.579676]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.580036]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.580620] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.581231]                                      ^
[   34.581719]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.582330]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.582875] ==================================================================
[   34.730888] ==================================================================
[   34.731396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   34.731812] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.732421] 
[   34.732829] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.732952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.732988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.733043] Call Trace:
[   34.733089]  <TASK>
[   34.733136]  dump_stack_lvl+0x73/0xb0
[   34.733214]  print_report+0xd1/0x650
[   34.733279]  ? __virt_addr_valid+0x1db/0x2d0
[   34.733333]  ? kasan_atomics_helper+0x218a/0x5450
[   34.733380]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.733436]  ? kasan_atomics_helper+0x218a/0x5450
[   34.733486]  kasan_report+0x141/0x180
[   34.733562]  ? kasan_atomics_helper+0x218a/0x5450
[   34.733717]  kasan_check_range+0x10c/0x1c0
[   34.733834]  __kasan_check_write+0x18/0x20
[   34.733937]  kasan_atomics_helper+0x218a/0x5450
[   34.734008]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.734068]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.734130]  ? kasan_atomics+0x152/0x310
[   34.734243]  kasan_atomics+0x1dc/0x310
[   34.734315]  ? __pfx_kasan_atomics+0x10/0x10
[   34.734382]  ? __pfx_read_tsc+0x10/0x10
[   34.734494]  ? ktime_get_ts64+0x86/0x230
[   34.734578]  kunit_try_run_case+0x1a5/0x480
[   34.734691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.734760]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.734835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.734909]  ? __kthread_parkme+0x82/0x180
[   34.734968]  ? preempt_count_sub+0x50/0x80
[   34.735021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.735058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.735094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.735129]  kthread+0x337/0x6f0
[   34.735158]  ? trace_preempt_on+0x20/0xc0
[   34.735192]  ? __pfx_kthread+0x10/0x10
[   34.735221]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.735254]  ? calculate_sigpending+0x7b/0xa0
[   34.735288]  ? __pfx_kthread+0x10/0x10
[   34.735318]  ret_from_fork+0x116/0x1d0
[   34.735345]  ? __pfx_kthread+0x10/0x10
[   34.735373]  ret_from_fork_asm+0x1a/0x30
[   34.735415]  </TASK>
[   34.735430] 
[   34.751098] Allocated by task 295:
[   34.751499]  kasan_save_stack+0x45/0x70
[   34.751990]  kasan_save_track+0x18/0x40
[   34.752434]  kasan_save_alloc_info+0x3b/0x50
[   34.752869]  __kasan_kmalloc+0xb7/0xc0
[   34.753333]  __kmalloc_cache_noprof+0x189/0x420
[   34.753815]  kasan_atomics+0x95/0x310
[   34.754218]  kunit_try_run_case+0x1a5/0x480
[   34.754727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.755204]  kthread+0x337/0x6f0
[   34.755667]  ret_from_fork+0x116/0x1d0
[   34.756008]  ret_from_fork_asm+0x1a/0x30
[   34.756276] 
[   34.756406] The buggy address belongs to the object at ffff888102daa080
[   34.756406]  which belongs to the cache kmalloc-64 of size 64
[   34.757697] The buggy address is located 0 bytes to the right of
[   34.757697]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.758602] 
[   34.758905] The buggy address belongs to the physical page:
[   34.759397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.759860] flags: 0x200000000000000(node=0|zone=2)
[   34.760435] page_type: f5(slab)
[   34.760918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.761693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.762312] page dumped because: kasan: bad access detected
[   34.762695] 
[   34.762951] Memory state around the buggy address:
[   34.763443]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.764029]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.764517] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.765105]                                      ^
[   34.765659]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.766242]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.766842] ==================================================================
[   34.768320] ==================================================================
[   34.769115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   34.769807] Read of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.770330] 
[   34.770678] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.770850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.770887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.770960] Call Trace:
[   34.771034]  <TASK>
[   34.771100]  dump_stack_lvl+0x73/0xb0
[   34.771183]  print_report+0xd1/0x650
[   34.771247]  ? __virt_addr_valid+0x1db/0x2d0
[   34.771310]  ? kasan_atomics_helper+0x4fa5/0x5450
[   34.771394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.771499]  ? kasan_atomics_helper+0x4fa5/0x5450
[   34.771582]  kasan_report+0x141/0x180
[   34.771663]  ? kasan_atomics_helper+0x4fa5/0x5450
[   34.771704]  __asan_report_load8_noabort+0x18/0x20
[   34.771740]  kasan_atomics_helper+0x4fa5/0x5450
[   34.771772]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.771804]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.771853]  ? kasan_atomics+0x152/0x310
[   34.771890]  kasan_atomics+0x1dc/0x310
[   34.771922]  ? __pfx_kasan_atomics+0x10/0x10
[   34.771955]  ? __pfx_read_tsc+0x10/0x10
[   34.771987]  ? ktime_get_ts64+0x86/0x230
[   34.772020]  kunit_try_run_case+0x1a5/0x480
[   34.772054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.772085]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.772120]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.772154]  ? __kthread_parkme+0x82/0x180
[   34.772183]  ? preempt_count_sub+0x50/0x80
[   34.772215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.772248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.772281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.772313]  kthread+0x337/0x6f0
[   34.772341]  ? trace_preempt_on+0x20/0xc0
[   34.772373]  ? __pfx_kthread+0x10/0x10
[   34.772402]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.772433]  ? calculate_sigpending+0x7b/0xa0
[   34.772466]  ? __pfx_kthread+0x10/0x10
[   34.772496]  ret_from_fork+0x116/0x1d0
[   34.772522]  ? __pfx_kthread+0x10/0x10
[   34.772571]  ret_from_fork_asm+0x1a/0x30
[   34.772613]  </TASK>
[   34.772647] 
[   34.786511] Allocated by task 295:
[   34.787007]  kasan_save_stack+0x45/0x70
[   34.787339]  kasan_save_track+0x18/0x40
[   34.787610]  kasan_save_alloc_info+0x3b/0x50
[   34.788119]  __kasan_kmalloc+0xb7/0xc0
[   34.788526]  __kmalloc_cache_noprof+0x189/0x420
[   34.789041]  kasan_atomics+0x95/0x310
[   34.789294]  kunit_try_run_case+0x1a5/0x480
[   34.789702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.790238]  kthread+0x337/0x6f0
[   34.790654]  ret_from_fork+0x116/0x1d0
[   34.791076]  ret_from_fork_asm+0x1a/0x30
[   34.791436] 
[   34.791717] The buggy address belongs to the object at ffff888102daa080
[   34.791717]  which belongs to the cache kmalloc-64 of size 64
[   34.792316] The buggy address is located 0 bytes to the right of
[   34.792316]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.793457] 
[   34.793684] The buggy address belongs to the physical page:
[   34.794175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.794757] flags: 0x200000000000000(node=0|zone=2)
[   34.795058] page_type: f5(slab)
[   34.795282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.796033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.796617] page dumped because: kasan: bad access detected
[   34.797010] 
[   34.797228] Memory state around the buggy address:
[   34.797727]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.798310]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.798777] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.799406]                                      ^
[   34.799838]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.800376]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.800807] ==================================================================
[   33.313828] ==================================================================
[   33.314597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   33.315231] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.315876] 
[   33.316165] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.316324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.316361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.316451] Call Trace:
[   33.316512]  <TASK>
[   33.316570]  dump_stack_lvl+0x73/0xb0
[   33.316714]  print_report+0xd1/0x650
[   33.316785]  ? __virt_addr_valid+0x1db/0x2d0
[   33.316867]  ? kasan_atomics_helper+0xde0/0x5450
[   33.316949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.317025]  ? kasan_atomics_helper+0xde0/0x5450
[   33.317090]  kasan_report+0x141/0x180
[   33.317146]  ? kasan_atomics_helper+0xde0/0x5450
[   33.317190]  kasan_check_range+0x10c/0x1c0
[   33.317225]  __kasan_check_write+0x18/0x20
[   33.317258]  kasan_atomics_helper+0xde0/0x5450
[   33.317292]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.317322]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.317357]  ? kasan_atomics+0x152/0x310
[   33.317391]  kasan_atomics+0x1dc/0x310
[   33.317423]  ? __pfx_kasan_atomics+0x10/0x10
[   33.317456]  ? __pfx_read_tsc+0x10/0x10
[   33.317488]  ? ktime_get_ts64+0x86/0x230
[   33.317521]  kunit_try_run_case+0x1a5/0x480
[   33.317579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.317611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.317674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.317709]  ? __kthread_parkme+0x82/0x180
[   33.317739]  ? preempt_count_sub+0x50/0x80
[   33.317772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.317806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.317838]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.317872]  kthread+0x337/0x6f0
[   33.317900]  ? trace_preempt_on+0x20/0xc0
[   33.317934]  ? __pfx_kthread+0x10/0x10
[   33.317963]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.317995]  ? calculate_sigpending+0x7b/0xa0
[   33.318028]  ? __pfx_kthread+0x10/0x10
[   33.318058]  ret_from_fork+0x116/0x1d0
[   33.318086]  ? __pfx_kthread+0x10/0x10
[   33.318115]  ret_from_fork_asm+0x1a/0x30
[   33.318156]  </TASK>
[   33.318172] 
[   33.332754] Allocated by task 295:
[   33.333081]  kasan_save_stack+0x45/0x70
[   33.333512]  kasan_save_track+0x18/0x40
[   33.333976]  kasan_save_alloc_info+0x3b/0x50
[   33.334298]  __kasan_kmalloc+0xb7/0xc0
[   33.334575]  __kmalloc_cache_noprof+0x189/0x420
[   33.334895]  kasan_atomics+0x95/0x310
[   33.335313]  kunit_try_run_case+0x1a5/0x480
[   33.335802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.336338]  kthread+0x337/0x6f0
[   33.336784]  ret_from_fork+0x116/0x1d0
[   33.337107]  ret_from_fork_asm+0x1a/0x30
[   33.337459] 
[   33.337717] The buggy address belongs to the object at ffff888102daa080
[   33.337717]  which belongs to the cache kmalloc-64 of size 64
[   33.338343] The buggy address is located 0 bytes to the right of
[   33.338343]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.339480] 
[   33.339729] The buggy address belongs to the physical page:
[   33.340029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.340777] flags: 0x200000000000000(node=0|zone=2)
[   33.341266] page_type: f5(slab)
[   33.341590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.342083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.342817] page dumped because: kasan: bad access detected
[   33.343349] 
[   33.343573] Memory state around the buggy address:
[   33.343869]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.344286]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.344986] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.345656]                                      ^
[   33.346021]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.346410]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.347098] ==================================================================
[   33.382916] ==================================================================
[   33.383881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   33.384693] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.385450] 
[   33.385755] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.385874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.385909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.385964] Call Trace:
[   33.386007]  <TASK>
[   33.386053]  dump_stack_lvl+0x73/0xb0
[   33.386171]  print_report+0xd1/0x650
[   33.386234]  ? __virt_addr_valid+0x1db/0x2d0
[   33.386302]  ? kasan_atomics_helper+0xf10/0x5450
[   33.386363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.386458]  ? kasan_atomics_helper+0xf10/0x5450
[   33.386522]  kasan_report+0x141/0x180
[   33.386597]  ? kasan_atomics_helper+0xf10/0x5450
[   33.386703]  kasan_check_range+0x10c/0x1c0
[   33.386770]  __kasan_check_write+0x18/0x20
[   33.386867]  kasan_atomics_helper+0xf10/0x5450
[   33.386931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.386991]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.387052]  ? kasan_atomics+0x152/0x310
[   33.387109]  kasan_atomics+0x1dc/0x310
[   33.387167]  ? __pfx_kasan_atomics+0x10/0x10
[   33.387256]  ? __pfx_read_tsc+0x10/0x10
[   33.387339]  ? ktime_get_ts64+0x86/0x230
[   33.387412]  kunit_try_run_case+0x1a5/0x480
[   33.387502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.387595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.387722]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.387812]  ? __kthread_parkme+0x82/0x180
[   33.387882]  ? preempt_count_sub+0x50/0x80
[   33.387946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.388011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.388079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.388149]  kthread+0x337/0x6f0
[   33.388210]  ? trace_preempt_on+0x20/0xc0
[   33.388278]  ? __pfx_kthread+0x10/0x10
[   33.388342]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.388409]  ? calculate_sigpending+0x7b/0xa0
[   33.388479]  ? __pfx_kthread+0x10/0x10
[   33.388557]  ret_from_fork+0x116/0x1d0
[   33.388618]  ? __pfx_kthread+0x10/0x10
[   33.388700]  ret_from_fork_asm+0x1a/0x30
[   33.388746]  </TASK>
[   33.388763] 
[   33.401042] Allocated by task 295:
[   33.401338]  kasan_save_stack+0x45/0x70
[   33.401747]  kasan_save_track+0x18/0x40
[   33.402164]  kasan_save_alloc_info+0x3b/0x50
[   33.402607]  __kasan_kmalloc+0xb7/0xc0
[   33.403039]  __kmalloc_cache_noprof+0x189/0x420
[   33.403495]  kasan_atomics+0x95/0x310
[   33.403966]  kunit_try_run_case+0x1a5/0x480
[   33.404458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.404963]  kthread+0x337/0x6f0
[   33.405339]  ret_from_fork+0x116/0x1d0
[   33.405695]  ret_from_fork_asm+0x1a/0x30
[   33.406144] 
[   33.406367] The buggy address belongs to the object at ffff888102daa080
[   33.406367]  which belongs to the cache kmalloc-64 of size 64
[   33.407194] The buggy address is located 0 bytes to the right of
[   33.407194]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.408087] 
[   33.408273] The buggy address belongs to the physical page:
[   33.408692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.409369] flags: 0x200000000000000(node=0|zone=2)
[   33.409895] page_type: f5(slab)
[   33.410261] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.410889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.411313] page dumped because: kasan: bad access detected
[   33.411715] 
[   33.411954] Memory state around the buggy address:
[   33.412410]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.413122]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.413741] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.414121]                                      ^
[   33.414435]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.415142]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.415906] ==================================================================
[   34.128437] ==================================================================
[   34.129235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   34.130016] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.130776] 
[   34.131093] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.131234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.131268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.131315] Call Trace:
[   34.131356]  <TASK>
[   34.131399]  dump_stack_lvl+0x73/0xb0
[   34.131483]  print_report+0xd1/0x650
[   34.131565]  ? __virt_addr_valid+0x1db/0x2d0
[   34.131632]  ? kasan_atomics_helper+0x18b1/0x5450
[   34.131730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.131806]  ? kasan_atomics_helper+0x18b1/0x5450
[   34.131872]  kasan_report+0x141/0x180
[   34.131909]  ? kasan_atomics_helper+0x18b1/0x5450
[   34.131946]  kasan_check_range+0x10c/0x1c0
[   34.131978]  __kasan_check_write+0x18/0x20
[   34.132011]  kasan_atomics_helper+0x18b1/0x5450
[   34.132041]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.132073]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.132106]  ? kasan_atomics+0x152/0x310
[   34.132140]  kasan_atomics+0x1dc/0x310
[   34.132171]  ? __pfx_kasan_atomics+0x10/0x10
[   34.132206]  ? __pfx_read_tsc+0x10/0x10
[   34.132236]  ? ktime_get_ts64+0x86/0x230
[   34.132269]  kunit_try_run_case+0x1a5/0x480
[   34.132303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.132335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.132372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.132405]  ? __kthread_parkme+0x82/0x180
[   34.132434]  ? preempt_count_sub+0x50/0x80
[   34.132465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.132498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.132531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.132590]  kthread+0x337/0x6f0
[   34.132618]  ? trace_preempt_on+0x20/0xc0
[   34.132678]  ? __pfx_kthread+0x10/0x10
[   34.132709]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.132741]  ? calculate_sigpending+0x7b/0xa0
[   34.132775]  ? __pfx_kthread+0x10/0x10
[   34.132804]  ret_from_fork+0x116/0x1d0
[   34.132831]  ? __pfx_kthread+0x10/0x10
[   34.132860]  ret_from_fork_asm+0x1a/0x30
[   34.132902]  </TASK>
[   34.132917] 
[   34.145712] Allocated by task 295:
[   34.146092]  kasan_save_stack+0x45/0x70
[   34.146464]  kasan_save_track+0x18/0x40
[   34.146950]  kasan_save_alloc_info+0x3b/0x50
[   34.147332]  __kasan_kmalloc+0xb7/0xc0
[   34.147602]  __kmalloc_cache_noprof+0x189/0x420
[   34.147972]  kasan_atomics+0x95/0x310
[   34.148385]  kunit_try_run_case+0x1a5/0x480
[   34.148907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.149431]  kthread+0x337/0x6f0
[   34.149865]  ret_from_fork+0x116/0x1d0
[   34.150252]  ret_from_fork_asm+0x1a/0x30
[   34.150746] 
[   34.150958] The buggy address belongs to the object at ffff888102daa080
[   34.150958]  which belongs to the cache kmalloc-64 of size 64
[   34.151562] The buggy address is located 0 bytes to the right of
[   34.151562]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.152603] 
[   34.152868] The buggy address belongs to the physical page:
[   34.153405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.154169] flags: 0x200000000000000(node=0|zone=2)
[   34.154755] page_type: f5(slab)
[   34.155113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.155736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.156122] page dumped because: kasan: bad access detected
[   34.156397] 
[   34.156525] Memory state around the buggy address:
[   34.157056]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.157799]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.158460] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.159155]                                      ^
[   34.159469]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.160173]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.160757] ==================================================================
[   32.734393] ==================================================================
[   32.735651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   32.736198] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.737530] 
[   32.737828] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.738030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.738072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.738144] Call Trace:
[   32.738192]  <TASK>
[   32.738238]  dump_stack_lvl+0x73/0xb0
[   32.738313]  print_report+0xd1/0x650
[   32.738375]  ? __virt_addr_valid+0x1db/0x2d0
[   32.738487]  ? kasan_atomics_helper+0x4a0/0x5450
[   32.738588]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.738653]  ? kasan_atomics_helper+0x4a0/0x5450
[   32.738710]  kasan_report+0x141/0x180
[   32.738808]  ? kasan_atomics_helper+0x4a0/0x5450
[   32.738901]  kasan_check_range+0x10c/0x1c0
[   32.738971]  __kasan_check_write+0x18/0x20
[   32.739035]  kasan_atomics_helper+0x4a0/0x5450
[   32.739137]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.739223]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.739288]  ? kasan_atomics+0x152/0x310
[   32.739342]  kasan_atomics+0x1dc/0x310
[   32.739376]  ? __pfx_kasan_atomics+0x10/0x10
[   32.739410]  ? __pfx_read_tsc+0x10/0x10
[   32.739443]  ? ktime_get_ts64+0x86/0x230
[   32.739476]  kunit_try_run_case+0x1a5/0x480
[   32.739511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.739563]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.739601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.739664]  ? __kthread_parkme+0x82/0x180
[   32.739698]  ? preempt_count_sub+0x50/0x80
[   32.739733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.739767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.739800]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.739844]  kthread+0x337/0x6f0
[   32.739873]  ? trace_preempt_on+0x20/0xc0
[   32.739906]  ? __pfx_kthread+0x10/0x10
[   32.739935]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.739967]  ? calculate_sigpending+0x7b/0xa0
[   32.740000]  ? __pfx_kthread+0x10/0x10
[   32.740030]  ret_from_fork+0x116/0x1d0
[   32.740057]  ? __pfx_kthread+0x10/0x10
[   32.740086]  ret_from_fork_asm+0x1a/0x30
[   32.740128]  </TASK>
[   32.740144] 
[   32.754427] Allocated by task 295:
[   32.754688]  kasan_save_stack+0x45/0x70
[   32.755192]  kasan_save_track+0x18/0x40
[   32.755774]  kasan_save_alloc_info+0x3b/0x50
[   32.756250]  __kasan_kmalloc+0xb7/0xc0
[   32.756711]  __kmalloc_cache_noprof+0x189/0x420
[   32.757224]  kasan_atomics+0x95/0x310
[   32.757473]  kunit_try_run_case+0x1a5/0x480
[   32.757985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.758622]  kthread+0x337/0x6f0
[   32.759024]  ret_from_fork+0x116/0x1d0
[   32.759279]  ret_from_fork_asm+0x1a/0x30
[   32.759525] 
[   32.759697] The buggy address belongs to the object at ffff888102daa080
[   32.759697]  which belongs to the cache kmalloc-64 of size 64
[   32.760944] The buggy address is located 0 bytes to the right of
[   32.760944]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.762409] 
[   32.762577] The buggy address belongs to the physical page:
[   32.763208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.764094] flags: 0x200000000000000(node=0|zone=2)
[   32.764385] page_type: f5(slab)
[   32.764622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.765350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.766015] page dumped because: kasan: bad access detected
[   32.766307] 
[   32.766433] Memory state around the buggy address:
[   32.766956]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.767749]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.768238] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.768626]                                      ^
[   32.769202]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.769893]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.770479] ==================================================================
[   33.488635] ==================================================================
[   33.489697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   33.490220] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.490903] 
[   33.491438] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.491577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.491615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.491667] Call Trace:
[   33.491714]  <TASK>
[   33.491758]  dump_stack_lvl+0x73/0xb0
[   33.491855]  print_report+0xd1/0x650
[   33.491919]  ? __virt_addr_valid+0x1db/0x2d0
[   33.491986]  ? kasan_atomics_helper+0x1079/0x5450
[   33.492050]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.492126]  ? kasan_atomics_helper+0x1079/0x5450
[   33.492192]  kasan_report+0x141/0x180
[   33.492253]  ? kasan_atomics_helper+0x1079/0x5450
[   33.492322]  kasan_check_range+0x10c/0x1c0
[   33.492386]  __kasan_check_write+0x18/0x20
[   33.492444]  kasan_atomics_helper+0x1079/0x5450
[   33.492506]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.492589]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.492652]  ? kasan_atomics+0x152/0x310
[   33.492721]  kasan_atomics+0x1dc/0x310
[   33.492782]  ? __pfx_kasan_atomics+0x10/0x10
[   33.492843]  ? __pfx_read_tsc+0x10/0x10
[   33.492908]  ? ktime_get_ts64+0x86/0x230
[   33.492971]  kunit_try_run_case+0x1a5/0x480
[   33.493039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.493097]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.493171]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.493237]  ? __kthread_parkme+0x82/0x180
[   33.493296]  ? preempt_count_sub+0x50/0x80
[   33.493358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.493426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.493497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.493682]  kthread+0x337/0x6f0
[   33.493749]  ? trace_preempt_on+0x20/0xc0
[   33.493801]  ? __pfx_kthread+0x10/0x10
[   33.493833]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.493869]  ? calculate_sigpending+0x7b/0xa0
[   33.493902]  ? __pfx_kthread+0x10/0x10
[   33.493932]  ret_from_fork+0x116/0x1d0
[   33.493962]  ? __pfx_kthread+0x10/0x10
[   33.493990]  ret_from_fork_asm+0x1a/0x30
[   33.494032]  </TASK>
[   33.494048] 
[   33.508926] Allocated by task 295:
[   33.509263]  kasan_save_stack+0x45/0x70
[   33.509722]  kasan_save_track+0x18/0x40
[   33.510157]  kasan_save_alloc_info+0x3b/0x50
[   33.510485]  __kasan_kmalloc+0xb7/0xc0
[   33.510945]  __kmalloc_cache_noprof+0x189/0x420
[   33.511328]  kasan_atomics+0x95/0x310
[   33.511782]  kunit_try_run_case+0x1a5/0x480
[   33.512208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.512791]  kthread+0x337/0x6f0
[   33.513122]  ret_from_fork+0x116/0x1d0
[   33.513415]  ret_from_fork_asm+0x1a/0x30
[   33.513897] 
[   33.514041] The buggy address belongs to the object at ffff888102daa080
[   33.514041]  which belongs to the cache kmalloc-64 of size 64
[   33.514861] The buggy address is located 0 bytes to the right of
[   33.514861]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.515984] 
[   33.516221] The buggy address belongs to the physical page:
[   33.516583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.517212] flags: 0x200000000000000(node=0|zone=2)
[   33.517662] page_type: f5(slab)
[   33.517894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.518600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.519267] page dumped because: kasan: bad access detected
[   33.519573] 
[   33.519825] Memory state around the buggy address:
[   33.520285]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.520779]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.521390] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.521836]                                      ^
[   33.522152]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522850]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.523471] ==================================================================
[   33.241521] ==================================================================
[   33.242452] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   33.243085] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.243694] 
[   33.243973] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.244091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.244127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.244183] Call Trace:
[   33.244216]  <TASK>
[   33.244277]  dump_stack_lvl+0x73/0xb0
[   33.244321]  print_report+0xd1/0x650
[   33.244365]  ? __virt_addr_valid+0x1db/0x2d0
[   33.244424]  ? kasan_atomics_helper+0x4a84/0x5450
[   33.244484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.244571]  ? kasan_atomics_helper+0x4a84/0x5450
[   33.244632]  kasan_report+0x141/0x180
[   33.244762]  ? kasan_atomics_helper+0x4a84/0x5450
[   33.244839]  __asan_report_load4_noabort+0x18/0x20
[   33.244911]  kasan_atomics_helper+0x4a84/0x5450
[   33.244979]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.245046]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.245114]  ? kasan_atomics+0x152/0x310
[   33.245184]  kasan_atomics+0x1dc/0x310
[   33.245232]  ? __pfx_kasan_atomics+0x10/0x10
[   33.245267]  ? __pfx_read_tsc+0x10/0x10
[   33.245302]  ? ktime_get_ts64+0x86/0x230
[   33.245337]  kunit_try_run_case+0x1a5/0x480
[   33.245371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.245402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.245437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.245471]  ? __kthread_parkme+0x82/0x180
[   33.245500]  ? preempt_count_sub+0x50/0x80
[   33.245532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.245589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.245624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.245673]  kthread+0x337/0x6f0
[   33.245703]  ? trace_preempt_on+0x20/0xc0
[   33.245738]  ? __pfx_kthread+0x10/0x10
[   33.245768]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.245800]  ? calculate_sigpending+0x7b/0xa0
[   33.245834]  ? __pfx_kthread+0x10/0x10
[   33.245863]  ret_from_fork+0x116/0x1d0
[   33.245891]  ? __pfx_kthread+0x10/0x10
[   33.245919]  ret_from_fork_asm+0x1a/0x30
[   33.245959]  </TASK>
[   33.245976] 
[   33.259184] Allocated by task 295:
[   33.259660]  kasan_save_stack+0x45/0x70
[   33.260206]  kasan_save_track+0x18/0x40
[   33.260608]  kasan_save_alloc_info+0x3b/0x50
[   33.261031]  __kasan_kmalloc+0xb7/0xc0
[   33.261281]  __kmalloc_cache_noprof+0x189/0x420
[   33.261849]  kasan_atomics+0x95/0x310
[   33.262278]  kunit_try_run_case+0x1a5/0x480
[   33.262805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.263313]  kthread+0x337/0x6f0
[   33.263658]  ret_from_fork+0x116/0x1d0
[   33.264043]  ret_from_fork_asm+0x1a/0x30
[   33.264417] 
[   33.264657] The buggy address belongs to the object at ffff888102daa080
[   33.264657]  which belongs to the cache kmalloc-64 of size 64
[   33.265464] The buggy address is located 0 bytes to the right of
[   33.265464]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.266456] 
[   33.267659] The buggy address belongs to the physical page:
[   33.268389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.269435] flags: 0x200000000000000(node=0|zone=2)
[   33.270004] page_type: f5(slab)
[   33.270359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.270910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.271522] page dumped because: kasan: bad access detected
[   33.272050] 
[   33.272195] Memory state around the buggy address:
[   33.272526]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.272849]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.273716] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.274292]                                      ^
[   33.275017]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.275650]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.276365] ==================================================================
[   34.411384] ==================================================================
[   34.412049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   34.413212] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.413989] 
[   34.414274] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.414399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.414435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.414489] Call Trace:
[   34.414553]  <TASK>
[   34.414600]  dump_stack_lvl+0x73/0xb0
[   34.414698]  print_report+0xd1/0x650
[   34.414760]  ? __virt_addr_valid+0x1db/0x2d0
[   34.414811]  ? kasan_atomics_helper+0x1d7a/0x5450
[   34.414858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.414910]  ? kasan_atomics_helper+0x1d7a/0x5450
[   34.414957]  kasan_report+0x141/0x180
[   34.415006]  ? kasan_atomics_helper+0x1d7a/0x5450
[   34.415075]  kasan_check_range+0x10c/0x1c0
[   34.415136]  __kasan_check_write+0x18/0x20
[   34.415196]  kasan_atomics_helper+0x1d7a/0x5450
[   34.415260]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.415323]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.415389]  ? kasan_atomics+0x152/0x310
[   34.415455]  kasan_atomics+0x1dc/0x310
[   34.415520]  ? __pfx_kasan_atomics+0x10/0x10
[   34.415691]  ? __pfx_read_tsc+0x10/0x10
[   34.415758]  ? ktime_get_ts64+0x86/0x230
[   34.415842]  kunit_try_run_case+0x1a5/0x480
[   34.415914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.415976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.416069]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.416137]  ? __kthread_parkme+0x82/0x180
[   34.416200]  ? preempt_count_sub+0x50/0x80
[   34.416269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.416342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.416413]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.416482]  kthread+0x337/0x6f0
[   34.416558]  ? trace_preempt_on+0x20/0xc0
[   34.416662]  ? __pfx_kthread+0x10/0x10
[   34.416731]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.416798]  ? calculate_sigpending+0x7b/0xa0
[   34.416856]  ? __pfx_kthread+0x10/0x10
[   34.416897]  ret_from_fork+0x116/0x1d0
[   34.416928]  ? __pfx_kthread+0x10/0x10
[   34.416958]  ret_from_fork_asm+0x1a/0x30
[   34.416999]  </TASK>
[   34.417017] 
[   34.429530] Allocated by task 295:
[   34.429990]  kasan_save_stack+0x45/0x70
[   34.430467]  kasan_save_track+0x18/0x40
[   34.430913]  kasan_save_alloc_info+0x3b/0x50
[   34.431350]  __kasan_kmalloc+0xb7/0xc0
[   34.431697]  __kmalloc_cache_noprof+0x189/0x420
[   34.432174]  kasan_atomics+0x95/0x310
[   34.432597]  kunit_try_run_case+0x1a5/0x480
[   34.432998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.433447]  kthread+0x337/0x6f0
[   34.433728]  ret_from_fork+0x116/0x1d0
[   34.433975]  ret_from_fork_asm+0x1a/0x30
[   34.434289] 
[   34.434495] The buggy address belongs to the object at ffff888102daa080
[   34.434495]  which belongs to the cache kmalloc-64 of size 64
[   34.435607] The buggy address is located 0 bytes to the right of
[   34.435607]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.436728] 
[   34.436955] The buggy address belongs to the physical page:
[   34.437352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.438054] flags: 0x200000000000000(node=0|zone=2)
[   34.438413] page_type: f5(slab)
[   34.438817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.439196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.439563] page dumped because: kasan: bad access detected
[   34.440101] 
[   34.440330] Memory state around the buggy address:
[   34.440859]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.441517]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.442144] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.442494]                                      ^
[   34.443020]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.444107]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.444488] ==================================================================
[   33.909009] ==================================================================
[   33.909762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   33.910494] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.911177] 
[   33.911366] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.911555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.911656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.911716] Call Trace:
[   33.911764]  <TASK>
[   33.911812]  dump_stack_lvl+0x73/0xb0
[   33.911902]  print_report+0xd1/0x650
[   33.911991]  ? __virt_addr_valid+0x1db/0x2d0
[   33.912093]  ? kasan_atomics_helper+0x151d/0x5450
[   33.912164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.912228]  ? kasan_atomics_helper+0x151d/0x5450
[   33.912291]  kasan_report+0x141/0x180
[   33.912395]  ? kasan_atomics_helper+0x151d/0x5450
[   33.912491]  kasan_check_range+0x10c/0x1c0
[   33.912573]  __kasan_check_write+0x18/0x20
[   33.912709]  kasan_atomics_helper+0x151d/0x5450
[   33.912805]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.912864]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.912904]  ? kasan_atomics+0x152/0x310
[   33.912941]  kasan_atomics+0x1dc/0x310
[   33.912973]  ? __pfx_kasan_atomics+0x10/0x10
[   33.913006]  ? __pfx_read_tsc+0x10/0x10
[   33.913040]  ? ktime_get_ts64+0x86/0x230
[   33.913073]  kunit_try_run_case+0x1a5/0x480
[   33.913108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.913139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.913173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.913206]  ? __kthread_parkme+0x82/0x180
[   33.913235]  ? preempt_count_sub+0x50/0x80
[   33.913268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.913302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.913334]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.913367]  kthread+0x337/0x6f0
[   33.913394]  ? trace_preempt_on+0x20/0xc0
[   33.913427]  ? __pfx_kthread+0x10/0x10
[   33.913456]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.913487]  ? calculate_sigpending+0x7b/0xa0
[   33.913519]  ? __pfx_kthread+0x10/0x10
[   33.913570]  ret_from_fork+0x116/0x1d0
[   33.913598]  ? __pfx_kthread+0x10/0x10
[   33.913656]  ret_from_fork_asm+0x1a/0x30
[   33.913706]  </TASK>
[   33.913722] 
[   33.930096] Allocated by task 295:
[   33.930693]  kasan_save_stack+0x45/0x70
[   33.931430]  kasan_save_track+0x18/0x40
[   33.931803]  kasan_save_alloc_info+0x3b/0x50
[   33.932044]  __kasan_kmalloc+0xb7/0xc0
[   33.932439]  __kmalloc_cache_noprof+0x189/0x420
[   33.933075]  kasan_atomics+0x95/0x310
[   33.933418]  kunit_try_run_case+0x1a5/0x480
[   33.934195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.934767]  kthread+0x337/0x6f0
[   33.935224]  ret_from_fork+0x116/0x1d0
[   33.935744]  ret_from_fork_asm+0x1a/0x30
[   33.936165] 
[   33.936333] The buggy address belongs to the object at ffff888102daa080
[   33.936333]  which belongs to the cache kmalloc-64 of size 64
[   33.937123] The buggy address is located 0 bytes to the right of
[   33.937123]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.938167] 
[   33.938451] The buggy address belongs to the physical page:
[   33.939049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.939868] flags: 0x200000000000000(node=0|zone=2)
[   33.940384] page_type: f5(slab)
[   33.940660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.941141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.941651] page dumped because: kasan: bad access detected
[   33.942006] 
[   33.942134] Memory state around the buggy address:
[   33.942442]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.943482]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.944019] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.944598]                                      ^
[   33.945126]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.945858]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.946483] ==================================================================
[   34.837714] ==================================================================
[   34.838388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   34.839316] Read of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.840021] 
[   34.840811] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.840932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.840967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.841018] Call Trace:
[   34.841063]  <TASK>
[   34.841108]  dump_stack_lvl+0x73/0xb0
[   34.841179]  print_report+0xd1/0x650
[   34.841231]  ? __virt_addr_valid+0x1db/0x2d0
[   34.841285]  ? kasan_atomics_helper+0x5115/0x5450
[   34.841331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.841390]  ? kasan_atomics_helper+0x5115/0x5450
[   34.841433]  kasan_report+0x141/0x180
[   34.841466]  ? kasan_atomics_helper+0x5115/0x5450
[   34.841502]  __asan_report_load8_noabort+0x18/0x20
[   34.841557]  kasan_atomics_helper+0x5115/0x5450
[   34.841651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.841695]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.841732]  ? kasan_atomics+0x152/0x310
[   34.841769]  kasan_atomics+0x1dc/0x310
[   34.841800]  ? __pfx_kasan_atomics+0x10/0x10
[   34.841833]  ? __pfx_read_tsc+0x10/0x10
[   34.841864]  ? ktime_get_ts64+0x86/0x230
[   34.841898]  kunit_try_run_case+0x1a5/0x480
[   34.841932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.841963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.841999]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.842032]  ? __kthread_parkme+0x82/0x180
[   34.842061]  ? preempt_count_sub+0x50/0x80
[   34.842093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.842127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.842160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.842193]  kthread+0x337/0x6f0
[   34.842220]  ? trace_preempt_on+0x20/0xc0
[   34.842253]  ? __pfx_kthread+0x10/0x10
[   34.842282]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.842314]  ? calculate_sigpending+0x7b/0xa0
[   34.842348]  ? __pfx_kthread+0x10/0x10
[   34.842377]  ret_from_fork+0x116/0x1d0
[   34.842403]  ? __pfx_kthread+0x10/0x10
[   34.842432]  ret_from_fork_asm+0x1a/0x30
[   34.842472]  </TASK>
[   34.842487] 
[   34.856974] Allocated by task 295:
[   34.857246]  kasan_save_stack+0x45/0x70
[   34.857520]  kasan_save_track+0x18/0x40
[   34.857960]  kasan_save_alloc_info+0x3b/0x50
[   34.858430]  __kasan_kmalloc+0xb7/0xc0
[   34.858875]  __kmalloc_cache_noprof+0x189/0x420
[   34.859346]  kasan_atomics+0x95/0x310
[   34.859786]  kunit_try_run_case+0x1a5/0x480
[   34.860218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.860551]  kthread+0x337/0x6f0
[   34.860809]  ret_from_fork+0x116/0x1d0
[   34.861181]  ret_from_fork_asm+0x1a/0x30
[   34.861666] 
[   34.861875] The buggy address belongs to the object at ffff888102daa080
[   34.861875]  which belongs to the cache kmalloc-64 of size 64
[   34.862868] The buggy address is located 0 bytes to the right of
[   34.862868]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.863985] 
[   34.864140] The buggy address belongs to the physical page:
[   34.864470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.865223] flags: 0x200000000000000(node=0|zone=2)
[   34.865760] page_type: f5(slab)
[   34.866135] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.866595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.867227] page dumped because: kasan: bad access detected
[   34.867773] 
[   34.867993] Memory state around the buggy address:
[   34.868401]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.869074]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.869764] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.870268]                                      ^
[   34.870738]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.871266]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.871891] ==================================================================
[   33.799612] ==================================================================
[   33.800312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   33.800975] Read of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.801512] 
[   33.801846] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.801986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.802024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.802077] Call Trace:
[   33.802116]  <TASK>
[   33.802159]  dump_stack_lvl+0x73/0xb0
[   33.802237]  print_report+0xd1/0x650
[   33.802328]  ? __virt_addr_valid+0x1db/0x2d0
[   33.802392]  ? kasan_atomics_helper+0x4eae/0x5450
[   33.802452]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.802521]  ? kasan_atomics_helper+0x4eae/0x5450
[   33.802619]  kasan_report+0x141/0x180
[   33.802724]  ? kasan_atomics_helper+0x4eae/0x5450
[   33.802799]  __asan_report_load8_noabort+0x18/0x20
[   33.802868]  kasan_atomics_helper+0x4eae/0x5450
[   33.802956]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.803025]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.803095]  ? kasan_atomics+0x152/0x310
[   33.803162]  kasan_atomics+0x1dc/0x310
[   33.803224]  ? __pfx_kasan_atomics+0x10/0x10
[   33.803318]  ? __pfx_read_tsc+0x10/0x10
[   33.803380]  ? ktime_get_ts64+0x86/0x230
[   33.803446]  kunit_try_run_case+0x1a5/0x480
[   33.803515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.803617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.803728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.803796]  ? __kthread_parkme+0x82/0x180
[   33.803866]  ? preempt_count_sub+0x50/0x80
[   33.803957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.804026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.804093]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.804161]  kthread+0x337/0x6f0
[   33.804245]  ? trace_preempt_on+0x20/0xc0
[   33.804309]  ? __pfx_kthread+0x10/0x10
[   33.804368]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.804433]  ? calculate_sigpending+0x7b/0xa0
[   33.804497]  ? __pfx_kthread+0x10/0x10
[   33.804572]  ret_from_fork+0x116/0x1d0
[   33.804689]  ? __pfx_kthread+0x10/0x10
[   33.804753]  ret_from_fork_asm+0x1a/0x30
[   33.804833]  </TASK>
[   33.804864] 
[   33.817277] Allocated by task 295:
[   33.817524]  kasan_save_stack+0x45/0x70
[   33.818024]  kasan_save_track+0x18/0x40
[   33.818429]  kasan_save_alloc_info+0x3b/0x50
[   33.818929]  __kasan_kmalloc+0xb7/0xc0
[   33.819336]  __kmalloc_cache_noprof+0x189/0x420
[   33.819840]  kasan_atomics+0x95/0x310
[   33.820097]  kunit_try_run_case+0x1a5/0x480
[   33.820356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.820920]  kthread+0x337/0x6f0
[   33.821319]  ret_from_fork+0x116/0x1d0
[   33.821782]  ret_from_fork_asm+0x1a/0x30
[   33.822236] 
[   33.822430] The buggy address belongs to the object at ffff888102daa080
[   33.822430]  which belongs to the cache kmalloc-64 of size 64
[   33.823482] The buggy address is located 0 bytes to the right of
[   33.823482]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.824344] 
[   33.826452] The buggy address belongs to the physical page:
[   33.827798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.828203] flags: 0x200000000000000(node=0|zone=2)
[   33.828690] page_type: f5(slab)
[   33.828939] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.829511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.830188] page dumped because: kasan: bad access detected
[   33.830747] 
[   33.830951] Memory state around the buggy address:
[   33.831432]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.832105]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.832919] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.833504]                                      ^
[   33.833905]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.834509]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.835114] ==================================================================
[   33.061928] ==================================================================
[   33.062978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   33.063602] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.064337] 
[   33.064683] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.064819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.064853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.064907] Call Trace:
[   33.064949]  <TASK>
[   33.065027]  dump_stack_lvl+0x73/0xb0
[   33.065184]  print_report+0xd1/0x650
[   33.065255]  ? __virt_addr_valid+0x1db/0x2d0
[   33.065327]  ? kasan_atomics_helper+0x992/0x5450
[   33.065382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.065424]  ? kasan_atomics_helper+0x992/0x5450
[   33.065455]  kasan_report+0x141/0x180
[   33.065488]  ? kasan_atomics_helper+0x992/0x5450
[   33.065535]  kasan_check_range+0x10c/0x1c0
[   33.065601]  __kasan_check_write+0x18/0x20
[   33.065658]  kasan_atomics_helper+0x992/0x5450
[   33.065692]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.065723]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.065758]  ? kasan_atomics+0x152/0x310
[   33.065793]  kasan_atomics+0x1dc/0x310
[   33.065824]  ? __pfx_kasan_atomics+0x10/0x10
[   33.065857]  ? __pfx_read_tsc+0x10/0x10
[   33.065888]  ? ktime_get_ts64+0x86/0x230
[   33.065922]  kunit_try_run_case+0x1a5/0x480
[   33.065955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.065986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.066021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.066054]  ? __kthread_parkme+0x82/0x180
[   33.066082]  ? preempt_count_sub+0x50/0x80
[   33.066115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.066148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.066182]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.066213]  kthread+0x337/0x6f0
[   33.066240]  ? trace_preempt_on+0x20/0xc0
[   33.066273]  ? __pfx_kthread+0x10/0x10
[   33.066302]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.066333]  ? calculate_sigpending+0x7b/0xa0
[   33.066365]  ? __pfx_kthread+0x10/0x10
[   33.066396]  ret_from_fork+0x116/0x1d0
[   33.066423]  ? __pfx_kthread+0x10/0x10
[   33.066452]  ret_from_fork_asm+0x1a/0x30
[   33.066491]  </TASK>
[   33.066507] 
[   33.079571] Allocated by task 295:
[   33.079977]  kasan_save_stack+0x45/0x70
[   33.080406]  kasan_save_track+0x18/0x40
[   33.080863]  kasan_save_alloc_info+0x3b/0x50
[   33.081304]  __kasan_kmalloc+0xb7/0xc0
[   33.081742]  __kmalloc_cache_noprof+0x189/0x420
[   33.082204]  kasan_atomics+0x95/0x310
[   33.082460]  kunit_try_run_case+0x1a5/0x480
[   33.082917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.083444]  kthread+0x337/0x6f0
[   33.083801]  ret_from_fork+0x116/0x1d0
[   33.084103]  ret_from_fork_asm+0x1a/0x30
[   33.084457] 
[   33.084671] The buggy address belongs to the object at ffff888102daa080
[   33.084671]  which belongs to the cache kmalloc-64 of size 64
[   33.085458] The buggy address is located 0 bytes to the right of
[   33.085458]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.086074] 
[   33.086220] The buggy address belongs to the physical page:
[   33.086494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.087242] flags: 0x200000000000000(node=0|zone=2)
[   33.087780] page_type: f5(slab)
[   33.088147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.088871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.089446] page dumped because: kasan: bad access detected
[   33.089784] 
[   33.089923] Memory state around the buggy address:
[   33.090178]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.090743]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.091367] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.092038]                                      ^
[   33.092485]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.093043]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.093533] ==================================================================
[   32.954645] ==================================================================
[   32.955320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   32.956111] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.956705] 
[   32.957203] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.957344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.957379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.957422] Call Trace:
[   32.957446]  <TASK>
[   32.957471]  dump_stack_lvl+0x73/0xb0
[   32.957516]  print_report+0xd1/0x650
[   32.957572]  ? __virt_addr_valid+0x1db/0x2d0
[   32.957636]  ? kasan_atomics_helper+0x7c7/0x5450
[   32.957679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.957717]  ? kasan_atomics_helper+0x7c7/0x5450
[   32.957747]  kasan_report+0x141/0x180
[   32.957779]  ? kasan_atomics_helper+0x7c7/0x5450
[   32.957813]  kasan_check_range+0x10c/0x1c0
[   32.957846]  __kasan_check_write+0x18/0x20
[   32.957879]  kasan_atomics_helper+0x7c7/0x5450
[   32.957910]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.957940]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.957974]  ? kasan_atomics+0x152/0x310
[   32.958008]  kasan_atomics+0x1dc/0x310
[   32.958038]  ? __pfx_kasan_atomics+0x10/0x10
[   32.958070]  ? __pfx_read_tsc+0x10/0x10
[   32.958100]  ? ktime_get_ts64+0x86/0x230
[   32.958134]  kunit_try_run_case+0x1a5/0x480
[   32.958168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.958200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.958234]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.958268]  ? __kthread_parkme+0x82/0x180
[   32.958297]  ? preempt_count_sub+0x50/0x80
[   32.958329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.958362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.958395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.958428]  kthread+0x337/0x6f0
[   32.958456]  ? trace_preempt_on+0x20/0xc0
[   32.958489]  ? __pfx_kthread+0x10/0x10
[   32.958518]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.958568]  ? calculate_sigpending+0x7b/0xa0
[   32.958603]  ? __pfx_kthread+0x10/0x10
[   32.958641]  ret_from_fork+0x116/0x1d0
[   32.958684]  ? __pfx_kthread+0x10/0x10
[   32.958714]  ret_from_fork_asm+0x1a/0x30
[   32.958757]  </TASK>
[   32.958772] 
[   32.971080] Allocated by task 295:
[   32.971475]  kasan_save_stack+0x45/0x70
[   32.971964]  kasan_save_track+0x18/0x40
[   32.972286]  kasan_save_alloc_info+0x3b/0x50
[   32.972895]  __kasan_kmalloc+0xb7/0xc0
[   32.973311]  __kmalloc_cache_noprof+0x189/0x420
[   32.973746]  kasan_atomics+0x95/0x310
[   32.974095]  kunit_try_run_case+0x1a5/0x480
[   32.974368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.974864]  kthread+0x337/0x6f0
[   32.975322]  ret_from_fork+0x116/0x1d0
[   32.975871]  ret_from_fork_asm+0x1a/0x30
[   32.976333] 
[   32.976559] The buggy address belongs to the object at ffff888102daa080
[   32.976559]  which belongs to the cache kmalloc-64 of size 64
[   32.977381] The buggy address is located 0 bytes to the right of
[   32.977381]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.977969] 
[   32.978110] The buggy address belongs to the physical page:
[   32.978387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.979019] flags: 0x200000000000000(node=0|zone=2)
[   32.979529] page_type: f5(slab)
[   32.979946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.980781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.981481] page dumped because: kasan: bad access detected
[   32.982057] 
[   32.982269] Memory state around the buggy address:
[   32.982805]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.983395]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.983992] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.984450]                                      ^
[   32.984965]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.985483]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.986190] ==================================================================
[   32.842258] ==================================================================
[   32.842936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   32.843994] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.844616] 
[   32.844844] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.844964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.844996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.845043] Call Trace:
[   32.845087]  <TASK>
[   32.845130]  dump_stack_lvl+0x73/0xb0
[   32.845204]  print_report+0xd1/0x650
[   32.845260]  ? __virt_addr_valid+0x1db/0x2d0
[   32.845322]  ? kasan_atomics_helper+0x5fe/0x5450
[   32.845384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.845458]  ? kasan_atomics_helper+0x5fe/0x5450
[   32.845517]  kasan_report+0x141/0x180
[   32.845573]  ? kasan_atomics_helper+0x5fe/0x5450
[   32.845610]  kasan_check_range+0x10c/0x1c0
[   32.845716]  __kasan_check_write+0x18/0x20
[   32.845776]  kasan_atomics_helper+0x5fe/0x5450
[   32.845831]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.845893]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.846022]  ? kasan_atomics+0x152/0x310
[   32.846125]  kasan_atomics+0x1dc/0x310
[   32.846194]  ? __pfx_kasan_atomics+0x10/0x10
[   32.846255]  ? __pfx_read_tsc+0x10/0x10
[   32.846314]  ? ktime_get_ts64+0x86/0x230
[   32.846385]  kunit_try_run_case+0x1a5/0x480
[   32.846455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.846507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.846575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.846619]  ? __kthread_parkme+0x82/0x180
[   32.846678]  ? preempt_count_sub+0x50/0x80
[   32.846738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.846807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.846890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.846981]  kthread+0x337/0x6f0
[   32.847042]  ? trace_preempt_on+0x20/0xc0
[   32.847111]  ? __pfx_kthread+0x10/0x10
[   32.847174]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.847243]  ? calculate_sigpending+0x7b/0xa0
[   32.847312]  ? __pfx_kthread+0x10/0x10
[   32.847377]  ret_from_fork+0x116/0x1d0
[   32.847414]  ? __pfx_kthread+0x10/0x10
[   32.847446]  ret_from_fork_asm+0x1a/0x30
[   32.847489]  </TASK>
[   32.847505] 
[   32.863916] Allocated by task 295:
[   32.864381]  kasan_save_stack+0x45/0x70
[   32.864823]  kasan_save_track+0x18/0x40
[   32.865288]  kasan_save_alloc_info+0x3b/0x50
[   32.865676]  __kasan_kmalloc+0xb7/0xc0
[   32.866133]  __kmalloc_cache_noprof+0x189/0x420
[   32.866580]  kasan_atomics+0x95/0x310
[   32.867001]  kunit_try_run_case+0x1a5/0x480
[   32.867414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.868047]  kthread+0x337/0x6f0
[   32.868395]  ret_from_fork+0x116/0x1d0
[   32.868801]  ret_from_fork_asm+0x1a/0x30
[   32.869281] 
[   32.869513] The buggy address belongs to the object at ffff888102daa080
[   32.869513]  which belongs to the cache kmalloc-64 of size 64
[   32.870481] The buggy address is located 0 bytes to the right of
[   32.870481]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.871469] 
[   32.871716] The buggy address belongs to the physical page:
[   32.872048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.872478] flags: 0x200000000000000(node=0|zone=2)
[   32.873048] page_type: f5(slab)
[   32.873428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.874136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.874769] page dumped because: kasan: bad access detected
[   32.875225] 
[   32.875444] Memory state around the buggy address:
[   32.875908]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.876345]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.877021] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.877483]                                      ^
[   32.878014]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.878459]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.879072] ==================================================================
[   33.525235] ==================================================================
[   33.525682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   33.526339] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.526900] 
[   33.527174] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.527293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.527330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.527383] Call Trace:
[   33.527438]  <TASK>
[   33.527499]  dump_stack_lvl+0x73/0xb0
[   33.527599]  print_report+0xd1/0x650
[   33.527690]  ? __virt_addr_valid+0x1db/0x2d0
[   33.527747]  ? kasan_atomics_helper+0x4a1c/0x5450
[   33.527806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.527897]  ? kasan_atomics_helper+0x4a1c/0x5450
[   33.527977]  kasan_report+0x141/0x180
[   33.528041]  ? kasan_atomics_helper+0x4a1c/0x5450
[   33.528108]  __asan_report_load4_noabort+0x18/0x20
[   33.528173]  kasan_atomics_helper+0x4a1c/0x5450
[   33.528230]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.528303]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.528390]  ? kasan_atomics+0x152/0x310
[   33.528442]  kasan_atomics+0x1dc/0x310
[   33.528478]  ? __pfx_kasan_atomics+0x10/0x10
[   33.528511]  ? __pfx_read_tsc+0x10/0x10
[   33.528564]  ? ktime_get_ts64+0x86/0x230
[   33.528600]  kunit_try_run_case+0x1a5/0x480
[   33.528660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.528695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.528731]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.528765]  ? __kthread_parkme+0x82/0x180
[   33.528794]  ? preempt_count_sub+0x50/0x80
[   33.528827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.528861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.528893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.528926]  kthread+0x337/0x6f0
[   33.528953]  ? trace_preempt_on+0x20/0xc0
[   33.528986]  ? __pfx_kthread+0x10/0x10
[   33.529015]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.529046]  ? calculate_sigpending+0x7b/0xa0
[   33.529079]  ? __pfx_kthread+0x10/0x10
[   33.529108]  ret_from_fork+0x116/0x1d0
[   33.529135]  ? __pfx_kthread+0x10/0x10
[   33.529162]  ret_from_fork_asm+0x1a/0x30
[   33.529203]  </TASK>
[   33.529219] 
[   33.545317] Allocated by task 295:
[   33.545781]  kasan_save_stack+0x45/0x70
[   33.546208]  kasan_save_track+0x18/0x40
[   33.546698]  kasan_save_alloc_info+0x3b/0x50
[   33.547111]  __kasan_kmalloc+0xb7/0xc0
[   33.547505]  __kmalloc_cache_noprof+0x189/0x420
[   33.547925]  kasan_atomics+0x95/0x310
[   33.548174]  kunit_try_run_case+0x1a5/0x480
[   33.548695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.549219]  kthread+0x337/0x6f0
[   33.549608]  ret_from_fork+0x116/0x1d0
[   33.549942]  ret_from_fork_asm+0x1a/0x30
[   33.550294] 
[   33.550513] The buggy address belongs to the object at ffff888102daa080
[   33.550513]  which belongs to the cache kmalloc-64 of size 64
[   33.551363] The buggy address is located 0 bytes to the right of
[   33.551363]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.552350] 
[   33.552585] The buggy address belongs to the physical page:
[   33.552898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.553669] flags: 0x200000000000000(node=0|zone=2)
[   33.554004] page_type: f5(slab)
[   33.554333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.554896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.555429] page dumped because: kasan: bad access detected
[   33.555984] 
[   33.556195] Memory state around the buggy address:
[   33.556618]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.557188]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.557740] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.558400]                                      ^
[   33.558838]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.559332]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.559936] ==================================================================
[   34.376488] ==================================================================
[   34.378684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   34.379496] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.380275] 
[   34.380490] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.380629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.380665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.380947] Call Trace:
[   34.381006]  <TASK>
[   34.381064]  dump_stack_lvl+0x73/0xb0
[   34.381148]  print_report+0xd1/0x650
[   34.381213]  ? __virt_addr_valid+0x1db/0x2d0
[   34.381279]  ? kasan_atomics_helper+0x1ce1/0x5450
[   34.381329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.381367]  ? kasan_atomics_helper+0x1ce1/0x5450
[   34.381398]  kasan_report+0x141/0x180
[   34.381430]  ? kasan_atomics_helper+0x1ce1/0x5450
[   34.381466]  kasan_check_range+0x10c/0x1c0
[   34.381499]  __kasan_check_write+0x18/0x20
[   34.381530]  kasan_atomics_helper+0x1ce1/0x5450
[   34.381586]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.381618]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.381678]  ? kasan_atomics+0x152/0x310
[   34.381714]  kasan_atomics+0x1dc/0x310
[   34.381745]  ? __pfx_kasan_atomics+0x10/0x10
[   34.381778]  ? __pfx_read_tsc+0x10/0x10
[   34.381811]  ? ktime_get_ts64+0x86/0x230
[   34.381846]  kunit_try_run_case+0x1a5/0x480
[   34.381881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.381913]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.381947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.381981]  ? __kthread_parkme+0x82/0x180
[   34.382011]  ? preempt_count_sub+0x50/0x80
[   34.382043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.382076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.382109]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.382140]  kthread+0x337/0x6f0
[   34.382168]  ? trace_preempt_on+0x20/0xc0
[   34.382199]  ? __pfx_kthread+0x10/0x10
[   34.382229]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.382260]  ? calculate_sigpending+0x7b/0xa0
[   34.382292]  ? __pfx_kthread+0x10/0x10
[   34.382321]  ret_from_fork+0x116/0x1d0
[   34.382348]  ? __pfx_kthread+0x10/0x10
[   34.382377]  ret_from_fork_asm+0x1a/0x30
[   34.382417]  </TASK>
[   34.382432] 
[   34.395415] Allocated by task 295:
[   34.395899]  kasan_save_stack+0x45/0x70
[   34.396307]  kasan_save_track+0x18/0x40
[   34.396802]  kasan_save_alloc_info+0x3b/0x50
[   34.397178]  __kasan_kmalloc+0xb7/0xc0
[   34.397518]  __kmalloc_cache_noprof+0x189/0x420
[   34.397975]  kasan_atomics+0x95/0x310
[   34.398429]  kunit_try_run_case+0x1a5/0x480
[   34.398940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.399339]  kthread+0x337/0x6f0
[   34.399743]  ret_from_fork+0x116/0x1d0
[   34.400128]  ret_from_fork_asm+0x1a/0x30
[   34.400595] 
[   34.400817] The buggy address belongs to the object at ffff888102daa080
[   34.400817]  which belongs to the cache kmalloc-64 of size 64
[   34.401790] The buggy address is located 0 bytes to the right of
[   34.401790]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.402481] 
[   34.402679] The buggy address belongs to the physical page:
[   34.402965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.403336] flags: 0x200000000000000(node=0|zone=2)
[   34.403879] page_type: f5(slab)
[   34.404244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.405007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.405712] page dumped because: kasan: bad access detected
[   34.406222] 
[   34.406469] Memory state around the buggy address:
[   34.406969]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.407607]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.408211] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.408758]                                      ^
[   34.409200]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.409571]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.409982] ==================================================================
[   32.771764] ==================================================================
[   32.772670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   32.773157] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.773855] 
[   32.774148] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.774280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.774316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.774367] Call Trace:
[   32.774405]  <TASK>
[   32.774483]  dump_stack_lvl+0x73/0xb0
[   32.774606]  print_report+0xd1/0x650
[   32.774686]  ? __virt_addr_valid+0x1db/0x2d0
[   32.774754]  ? kasan_atomics_helper+0x4b3a/0x5450
[   32.774814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.774947]  ? kasan_atomics_helper+0x4b3a/0x5450
[   32.775017]  kasan_report+0x141/0x180
[   32.775080]  ? kasan_atomics_helper+0x4b3a/0x5450
[   32.775184]  __asan_report_store4_noabort+0x1b/0x30
[   32.775283]  kasan_atomics_helper+0x4b3a/0x5450
[   32.775349]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.775451]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.775558]  ? kasan_atomics+0x152/0x310
[   32.775634]  kasan_atomics+0x1dc/0x310
[   32.775717]  ? __pfx_kasan_atomics+0x10/0x10
[   32.775827]  ? __pfx_read_tsc+0x10/0x10
[   32.775907]  ? ktime_get_ts64+0x86/0x230
[   32.775975]  kunit_try_run_case+0x1a5/0x480
[   32.776041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.776103]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.776215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.776312]  ? __kthread_parkme+0x82/0x180
[   32.776372]  ? preempt_count_sub+0x50/0x80
[   32.776436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.776561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.776633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.776724]  kthread+0x337/0x6f0
[   32.776762]  ? trace_preempt_on+0x20/0xc0
[   32.776800]  ? __pfx_kthread+0x10/0x10
[   32.776830]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.776864]  ? calculate_sigpending+0x7b/0xa0
[   32.776899]  ? __pfx_kthread+0x10/0x10
[   32.776929]  ret_from_fork+0x116/0x1d0
[   32.776958]  ? __pfx_kthread+0x10/0x10
[   32.776987]  ret_from_fork_asm+0x1a/0x30
[   32.777028]  </TASK>
[   32.777044] 
[   32.790840] Allocated by task 295:
[   32.791092]  kasan_save_stack+0x45/0x70
[   32.791691]  kasan_save_track+0x18/0x40
[   32.792243]  kasan_save_alloc_info+0x3b/0x50
[   32.792877]  __kasan_kmalloc+0xb7/0xc0
[   32.793337]  __kmalloc_cache_noprof+0x189/0x420
[   32.793791]  kasan_atomics+0x95/0x310
[   32.794276]  kunit_try_run_case+0x1a5/0x480
[   32.794923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.795582]  kthread+0x337/0x6f0
[   32.796055]  ret_from_fork+0x116/0x1d0
[   32.796599]  ret_from_fork_asm+0x1a/0x30
[   32.796934] 
[   32.797209] The buggy address belongs to the object at ffff888102daa080
[   32.797209]  which belongs to the cache kmalloc-64 of size 64
[   32.798280] The buggy address is located 0 bytes to the right of
[   32.798280]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.799329] 
[   32.799564] The buggy address belongs to the physical page:
[   32.799964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.800814] flags: 0x200000000000000(node=0|zone=2)
[   32.801258] page_type: f5(slab)
[   32.801658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.802328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.802955] page dumped because: kasan: bad access detected
[   32.803407] 
[   32.803655] Memory state around the buggy address:
[   32.804082]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.804636]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.805064] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.805619]                                      ^
[   32.805989]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.806407]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.806933] ==================================================================
[   33.134224] ==================================================================
[   33.134796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   33.135288] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.135954] 
[   33.136141] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.136256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.136291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.136341] Call Trace:
[   33.136380]  <TASK>
[   33.136422]  dump_stack_lvl+0x73/0xb0
[   33.136499]  print_report+0xd1/0x650
[   33.136578]  ? __virt_addr_valid+0x1db/0x2d0
[   33.136676]  ? kasan_atomics_helper+0xac7/0x5450
[   33.136736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.136809]  ? kasan_atomics_helper+0xac7/0x5450
[   33.136852]  kasan_report+0x141/0x180
[   33.136906]  ? kasan_atomics_helper+0xac7/0x5450
[   33.136974]  kasan_check_range+0x10c/0x1c0
[   33.137037]  __kasan_check_write+0x18/0x20
[   33.137095]  kasan_atomics_helper+0xac7/0x5450
[   33.137155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.137219]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.137281]  ? kasan_atomics+0x152/0x310
[   33.137350]  kasan_atomics+0x1dc/0x310
[   33.137411]  ? __pfx_kasan_atomics+0x10/0x10
[   33.137471]  ? __pfx_read_tsc+0x10/0x10
[   33.137526]  ? ktime_get_ts64+0x86/0x230
[   33.137610]  kunit_try_run_case+0x1a5/0x480
[   33.137710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.137745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.137784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.137820]  ? __kthread_parkme+0x82/0x180
[   33.137851]  ? preempt_count_sub+0x50/0x80
[   33.137884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.137917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.137952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.137985]  kthread+0x337/0x6f0
[   33.138013]  ? trace_preempt_on+0x20/0xc0
[   33.138046]  ? __pfx_kthread+0x10/0x10
[   33.138075]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.138107]  ? calculate_sigpending+0x7b/0xa0
[   33.138140]  ? __pfx_kthread+0x10/0x10
[   33.138170]  ret_from_fork+0x116/0x1d0
[   33.138197]  ? __pfx_kthread+0x10/0x10
[   33.138226]  ret_from_fork_asm+0x1a/0x30
[   33.138267]  </TASK>
[   33.138283] 
[   33.152584] Allocated by task 295:
[   33.152872]  kasan_save_stack+0x45/0x70
[   33.153344]  kasan_save_track+0x18/0x40
[   33.153808]  kasan_save_alloc_info+0x3b/0x50
[   33.154278]  __kasan_kmalloc+0xb7/0xc0
[   33.154741]  __kmalloc_cache_noprof+0x189/0x420
[   33.155243]  kasan_atomics+0x95/0x310
[   33.155553]  kunit_try_run_case+0x1a5/0x480
[   33.155868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.156367]  kthread+0x337/0x6f0
[   33.156794]  ret_from_fork+0x116/0x1d0
[   33.157202]  ret_from_fork_asm+0x1a/0x30
[   33.157478] 
[   33.157743] The buggy address belongs to the object at ffff888102daa080
[   33.157743]  which belongs to the cache kmalloc-64 of size 64
[   33.158504] The buggy address is located 0 bytes to the right of
[   33.158504]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.159449] 
[   33.159736] The buggy address belongs to the physical page:
[   33.160108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.160754] flags: 0x200000000000000(node=0|zone=2)
[   33.161204] page_type: f5(slab)
[   33.161578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.162034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.162670] page dumped because: kasan: bad access detected
[   33.163173] 
[   33.163371] Memory state around the buggy address:
[   33.163888]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.164452]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.165090] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.165634]                                      ^
[   33.166009]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.166503]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.166931] ==================================================================
[   33.836488] ==================================================================
[   33.837079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   33.837580] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.838254] 
[   33.838449] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.838581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.838615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.838690] Call Trace:
[   33.838747]  <TASK>
[   33.838783]  dump_stack_lvl+0x73/0xb0
[   33.838848]  print_report+0xd1/0x650
[   33.838895]  ? __virt_addr_valid+0x1db/0x2d0
[   33.838945]  ? kasan_atomics_helper+0x1467/0x5450
[   33.838989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.839043]  ? kasan_atomics_helper+0x1467/0x5450
[   33.839134]  kasan_report+0x141/0x180
[   33.839195]  ? kasan_atomics_helper+0x1467/0x5450
[   33.839277]  kasan_check_range+0x10c/0x1c0
[   33.839380]  __kasan_check_write+0x18/0x20
[   33.839467]  kasan_atomics_helper+0x1467/0x5450
[   33.839552]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.839615]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.839746]  ? kasan_atomics+0x152/0x310
[   33.839833]  kasan_atomics+0x1dc/0x310
[   33.839901]  ? __pfx_kasan_atomics+0x10/0x10
[   33.839971]  ? __pfx_read_tsc+0x10/0x10
[   33.840037]  ? ktime_get_ts64+0x86/0x230
[   33.840106]  kunit_try_run_case+0x1a5/0x480
[   33.840173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.840233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.840301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.840381]  ? __kthread_parkme+0x82/0x180
[   33.840460]  ? preempt_count_sub+0x50/0x80
[   33.840520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.840601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.840718]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.840809]  kthread+0x337/0x6f0
[   33.840866]  ? trace_preempt_on+0x20/0xc0
[   33.840905]  ? __pfx_kthread+0x10/0x10
[   33.840936]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.840970]  ? calculate_sigpending+0x7b/0xa0
[   33.841006]  ? __pfx_kthread+0x10/0x10
[   33.841036]  ret_from_fork+0x116/0x1d0
[   33.841063]  ? __pfx_kthread+0x10/0x10
[   33.841092]  ret_from_fork_asm+0x1a/0x30
[   33.841133]  </TASK>
[   33.841149] 
[   33.856606] Allocated by task 295:
[   33.857015]  kasan_save_stack+0x45/0x70
[   33.857525]  kasan_save_track+0x18/0x40
[   33.857836]  kasan_save_alloc_info+0x3b/0x50
[   33.858169]  __kasan_kmalloc+0xb7/0xc0
[   33.858754]  __kmalloc_cache_noprof+0x189/0x420
[   33.859281]  kasan_atomics+0x95/0x310
[   33.859726]  kunit_try_run_case+0x1a5/0x480
[   33.860290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.860871]  kthread+0x337/0x6f0
[   33.861233]  ret_from_fork+0x116/0x1d0
[   33.861555]  ret_from_fork_asm+0x1a/0x30
[   33.861934] 
[   33.862134] The buggy address belongs to the object at ffff888102daa080
[   33.862134]  which belongs to the cache kmalloc-64 of size 64
[   33.862860] The buggy address is located 0 bytes to the right of
[   33.862860]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.864025] 
[   33.864302] The buggy address belongs to the physical page:
[   33.864892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.865597] flags: 0x200000000000000(node=0|zone=2)
[   33.865997] page_type: f5(slab)
[   33.866267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.866825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.867489] page dumped because: kasan: bad access detected
[   33.867977] 
[   33.868174] Memory state around the buggy address:
[   33.868513]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.869339]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.869849] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.870459]                                      ^
[   33.870852]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.871555]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.872083] ==================================================================
[   33.702308] ==================================================================
[   33.702829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   33.703308] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.703816] 
[   33.704078] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.704190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.704229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.704275] Call Trace:
[   33.704317]  <TASK>
[   33.704361]  dump_stack_lvl+0x73/0xb0
[   33.704434]  print_report+0xd1/0x650
[   33.704492]  ? __virt_addr_valid+0x1db/0x2d0
[   33.704568]  ? kasan_atomics_helper+0x12e6/0x5450
[   33.704663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.704737]  ? kasan_atomics_helper+0x12e6/0x5450
[   33.704795]  kasan_report+0x141/0x180
[   33.704855]  ? kasan_atomics_helper+0x12e6/0x5450
[   33.704923]  kasan_check_range+0x10c/0x1c0
[   33.704984]  __kasan_check_write+0x18/0x20
[   33.705048]  kasan_atomics_helper+0x12e6/0x5450
[   33.705107]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.705164]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.705224]  ? kasan_atomics+0x152/0x310
[   33.705297]  kasan_atomics+0x1dc/0x310
[   33.705366]  ? __pfx_kasan_atomics+0x10/0x10
[   33.705435]  ? __pfx_read_tsc+0x10/0x10
[   33.705477]  ? ktime_get_ts64+0x86/0x230
[   33.705514]  kunit_try_run_case+0x1a5/0x480
[   33.705573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.705607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.705684]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.705720]  ? __kthread_parkme+0x82/0x180
[   33.705751]  ? preempt_count_sub+0x50/0x80
[   33.705784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.705817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.705851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.705885]  kthread+0x337/0x6f0
[   33.705912]  ? trace_preempt_on+0x20/0xc0
[   33.705945]  ? __pfx_kthread+0x10/0x10
[   33.705974]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.706006]  ? calculate_sigpending+0x7b/0xa0
[   33.706040]  ? __pfx_kthread+0x10/0x10
[   33.706069]  ret_from_fork+0x116/0x1d0
[   33.706097]  ? __pfx_kthread+0x10/0x10
[   33.706125]  ret_from_fork_asm+0x1a/0x30
[   33.706166]  </TASK>
[   33.706181] 
[   33.719087] Allocated by task 295:
[   33.719469]  kasan_save_stack+0x45/0x70
[   33.719933]  kasan_save_track+0x18/0x40
[   33.720333]  kasan_save_alloc_info+0x3b/0x50
[   33.720677]  __kasan_kmalloc+0xb7/0xc0
[   33.721072]  __kmalloc_cache_noprof+0x189/0x420
[   33.721412]  kasan_atomics+0x95/0x310
[   33.721716]  kunit_try_run_case+0x1a5/0x480
[   33.721984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.722279]  kthread+0x337/0x6f0
[   33.722531]  ret_from_fork+0x116/0x1d0
[   33.722987]  ret_from_fork_asm+0x1a/0x30
[   33.723414] 
[   33.723653] The buggy address belongs to the object at ffff888102daa080
[   33.723653]  which belongs to the cache kmalloc-64 of size 64
[   33.724768] The buggy address is located 0 bytes to the right of
[   33.724768]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.725744] 
[   33.725961] The buggy address belongs to the physical page:
[   33.726249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.726940] flags: 0x200000000000000(node=0|zone=2)
[   33.727200] page_type: f5(slab)
[   33.727482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.728165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.728674] page dumped because: kasan: bad access detected
[   33.729013] 
[   33.729220] Memory state around the buggy address:
[   33.729682]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.730078]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.730428] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.730818]                                      ^
[   33.731217]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.731885]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.732475] ==================================================================
[   34.267178] ==================================================================
[   34.267838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   34.268452] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.269390] 
[   34.269926] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.270027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.270052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.270090] Call Trace:
[   34.270127]  <TASK>
[   34.270163]  dump_stack_lvl+0x73/0xb0
[   34.270225]  print_report+0xd1/0x650
[   34.270277]  ? __virt_addr_valid+0x1db/0x2d0
[   34.270332]  ? kasan_atomics_helper+0x1b22/0x5450
[   34.270378]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.270433]  ? kasan_atomics_helper+0x1b22/0x5450
[   34.270482]  kasan_report+0x141/0x180
[   34.270529]  ? kasan_atomics_helper+0x1b22/0x5450
[   34.270609]  kasan_check_range+0x10c/0x1c0
[   34.270667]  __kasan_check_write+0x18/0x20
[   34.270732]  kasan_atomics_helper+0x1b22/0x5450
[   34.270792]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.270856]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.270925]  ? kasan_atomics+0x152/0x310
[   34.270993]  kasan_atomics+0x1dc/0x310
[   34.271056]  ? __pfx_kasan_atomics+0x10/0x10
[   34.271122]  ? __pfx_read_tsc+0x10/0x10
[   34.271187]  ? ktime_get_ts64+0x86/0x230
[   34.271255]  kunit_try_run_case+0x1a5/0x480
[   34.271326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.271390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.271522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.271627]  ? __kthread_parkme+0x82/0x180
[   34.271688]  ? preempt_count_sub+0x50/0x80
[   34.271755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.271837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.271913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.271984]  kthread+0x337/0x6f0
[   34.272045]  ? trace_preempt_on+0x20/0xc0
[   34.272114]  ? __pfx_kthread+0x10/0x10
[   34.272177]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.272244]  ? calculate_sigpending+0x7b/0xa0
[   34.272314]  ? __pfx_kthread+0x10/0x10
[   34.272378]  ret_from_fork+0x116/0x1d0
[   34.272464]  ? __pfx_kthread+0x10/0x10
[   34.272500]  ret_from_fork_asm+0x1a/0x30
[   34.272565]  </TASK>
[   34.272583] 
[   34.288054] Allocated by task 295:
[   34.288386]  kasan_save_stack+0x45/0x70
[   34.288923]  kasan_save_track+0x18/0x40
[   34.289219]  kasan_save_alloc_info+0x3b/0x50
[   34.289598]  __kasan_kmalloc+0xb7/0xc0
[   34.290032]  __kmalloc_cache_noprof+0x189/0x420
[   34.290507]  kasan_atomics+0x95/0x310
[   34.290890]  kunit_try_run_case+0x1a5/0x480
[   34.291200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.291740]  kthread+0x337/0x6f0
[   34.292046]  ret_from_fork+0x116/0x1d0
[   34.292449]  ret_from_fork_asm+0x1a/0x30
[   34.292814] 
[   34.293053] The buggy address belongs to the object at ffff888102daa080
[   34.293053]  which belongs to the cache kmalloc-64 of size 64
[   34.293989] The buggy address is located 0 bytes to the right of
[   34.293989]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.295489] 
[   34.296057] The buggy address belongs to the physical page:
[   34.296330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.297347] flags: 0x200000000000000(node=0|zone=2)
[   34.297881] page_type: f5(slab)
[   34.298337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.299159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.299881] page dumped because: kasan: bad access detected
[   34.300141] 
[   34.300597] Memory state around the buggy address:
[   34.301259]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.301901]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.302517] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.303124]                                      ^
[   34.303443]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.303862]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.304567] ==================================================================
[   34.232305] ==================================================================
[   34.232894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   34.234184] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.235321] 
[   34.235560] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.235631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.235659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.235686] Call Trace:
[   34.235710]  <TASK>
[   34.235735]  dump_stack_lvl+0x73/0xb0
[   34.235783]  print_report+0xd1/0x650
[   34.235815]  ? __virt_addr_valid+0x1db/0x2d0
[   34.235862]  ? kasan_atomics_helper+0x1a7f/0x5450
[   34.235893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.235929]  ? kasan_atomics_helper+0x1a7f/0x5450
[   34.235959]  kasan_report+0x141/0x180
[   34.235989]  ? kasan_atomics_helper+0x1a7f/0x5450
[   34.236025]  kasan_check_range+0x10c/0x1c0
[   34.236058]  __kasan_check_write+0x18/0x20
[   34.236089]  kasan_atomics_helper+0x1a7f/0x5450
[   34.236120]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.236151]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.236184]  ? kasan_atomics+0x152/0x310
[   34.236218]  kasan_atomics+0x1dc/0x310
[   34.236248]  ? __pfx_kasan_atomics+0x10/0x10
[   34.236280]  ? __pfx_read_tsc+0x10/0x10
[   34.236310]  ? ktime_get_ts64+0x86/0x230
[   34.236344]  kunit_try_run_case+0x1a5/0x480
[   34.236377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.236408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.236442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.236474]  ? __kthread_parkme+0x82/0x180
[   34.236503]  ? preempt_count_sub+0x50/0x80
[   34.236553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.236587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.236623]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.236682]  kthread+0x337/0x6f0
[   34.236734]  ? trace_preempt_on+0x20/0xc0
[   34.236803]  ? __pfx_kthread+0x10/0x10
[   34.236861]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.236925]  ? calculate_sigpending+0x7b/0xa0
[   34.236993]  ? __pfx_kthread+0x10/0x10
[   34.237074]  ret_from_fork+0x116/0x1d0
[   34.237141]  ? __pfx_kthread+0x10/0x10
[   34.237213]  ret_from_fork_asm+0x1a/0x30
[   34.237301]  </TASK>
[   34.237336] 
[   34.251195] Allocated by task 295:
[   34.251597]  kasan_save_stack+0x45/0x70
[   34.252066]  kasan_save_track+0x18/0x40
[   34.252460]  kasan_save_alloc_info+0x3b/0x50
[   34.252850]  __kasan_kmalloc+0xb7/0xc0
[   34.253227]  __kmalloc_cache_noprof+0x189/0x420
[   34.253724]  kasan_atomics+0x95/0x310
[   34.253987]  kunit_try_run_case+0x1a5/0x480
[   34.254410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.254869]  kthread+0x337/0x6f0
[   34.255112]  ret_from_fork+0x116/0x1d0
[   34.255349]  ret_from_fork_asm+0x1a/0x30
[   34.255685] 
[   34.255907] The buggy address belongs to the object at ffff888102daa080
[   34.255907]  which belongs to the cache kmalloc-64 of size 64
[   34.256979] The buggy address is located 0 bytes to the right of
[   34.256979]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.257781] 
[   34.257932] The buggy address belongs to the physical page:
[   34.258397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.259122] flags: 0x200000000000000(node=0|zone=2)
[   34.259577] page_type: f5(slab)
[   34.259957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.260504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.261004] page dumped because: kasan: bad access detected
[   34.261300] 
[   34.261479] Memory state around the buggy address:
[   34.261982]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.262612]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.263073] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.263657]                                      ^
[   34.263987]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.264493]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.266247] ==================================================================
[   33.734770] ==================================================================
[   33.735415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   33.736113] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.737035] 
[   33.737293] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.737408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.737442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.737496] Call Trace:
[   33.737558]  <TASK>
[   33.737597]  dump_stack_lvl+0x73/0xb0
[   33.737714]  print_report+0xd1/0x650
[   33.737768]  ? __virt_addr_valid+0x1db/0x2d0
[   33.737829]  ? kasan_atomics_helper+0x49ce/0x5450
[   33.737883]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.737937]  ? kasan_atomics_helper+0x49ce/0x5450
[   33.737994]  kasan_report+0x141/0x180
[   33.738053]  ? kasan_atomics_helper+0x49ce/0x5450
[   33.738117]  __asan_report_load4_noabort+0x18/0x20
[   33.738180]  kasan_atomics_helper+0x49ce/0x5450
[   33.738241]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.738302]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.738368]  ? kasan_atomics+0x152/0x310
[   33.738434]  kasan_atomics+0x1dc/0x310
[   33.738491]  ? __pfx_kasan_atomics+0x10/0x10
[   33.738563]  ? __pfx_read_tsc+0x10/0x10
[   33.738658]  ? ktime_get_ts64+0x86/0x230
[   33.738731]  kunit_try_run_case+0x1a5/0x480
[   33.738803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.738863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.738933]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.739004]  ? __kthread_parkme+0x82/0x180
[   33.739062]  ? preempt_count_sub+0x50/0x80
[   33.739128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.739194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.739265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.739329]  kthread+0x337/0x6f0
[   33.739385]  ? trace_preempt_on+0x20/0xc0
[   33.739453]  ? __pfx_kthread+0x10/0x10
[   33.739517]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.739603]  ? calculate_sigpending+0x7b/0xa0
[   33.739707]  ? __pfx_kthread+0x10/0x10
[   33.739773]  ret_from_fork+0x116/0x1d0
[   33.739844]  ? __pfx_kthread+0x10/0x10
[   33.739903]  ret_from_fork_asm+0x1a/0x30
[   33.739978]  </TASK>
[   33.740002] 
[   33.751464] Allocated by task 295:
[   33.751913]  kasan_save_stack+0x45/0x70
[   33.752329]  kasan_save_track+0x18/0x40
[   33.752762]  kasan_save_alloc_info+0x3b/0x50
[   33.753185]  __kasan_kmalloc+0xb7/0xc0
[   33.753582]  __kmalloc_cache_noprof+0x189/0x420
[   33.754080]  kasan_atomics+0x95/0x310
[   33.754431]  kunit_try_run_case+0x1a5/0x480
[   33.754858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.755228]  kthread+0x337/0x6f0
[   33.755463]  ret_from_fork+0x116/0x1d0
[   33.755918]  ret_from_fork_asm+0x1a/0x30
[   33.756325] 
[   33.756530] The buggy address belongs to the object at ffff888102daa080
[   33.756530]  which belongs to the cache kmalloc-64 of size 64
[   33.757476] The buggy address is located 0 bytes to the right of
[   33.757476]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.758317] 
[   33.758468] The buggy address belongs to the physical page:
[   33.758806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.759196] flags: 0x200000000000000(node=0|zone=2)
[   33.759689] page_type: f5(slab)
[   33.760058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.760755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.761392] page dumped because: kasan: bad access detected
[   33.761930] 
[   33.762138] Memory state around the buggy address:
[   33.762592]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.763241]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.763682] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.764041]                                      ^
[   33.764292]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.764932]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.765569] ==================================================================
[   33.168934] ==================================================================
[   33.170238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   33.170894] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.171405] 
[   33.171716] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.171847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.171882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.171933] Call Trace:
[   33.171980]  <TASK>
[   33.172024]  dump_stack_lvl+0x73/0xb0
[   33.172133]  print_report+0xd1/0x650
[   33.172200]  ? __virt_addr_valid+0x1db/0x2d0
[   33.172270]  ? kasan_atomics_helper+0xb6a/0x5450
[   33.172329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.172396]  ? kasan_atomics_helper+0xb6a/0x5450
[   33.172455]  kasan_report+0x141/0x180
[   33.172521]  ? kasan_atomics_helper+0xb6a/0x5450
[   33.172748]  kasan_check_range+0x10c/0x1c0
[   33.172844]  __kasan_check_write+0x18/0x20
[   33.172934]  kasan_atomics_helper+0xb6a/0x5450
[   33.173012]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.173068]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.173120]  ? kasan_atomics+0x152/0x310
[   33.173175]  kasan_atomics+0x1dc/0x310
[   33.173228]  ? __pfx_kasan_atomics+0x10/0x10
[   33.173289]  ? __pfx_read_tsc+0x10/0x10
[   33.173342]  ? ktime_get_ts64+0x86/0x230
[   33.173400]  kunit_try_run_case+0x1a5/0x480
[   33.173458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.173512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.173593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.173689]  ? __kthread_parkme+0x82/0x180
[   33.173741]  ? preempt_count_sub+0x50/0x80
[   33.173795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.173853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.173915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.173976]  kthread+0x337/0x6f0
[   33.174022]  ? trace_preempt_on+0x20/0xc0
[   33.174082]  ? __pfx_kthread+0x10/0x10
[   33.174136]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.174196]  ? calculate_sigpending+0x7b/0xa0
[   33.174292]  ? __pfx_kthread+0x10/0x10
[   33.174347]  ret_from_fork+0x116/0x1d0
[   33.174401]  ? __pfx_kthread+0x10/0x10
[   33.174454]  ret_from_fork_asm+0x1a/0x30
[   33.174522]  </TASK>
[   33.174569] 
[   33.187270] Allocated by task 295:
[   33.187518]  kasan_save_stack+0x45/0x70
[   33.188028]  kasan_save_track+0x18/0x40
[   33.188480]  kasan_save_alloc_info+0x3b/0x50
[   33.188977]  __kasan_kmalloc+0xb7/0xc0
[   33.189417]  __kmalloc_cache_noprof+0x189/0x420
[   33.189986]  kasan_atomics+0x95/0x310
[   33.190434]  kunit_try_run_case+0x1a5/0x480
[   33.190939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.191304]  kthread+0x337/0x6f0
[   33.191558]  ret_from_fork+0x116/0x1d0
[   33.191869]  ret_from_fork_asm+0x1a/0x30
[   33.192407] 
[   33.192737] The buggy address belongs to the object at ffff888102daa080
[   33.192737]  which belongs to the cache kmalloc-64 of size 64
[   33.193875] The buggy address is located 0 bytes to the right of
[   33.193875]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.194936] 
[   33.195092] The buggy address belongs to the physical page:
[   33.195374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.196231] flags: 0x200000000000000(node=0|zone=2)
[   33.197060] page_type: f5(slab)
[   33.197495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.198323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.198745] page dumped because: kasan: bad access detected
[   33.199026] 
[   33.199155] Memory state around the buggy address:
[   33.199615]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.200383]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.201262] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.201927]                                      ^
[   33.202385]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.203170]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.203875] ==================================================================
[   34.162109] ==================================================================
[   34.162713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   34.163473] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.165620] 
[   34.166157] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.166279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.166314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.166390] Call Trace:
[   34.166435]  <TASK>
[   34.166480]  dump_stack_lvl+0x73/0xb0
[   34.166578]  print_report+0xd1/0x650
[   34.166674]  ? __virt_addr_valid+0x1db/0x2d0
[   34.166715]  ? kasan_atomics_helper+0x194a/0x5450
[   34.166747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.166785]  ? kasan_atomics_helper+0x194a/0x5450
[   34.166816]  kasan_report+0x141/0x180
[   34.166846]  ? kasan_atomics_helper+0x194a/0x5450
[   34.166882]  kasan_check_range+0x10c/0x1c0
[   34.166915]  __kasan_check_write+0x18/0x20
[   34.166946]  kasan_atomics_helper+0x194a/0x5450
[   34.166978]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.167008]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.167041]  ? kasan_atomics+0x152/0x310
[   34.167077]  kasan_atomics+0x1dc/0x310
[   34.167108]  ? __pfx_kasan_atomics+0x10/0x10
[   34.167139]  ? __pfx_read_tsc+0x10/0x10
[   34.167170]  ? ktime_get_ts64+0x86/0x230
[   34.167204]  kunit_try_run_case+0x1a5/0x480
[   34.167238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.167269]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.167304]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.167338]  ? __kthread_parkme+0x82/0x180
[   34.167367]  ? preempt_count_sub+0x50/0x80
[   34.167400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.167433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.167466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.167498]  kthread+0x337/0x6f0
[   34.167527]  ? trace_preempt_on+0x20/0xc0
[   34.167581]  ? __pfx_kthread+0x10/0x10
[   34.167611]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.167657]  ? calculate_sigpending+0x7b/0xa0
[   34.167693]  ? __pfx_kthread+0x10/0x10
[   34.167723]  ret_from_fork+0x116/0x1d0
[   34.167751]  ? __pfx_kthread+0x10/0x10
[   34.167780]  ret_from_fork_asm+0x1a/0x30
[   34.167833]  </TASK>
[   34.167851] 
[   34.182054] Allocated by task 295:
[   34.182472]  kasan_save_stack+0x45/0x70
[   34.182988]  kasan_save_track+0x18/0x40
[   34.183403]  kasan_save_alloc_info+0x3b/0x50
[   34.183847]  __kasan_kmalloc+0xb7/0xc0
[   34.184104]  __kmalloc_cache_noprof+0x189/0x420
[   34.184532]  kasan_atomics+0x95/0x310
[   34.184989]  kunit_try_run_case+0x1a5/0x480
[   34.185449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.185970]  kthread+0x337/0x6f0
[   34.186211]  ret_from_fork+0x116/0x1d0
[   34.186473]  ret_from_fork_asm+0x1a/0x30
[   34.186963] 
[   34.187184] The buggy address belongs to the object at ffff888102daa080
[   34.187184]  which belongs to the cache kmalloc-64 of size 64
[   34.188235] The buggy address is located 0 bytes to the right of
[   34.188235]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.189194] 
[   34.189430] The buggy address belongs to the physical page:
[   34.189917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.190328] flags: 0x200000000000000(node=0|zone=2)
[   34.190887] page_type: f5(slab)
[   34.191258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.191937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.192565] page dumped because: kasan: bad access detected
[   34.192887] 
[   34.193078] Memory state around the buggy address:
[   34.193522]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.194245]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.194808] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.195261]                                      ^
[   34.195680]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.196045]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.196717] ==================================================================
[   32.517729] ==================================================================
[   32.518766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   32.519327] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.520408] 
[   32.520725] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.520848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.520883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.520936] Call Trace:
[   32.520971]  <TASK>
[   32.521011]  dump_stack_lvl+0x73/0xb0
[   32.521090]  print_report+0xd1/0x650
[   32.521149]  ? __virt_addr_valid+0x1db/0x2d0
[   32.521209]  ? kasan_atomics_helper+0x4bbc/0x5450
[   32.521261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.521326]  ? kasan_atomics_helper+0x4bbc/0x5450
[   32.521380]  kasan_report+0x141/0x180
[   32.521437]  ? kasan_atomics_helper+0x4bbc/0x5450
[   32.521477]  __asan_report_load4_noabort+0x18/0x20
[   32.521510]  kasan_atomics_helper+0x4bbc/0x5450
[   32.521561]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.521592]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.521667]  ? kasan_atomics+0x152/0x310
[   32.521706]  kasan_atomics+0x1dc/0x310
[   32.521737]  ? __pfx_kasan_atomics+0x10/0x10
[   32.521770]  ? __pfx_read_tsc+0x10/0x10
[   32.521802]  ? ktime_get_ts64+0x86/0x230
[   32.521837]  kunit_try_run_case+0x1a5/0x480
[   32.521873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.521903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.521937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.521970]  ? __kthread_parkme+0x82/0x180
[   32.522000]  ? preempt_count_sub+0x50/0x80
[   32.522032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.522064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.522095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.522127]  kthread+0x337/0x6f0
[   32.522153]  ? trace_preempt_on+0x20/0xc0
[   32.522185]  ? __pfx_kthread+0x10/0x10
[   32.522212]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.522241]  ? calculate_sigpending+0x7b/0xa0
[   32.522272]  ? __pfx_kthread+0x10/0x10
[   32.522300]  ret_from_fork+0x116/0x1d0
[   32.522326]  ? __pfx_kthread+0x10/0x10
[   32.522352]  ret_from_fork_asm+0x1a/0x30
[   32.522392]  </TASK>
[   32.522406] 
[   32.536121] Allocated by task 295:
[   32.536494]  kasan_save_stack+0x45/0x70
[   32.536796]  kasan_save_track+0x18/0x40
[   32.537029]  kasan_save_alloc_info+0x3b/0x50
[   32.537330]  __kasan_kmalloc+0xb7/0xc0
[   32.537807]  __kmalloc_cache_noprof+0x189/0x420
[   32.538274]  kasan_atomics+0x95/0x310
[   32.538859]  kunit_try_run_case+0x1a5/0x480
[   32.539591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.540135]  kthread+0x337/0x6f0
[   32.540428]  ret_from_fork+0x116/0x1d0
[   32.540739]  ret_from_fork_asm+0x1a/0x30
[   32.541117] 
[   32.541283] The buggy address belongs to the object at ffff888102daa080
[   32.541283]  which belongs to the cache kmalloc-64 of size 64
[   32.542135] The buggy address is located 0 bytes to the right of
[   32.542135]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.542948] 
[   32.543140] The buggy address belongs to the physical page:
[   32.543512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.544113] flags: 0x200000000000000(node=0|zone=2)
[   32.544557] page_type: f5(slab)
[   32.544856] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.545315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.545962] page dumped because: kasan: bad access detected
[   32.546323] 
[   32.546452] Memory state around the buggy address:
[   32.546921]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.547460]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.547983] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.548632]                                      ^
[   32.549430]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.549815]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.550440] ==================================================================
[   33.767283] ==================================================================
[   33.767868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   33.768293] Read of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.768762] 
[   33.769004] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.769116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.769149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.769202] Call Trace:
[   33.769241]  <TASK>
[   33.769281]  dump_stack_lvl+0x73/0xb0
[   33.769353]  print_report+0xd1/0x650
[   33.769413]  ? __virt_addr_valid+0x1db/0x2d0
[   33.769480]  ? kasan_atomics_helper+0x13b5/0x5450
[   33.769552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.769661]  ? kasan_atomics_helper+0x13b5/0x5450
[   33.769731]  kasan_report+0x141/0x180
[   33.769796]  ? kasan_atomics_helper+0x13b5/0x5450
[   33.769871]  kasan_check_range+0x10c/0x1c0
[   33.769939]  __kasan_check_read+0x15/0x20
[   33.770005]  kasan_atomics_helper+0x13b5/0x5450
[   33.770067]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.770127]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.770189]  ? kasan_atomics+0x152/0x310
[   33.770255]  kasan_atomics+0x1dc/0x310
[   33.770306]  ? __pfx_kasan_atomics+0x10/0x10
[   33.770365]  ? __pfx_read_tsc+0x10/0x10
[   33.770423]  ? ktime_get_ts64+0x86/0x230
[   33.770488]  kunit_try_run_case+0x1a5/0x480
[   33.770571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.770673]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.770748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.770816]  ? __kthread_parkme+0x82/0x180
[   33.770878]  ? preempt_count_sub+0x50/0x80
[   33.770948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.771011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.771070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.771136]  kthread+0x337/0x6f0
[   33.771193]  ? trace_preempt_on+0x20/0xc0
[   33.771264]  ? __pfx_kthread+0x10/0x10
[   33.771327]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.771395]  ? calculate_sigpending+0x7b/0xa0
[   33.771465]  ? __pfx_kthread+0x10/0x10
[   33.771530]  ret_from_fork+0x116/0x1d0
[   33.771608]  ? __pfx_kthread+0x10/0x10
[   33.771709]  ret_from_fork_asm+0x1a/0x30
[   33.771798]  </TASK>
[   33.771843] 
[   33.784588] Allocated by task 295:
[   33.784965]  kasan_save_stack+0x45/0x70
[   33.785287]  kasan_save_track+0x18/0x40
[   33.785732]  kasan_save_alloc_info+0x3b/0x50
[   33.786081]  __kasan_kmalloc+0xb7/0xc0
[   33.786403]  __kmalloc_cache_noprof+0x189/0x420
[   33.786882]  kasan_atomics+0x95/0x310
[   33.787264]  kunit_try_run_case+0x1a5/0x480
[   33.787566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.788027]  kthread+0x337/0x6f0
[   33.788264]  ret_from_fork+0x116/0x1d0
[   33.788501]  ret_from_fork_asm+0x1a/0x30
[   33.788940] 
[   33.789151] The buggy address belongs to the object at ffff888102daa080
[   33.789151]  which belongs to the cache kmalloc-64 of size 64
[   33.790209] The buggy address is located 0 bytes to the right of
[   33.790209]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.791062] 
[   33.791272] The buggy address belongs to the physical page:
[   33.791727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.792390] flags: 0x200000000000000(node=0|zone=2)
[   33.792889] page_type: f5(slab)
[   33.793154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.793523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.794229] page dumped because: kasan: bad access detected
[   33.794782] 
[   33.794978] Memory state around the buggy address:
[   33.795331]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.795895]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.796369] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.796819]                                      ^
[   33.797088]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.797430]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.798011] ==================================================================
[   33.417535] ==================================================================
[   33.418271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   33.418731] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.419379] 
[   33.419693] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.419814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.419860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.419913] Call Trace:
[   33.419982]  <TASK>
[   33.420026]  dump_stack_lvl+0x73/0xb0
[   33.420107]  print_report+0xd1/0x650
[   33.420170]  ? __virt_addr_valid+0x1db/0x2d0
[   33.420237]  ? kasan_atomics_helper+0xfa9/0x5450
[   33.420326]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.420399]  ? kasan_atomics_helper+0xfa9/0x5450
[   33.420461]  kasan_report+0x141/0x180
[   33.420528]  ? kasan_atomics_helper+0xfa9/0x5450
[   33.420670]  kasan_check_range+0x10c/0x1c0
[   33.420747]  __kasan_check_write+0x18/0x20
[   33.420815]  kasan_atomics_helper+0xfa9/0x5450
[   33.420881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.420941]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.421011]  ? kasan_atomics+0x152/0x310
[   33.421082]  kasan_atomics+0x1dc/0x310
[   33.421146]  ? __pfx_kasan_atomics+0x10/0x10
[   33.421215]  ? __pfx_read_tsc+0x10/0x10
[   33.421277]  ? ktime_get_ts64+0x86/0x230
[   33.421347]  kunit_try_run_case+0x1a5/0x480
[   33.421406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.421442]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.421481]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.421515]  ? __kthread_parkme+0x82/0x180
[   33.421610]  ? preempt_count_sub+0x50/0x80
[   33.421708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.421769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.421824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.421890]  kthread+0x337/0x6f0
[   33.421970]  ? trace_preempt_on+0x20/0xc0
[   33.422056]  ? __pfx_kthread+0x10/0x10
[   33.422121]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.422206]  ? calculate_sigpending+0x7b/0xa0
[   33.422283]  ? __pfx_kthread+0x10/0x10
[   33.422345]  ret_from_fork+0x116/0x1d0
[   33.422419]  ? __pfx_kthread+0x10/0x10
[   33.422496]  ret_from_fork_asm+0x1a/0x30
[   33.422593]  </TASK>
[   33.422654] 
[   33.436331] Allocated by task 295:
[   33.436687]  kasan_save_stack+0x45/0x70
[   33.437144]  kasan_save_track+0x18/0x40
[   33.437565]  kasan_save_alloc_info+0x3b/0x50
[   33.438020]  __kasan_kmalloc+0xb7/0xc0
[   33.438414]  __kmalloc_cache_noprof+0x189/0x420
[   33.438946]  kasan_atomics+0x95/0x310
[   33.439289]  kunit_try_run_case+0x1a5/0x480
[   33.439584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.439931]  kthread+0x337/0x6f0
[   33.440156]  ret_from_fork+0x116/0x1d0
[   33.440389]  ret_from_fork_asm+0x1a/0x30
[   33.440691] 
[   33.440829] The buggy address belongs to the object at ffff888102daa080
[   33.440829]  which belongs to the cache kmalloc-64 of size 64
[   33.441922] The buggy address is located 0 bytes to the right of
[   33.441922]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.443084] 
[   33.443297] The buggy address belongs to the physical page:
[   33.443914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.444703] flags: 0x200000000000000(node=0|zone=2)
[   33.445104] page_type: f5(slab)
[   33.445326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.445742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.446096] page dumped because: kasan: bad access detected
[   33.446369] 
[   33.446507] Memory state around the buggy address:
[   33.447012]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.447755]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.448427] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.449103]                                      ^
[   33.449581]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.450250]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.450923] ==================================================================
[   33.205833] ==================================================================
[   33.206566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   33.207151] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.207790] 
[   33.208066] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.208190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.208224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.208270] Call Trace:
[   33.208312]  <TASK>
[   33.208355]  dump_stack_lvl+0x73/0xb0
[   33.208490]  print_report+0xd1/0x650
[   33.208572]  ? __virt_addr_valid+0x1db/0x2d0
[   33.208715]  ? kasan_atomics_helper+0xc70/0x5450
[   33.208793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.208866]  ? kasan_atomics_helper+0xc70/0x5450
[   33.208914]  kasan_report+0x141/0x180
[   33.208948]  ? kasan_atomics_helper+0xc70/0x5450
[   33.208985]  kasan_check_range+0x10c/0x1c0
[   33.209018]  __kasan_check_write+0x18/0x20
[   33.209051]  kasan_atomics_helper+0xc70/0x5450
[   33.209084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.209115]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.209149]  ? kasan_atomics+0x152/0x310
[   33.209185]  kasan_atomics+0x1dc/0x310
[   33.209216]  ? __pfx_kasan_atomics+0x10/0x10
[   33.209249]  ? __pfx_read_tsc+0x10/0x10
[   33.209279]  ? ktime_get_ts64+0x86/0x230
[   33.209312]  kunit_try_run_case+0x1a5/0x480
[   33.209346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.209377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.209411]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.209445]  ? __kthread_parkme+0x82/0x180
[   33.209474]  ? preempt_count_sub+0x50/0x80
[   33.209506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.209558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.209594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.209658]  kthread+0x337/0x6f0
[   33.209693]  ? trace_preempt_on+0x20/0xc0
[   33.209727]  ? __pfx_kthread+0x10/0x10
[   33.209756]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.209789]  ? calculate_sigpending+0x7b/0xa0
[   33.209823]  ? __pfx_kthread+0x10/0x10
[   33.209853]  ret_from_fork+0x116/0x1d0
[   33.209880]  ? __pfx_kthread+0x10/0x10
[   33.209909]  ret_from_fork_asm+0x1a/0x30
[   33.209952]  </TASK>
[   33.209968] 
[   33.223800] Allocated by task 295:
[   33.224066]  kasan_save_stack+0x45/0x70
[   33.224620]  kasan_save_track+0x18/0x40
[   33.225078]  kasan_save_alloc_info+0x3b/0x50
[   33.225602]  __kasan_kmalloc+0xb7/0xc0
[   33.225940]  __kmalloc_cache_noprof+0x189/0x420
[   33.226307]  kasan_atomics+0x95/0x310
[   33.226761]  kunit_try_run_case+0x1a5/0x480
[   33.227192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.227651]  kthread+0x337/0x6f0
[   33.228036]  ret_from_fork+0x116/0x1d0
[   33.228313]  ret_from_fork_asm+0x1a/0x30
[   33.228656] 
[   33.228870] The buggy address belongs to the object at ffff888102daa080
[   33.228870]  which belongs to the cache kmalloc-64 of size 64
[   33.229929] The buggy address is located 0 bytes to the right of
[   33.229929]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.230935] 
[   33.231182] The buggy address belongs to the physical page:
[   33.231672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.232346] flags: 0x200000000000000(node=0|zone=2)
[   33.232814] page_type: f5(slab)
[   33.233036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.233401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.233769] page dumped because: kasan: bad access detected
[   33.234117] 
[   33.234358] Memory state around the buggy address:
[   33.235375]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.236901]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.237577] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.238673]                                      ^
[   33.239173]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.239515]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.240194] ==================================================================
[   33.277809] ==================================================================
[   33.279268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   33.279810] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.280577] 
[   33.281011] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.281349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.281395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.281425] Call Trace:
[   33.281451]  <TASK>
[   33.281475]  dump_stack_lvl+0x73/0xb0
[   33.281521]  print_report+0xd1/0x650
[   33.281587]  ? __virt_addr_valid+0x1db/0x2d0
[   33.281649]  ? kasan_atomics_helper+0xd47/0x5450
[   33.281702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.281788]  ? kasan_atomics_helper+0xd47/0x5450
[   33.281884]  kasan_report+0x141/0x180
[   33.281949]  ? kasan_atomics_helper+0xd47/0x5450
[   33.282007]  kasan_check_range+0x10c/0x1c0
[   33.282044]  __kasan_check_write+0x18/0x20
[   33.282078]  kasan_atomics_helper+0xd47/0x5450
[   33.282109]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.282140]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.282175]  ? kasan_atomics+0x152/0x310
[   33.282211]  kasan_atomics+0x1dc/0x310
[   33.282242]  ? __pfx_kasan_atomics+0x10/0x10
[   33.282274]  ? __pfx_read_tsc+0x10/0x10
[   33.282306]  ? ktime_get_ts64+0x86/0x230
[   33.282340]  kunit_try_run_case+0x1a5/0x480
[   33.282373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.282404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.282439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.282473]  ? __kthread_parkme+0x82/0x180
[   33.282501]  ? preempt_count_sub+0x50/0x80
[   33.282533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.282588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.282622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.282672]  kthread+0x337/0x6f0
[   33.282701]  ? trace_preempt_on+0x20/0xc0
[   33.282734]  ? __pfx_kthread+0x10/0x10
[   33.282764]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.282795]  ? calculate_sigpending+0x7b/0xa0
[   33.282828]  ? __pfx_kthread+0x10/0x10
[   33.282857]  ret_from_fork+0x116/0x1d0
[   33.282884]  ? __pfx_kthread+0x10/0x10
[   33.282913]  ret_from_fork_asm+0x1a/0x30
[   33.282955]  </TASK>
[   33.282972] 
[   33.295985] Allocated by task 295:
[   33.296242]  kasan_save_stack+0x45/0x70
[   33.296659]  kasan_save_track+0x18/0x40
[   33.297076]  kasan_save_alloc_info+0x3b/0x50
[   33.297519]  __kasan_kmalloc+0xb7/0xc0
[   33.298034]  __kmalloc_cache_noprof+0x189/0x420
[   33.298522]  kasan_atomics+0x95/0x310
[   33.298979]  kunit_try_run_case+0x1a5/0x480
[   33.299520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.300135]  kthread+0x337/0x6f0
[   33.300492]  ret_from_fork+0x116/0x1d0
[   33.301022]  ret_from_fork_asm+0x1a/0x30
[   33.301392] 
[   33.301704] The buggy address belongs to the object at ffff888102daa080
[   33.301704]  which belongs to the cache kmalloc-64 of size 64
[   33.302689] The buggy address is located 0 bytes to the right of
[   33.302689]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.303614] 
[   33.303890] The buggy address belongs to the physical page:
[   33.304434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.305141] flags: 0x200000000000000(node=0|zone=2)
[   33.305702] page_type: f5(slab)
[   33.306028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.306558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.307334] page dumped because: kasan: bad access detected
[   33.307698] 
[   33.307851] Memory state around the buggy address:
[   33.308111]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.308456]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.309209] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.310007]                                      ^
[   33.310465]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.311176]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.311909] ==================================================================
[   34.446927] ==================================================================
[   34.447314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   34.447944] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.449152] 
[   34.449399] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.449555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.449596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.449685] Call Trace:
[   34.449731]  <TASK>
[   34.449772]  dump_stack_lvl+0x73/0xb0
[   34.449847]  print_report+0xd1/0x650
[   34.449883]  ? __virt_addr_valid+0x1db/0x2d0
[   34.449917]  ? kasan_atomics_helper+0x1e12/0x5450
[   34.449949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.449985]  ? kasan_atomics_helper+0x1e12/0x5450
[   34.450015]  kasan_report+0x141/0x180
[   34.450045]  ? kasan_atomics_helper+0x1e12/0x5450
[   34.450079]  kasan_check_range+0x10c/0x1c0
[   34.450111]  __kasan_check_write+0x18/0x20
[   34.450143]  kasan_atomics_helper+0x1e12/0x5450
[   34.450174]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.450203]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.450237]  ? kasan_atomics+0x152/0x310
[   34.450272]  kasan_atomics+0x1dc/0x310
[   34.450303]  ? __pfx_kasan_atomics+0x10/0x10
[   34.450334]  ? __pfx_read_tsc+0x10/0x10
[   34.450364]  ? ktime_get_ts64+0x86/0x230
[   34.450397]  kunit_try_run_case+0x1a5/0x480
[   34.450430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.450462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.450496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.450529]  ? __kthread_parkme+0x82/0x180
[   34.450580]  ? preempt_count_sub+0x50/0x80
[   34.450612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.450675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.450711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.450744]  kthread+0x337/0x6f0
[   34.450772]  ? trace_preempt_on+0x20/0xc0
[   34.450805]  ? __pfx_kthread+0x10/0x10
[   34.450834]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.450865]  ? calculate_sigpending+0x7b/0xa0
[   34.450898]  ? __pfx_kthread+0x10/0x10
[   34.450927]  ret_from_fork+0x116/0x1d0
[   34.450954]  ? __pfx_kthread+0x10/0x10
[   34.450983]  ret_from_fork_asm+0x1a/0x30
[   34.451024]  </TASK>
[   34.451040] 
[   34.465218] Allocated by task 295:
[   34.465577]  kasan_save_stack+0x45/0x70
[   34.466065]  kasan_save_track+0x18/0x40
[   34.466418]  kasan_save_alloc_info+0x3b/0x50
[   34.466822]  __kasan_kmalloc+0xb7/0xc0
[   34.467242]  __kmalloc_cache_noprof+0x189/0x420
[   34.467742]  kasan_atomics+0x95/0x310
[   34.468057]  kunit_try_run_case+0x1a5/0x480
[   34.468438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.468942]  kthread+0x337/0x6f0
[   34.469184]  ret_from_fork+0x116/0x1d0
[   34.469610]  ret_from_fork_asm+0x1a/0x30
[   34.470071] 
[   34.470286] The buggy address belongs to the object at ffff888102daa080
[   34.470286]  which belongs to the cache kmalloc-64 of size 64
[   34.471166] The buggy address is located 0 bytes to the right of
[   34.471166]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.472176] 
[   34.472353] The buggy address belongs to the physical page:
[   34.472682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.473394] flags: 0x200000000000000(node=0|zone=2)
[   34.473926] page_type: f5(slab)
[   34.474166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.474862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.475434] page dumped because: kasan: bad access detected
[   34.475975] 
[   34.476150] Memory state around the buggy address:
[   34.476508]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.477121]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.477723] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.478238]                                      ^
[   34.478617]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.479227]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.479849] ==================================================================
[   34.481002] ==================================================================
[   34.481710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   34.482397] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.482992] 
[   34.483177] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.483299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.483338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.483392] Call Trace:
[   34.483484]  <TASK>
[   34.483571]  dump_stack_lvl+0x73/0xb0
[   34.483676]  print_report+0xd1/0x650
[   34.483744]  ? __virt_addr_valid+0x1db/0x2d0
[   34.483814]  ? kasan_atomics_helper+0x1eaa/0x5450
[   34.483889]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.483964]  ? kasan_atomics_helper+0x1eaa/0x5450
[   34.484030]  kasan_report+0x141/0x180
[   34.484096]  ? kasan_atomics_helper+0x1eaa/0x5450
[   34.484173]  kasan_check_range+0x10c/0x1c0
[   34.484242]  __kasan_check_write+0x18/0x20
[   34.484360]  kasan_atomics_helper+0x1eaa/0x5450
[   34.484419]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.484479]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.484564]  ? kasan_atomics+0x152/0x310
[   34.484637]  kasan_atomics+0x1dc/0x310
[   34.484698]  ? __pfx_kasan_atomics+0x10/0x10
[   34.484754]  ? __pfx_read_tsc+0x10/0x10
[   34.484827]  ? ktime_get_ts64+0x86/0x230
[   34.484916]  kunit_try_run_case+0x1a5/0x480
[   34.484991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.485053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.485098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.485135]  ? __kthread_parkme+0x82/0x180
[   34.485165]  ? preempt_count_sub+0x50/0x80
[   34.485199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.485232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.485266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.485299]  kthread+0x337/0x6f0
[   34.485326]  ? trace_preempt_on+0x20/0xc0
[   34.485360]  ? __pfx_kthread+0x10/0x10
[   34.485388]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.485419]  ? calculate_sigpending+0x7b/0xa0
[   34.485452]  ? __pfx_kthread+0x10/0x10
[   34.485481]  ret_from_fork+0x116/0x1d0
[   34.485509]  ? __pfx_kthread+0x10/0x10
[   34.485555]  ret_from_fork_asm+0x1a/0x30
[   34.485605]  </TASK>
[   34.485621] 
[   34.498484] Allocated by task 295:
[   34.498954]  kasan_save_stack+0x45/0x70
[   34.499443]  kasan_save_track+0x18/0x40
[   34.499919]  kasan_save_alloc_info+0x3b/0x50
[   34.500295]  __kasan_kmalloc+0xb7/0xc0
[   34.500748]  __kmalloc_cache_noprof+0x189/0x420
[   34.501130]  kasan_atomics+0x95/0x310
[   34.501533]  kunit_try_run_case+0x1a5/0x480
[   34.501942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.502410]  kthread+0x337/0x6f0
[   34.502786]  ret_from_fork+0x116/0x1d0
[   34.503103]  ret_from_fork_asm+0x1a/0x30
[   34.503516] 
[   34.503783] The buggy address belongs to the object at ffff888102daa080
[   34.503783]  which belongs to the cache kmalloc-64 of size 64
[   34.504586] The buggy address is located 0 bytes to the right of
[   34.504586]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.505501] 
[   34.505815] The buggy address belongs to the physical page:
[   34.506120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.506858] flags: 0x200000000000000(node=0|zone=2)
[   34.507304] page_type: f5(slab)
[   34.507531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.507965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.508320] page dumped because: kasan: bad access detected
[   34.508852] 
[   34.509080] Memory state around the buggy address:
[   34.509530]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.510193]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.510872] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.511510]                                      ^
[   34.512040]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.512597]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.513119] ==================================================================
[   34.621581] ==================================================================
[   34.622073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   34.622447] Read of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.623230] 
[   34.623487] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.623678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.623716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.623770] Call Trace:
[   34.623826]  <TASK>
[   34.623875]  dump_stack_lvl+0x73/0xb0
[   34.623961]  print_report+0xd1/0x650
[   34.624025]  ? __virt_addr_valid+0x1db/0x2d0
[   34.624093]  ? kasan_atomics_helper+0x4f98/0x5450
[   34.624156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.624222]  ? kasan_atomics_helper+0x4f98/0x5450
[   34.624278]  kasan_report+0x141/0x180
[   34.624338]  ? kasan_atomics_helper+0x4f98/0x5450
[   34.624435]  __asan_report_load8_noabort+0x18/0x20
[   34.624514]  kasan_atomics_helper+0x4f98/0x5450
[   34.624579]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.624654]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.624712]  ? kasan_atomics+0x152/0x310
[   34.624765]  kasan_atomics+0x1dc/0x310
[   34.624817]  ? __pfx_kasan_atomics+0x10/0x10
[   34.624867]  ? __pfx_read_tsc+0x10/0x10
[   34.624918]  ? ktime_get_ts64+0x86/0x230
[   34.624976]  kunit_try_run_case+0x1a5/0x480
[   34.625047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.625150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.625264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.625353]  ? __kthread_parkme+0x82/0x180
[   34.625409]  ? preempt_count_sub+0x50/0x80
[   34.625478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.625558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.625697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.625797]  kthread+0x337/0x6f0
[   34.625859]  ? trace_preempt_on+0x20/0xc0
[   34.625930]  ? __pfx_kthread+0x10/0x10
[   34.625984]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.626048]  ? calculate_sigpending+0x7b/0xa0
[   34.626150]  ? __pfx_kthread+0x10/0x10
[   34.626232]  ret_from_fork+0x116/0x1d0
[   34.626292]  ? __pfx_kthread+0x10/0x10
[   34.626331]  ret_from_fork_asm+0x1a/0x30
[   34.626375]  </TASK>
[   34.626392] 
[   34.640347] Allocated by task 295:
[   34.640763]  kasan_save_stack+0x45/0x70
[   34.641247]  kasan_save_track+0x18/0x40
[   34.641581]  kasan_save_alloc_info+0x3b/0x50
[   34.642013]  __kasan_kmalloc+0xb7/0xc0
[   34.642268]  __kmalloc_cache_noprof+0x189/0x420
[   34.642806]  kasan_atomics+0x95/0x310
[   34.643222]  kunit_try_run_case+0x1a5/0x480
[   34.643711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.644122]  kthread+0x337/0x6f0
[   34.644511]  ret_from_fork+0x116/0x1d0
[   34.644945]  ret_from_fork_asm+0x1a/0x30
[   34.645221] 
[   34.645372] The buggy address belongs to the object at ffff888102daa080
[   34.645372]  which belongs to the cache kmalloc-64 of size 64
[   34.646285] The buggy address is located 0 bytes to the right of
[   34.646285]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.647408] 
[   34.647580] The buggy address belongs to the physical page:
[   34.648151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.648888] flags: 0x200000000000000(node=0|zone=2)
[   34.649277] page_type: f5(slab)
[   34.649681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.650282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.650916] page dumped because: kasan: bad access detected
[   34.651355] 
[   34.651578] Memory state around the buggy address:
[   34.652009]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.652439]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.652974] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.653655]                                      ^
[   34.654008]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.654562]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.655146] ==================================================================
[   33.348664] ==================================================================
[   33.349901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   33.350428] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.351334] 
[   33.351576] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.351687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.351720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.351775] Call Trace:
[   33.351833]  <TASK>
[   33.351878]  dump_stack_lvl+0x73/0xb0
[   33.351983]  print_report+0xd1/0x650
[   33.352048]  ? __virt_addr_valid+0x1db/0x2d0
[   33.352116]  ? kasan_atomics_helper+0xe78/0x5450
[   33.352181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.352252]  ? kasan_atomics_helper+0xe78/0x5450
[   33.352317]  kasan_report+0x141/0x180
[   33.352379]  ? kasan_atomics_helper+0xe78/0x5450
[   33.352436]  kasan_check_range+0x10c/0x1c0
[   33.352473]  __kasan_check_write+0x18/0x20
[   33.352506]  kasan_atomics_helper+0xe78/0x5450
[   33.352559]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.352592]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.352635]  ? kasan_atomics+0x152/0x310
[   33.352694]  kasan_atomics+0x1dc/0x310
[   33.352726]  ? __pfx_kasan_atomics+0x10/0x10
[   33.352760]  ? __pfx_read_tsc+0x10/0x10
[   33.352793]  ? ktime_get_ts64+0x86/0x230
[   33.352828]  kunit_try_run_case+0x1a5/0x480
[   33.352861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.352893]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.352929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.352963]  ? __kthread_parkme+0x82/0x180
[   33.352991]  ? preempt_count_sub+0x50/0x80
[   33.353023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.353057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.353090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.353123]  kthread+0x337/0x6f0
[   33.353150]  ? trace_preempt_on+0x20/0xc0
[   33.353183]  ? __pfx_kthread+0x10/0x10
[   33.353211]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.353243]  ? calculate_sigpending+0x7b/0xa0
[   33.353276]  ? __pfx_kthread+0x10/0x10
[   33.353306]  ret_from_fork+0x116/0x1d0
[   33.353333]  ? __pfx_kthread+0x10/0x10
[   33.353361]  ret_from_fork_asm+0x1a/0x30
[   33.353402]  </TASK>
[   33.353418] 
[   33.366791] Allocated by task 295:
[   33.367187]  kasan_save_stack+0x45/0x70
[   33.367687]  kasan_save_track+0x18/0x40
[   33.368105]  kasan_save_alloc_info+0x3b/0x50
[   33.368587]  __kasan_kmalloc+0xb7/0xc0
[   33.368871]  __kmalloc_cache_noprof+0x189/0x420
[   33.369146]  kasan_atomics+0x95/0x310
[   33.369381]  kunit_try_run_case+0x1a5/0x480
[   33.369818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.370340]  kthread+0x337/0x6f0
[   33.370769]  ret_from_fork+0x116/0x1d0
[   33.371146]  ret_from_fork_asm+0x1a/0x30
[   33.371512] 
[   33.371735] The buggy address belongs to the object at ffff888102daa080
[   33.371735]  which belongs to the cache kmalloc-64 of size 64
[   33.372663] The buggy address is located 0 bytes to the right of
[   33.372663]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.373570] 
[   33.373789] The buggy address belongs to the physical page:
[   33.374291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.374887] flags: 0x200000000000000(node=0|zone=2)
[   33.375366] page_type: f5(slab)
[   33.375787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.376271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.376618] page dumped because: kasan: bad access detected
[   33.376903] 
[   33.377020] Memory state around the buggy address:
[   33.377250]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.377576]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.378036] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.378438]                                      ^
[   33.378836]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.379474]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.380110] ==================================================================
[   33.873756] ==================================================================
[   33.874380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   33.875107] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.875742] 
[   33.876069] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.876210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.876260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.876314] Call Trace:
[   33.876378]  <TASK>
[   33.876425]  dump_stack_lvl+0x73/0xb0
[   33.876508]  print_report+0xd1/0x650
[   33.876587]  ? __virt_addr_valid+0x1db/0x2d0
[   33.876726]  ? kasan_atomics_helper+0x50d4/0x5450
[   33.876815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.876885]  ? kasan_atomics_helper+0x50d4/0x5450
[   33.876928]  kasan_report+0x141/0x180
[   33.876962]  ? kasan_atomics_helper+0x50d4/0x5450
[   33.876999]  __asan_report_store8_noabort+0x1b/0x30
[   33.877034]  kasan_atomics_helper+0x50d4/0x5450
[   33.877066]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.877098]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.877132]  ? kasan_atomics+0x152/0x310
[   33.877168]  kasan_atomics+0x1dc/0x310
[   33.877199]  ? __pfx_kasan_atomics+0x10/0x10
[   33.877232]  ? __pfx_read_tsc+0x10/0x10
[   33.877263]  ? ktime_get_ts64+0x86/0x230
[   33.877296]  kunit_try_run_case+0x1a5/0x480
[   33.877329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.877361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.877395]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.877429]  ? __kthread_parkme+0x82/0x180
[   33.877457]  ? preempt_count_sub+0x50/0x80
[   33.877489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.877522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.877576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.877610]  kthread+0x337/0x6f0
[   33.877660]  ? trace_preempt_on+0x20/0xc0
[   33.877696]  ? __pfx_kthread+0x10/0x10
[   33.877726]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.877759]  ? calculate_sigpending+0x7b/0xa0
[   33.877792]  ? __pfx_kthread+0x10/0x10
[   33.877822]  ret_from_fork+0x116/0x1d0
[   33.877848]  ? __pfx_kthread+0x10/0x10
[   33.877877]  ret_from_fork_asm+0x1a/0x30
[   33.877918]  </TASK>
[   33.877934] 
[   33.891903] Allocated by task 295:
[   33.892361]  kasan_save_stack+0x45/0x70
[   33.892758]  kasan_save_track+0x18/0x40
[   33.893249]  kasan_save_alloc_info+0x3b/0x50
[   33.893730]  __kasan_kmalloc+0xb7/0xc0
[   33.894149]  __kmalloc_cache_noprof+0x189/0x420
[   33.894610]  kasan_atomics+0x95/0x310
[   33.895096]  kunit_try_run_case+0x1a5/0x480
[   33.895515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.896094]  kthread+0x337/0x6f0
[   33.896334]  ret_from_fork+0x116/0x1d0
[   33.896751]  ret_from_fork_asm+0x1a/0x30
[   33.897209] 
[   33.897411] The buggy address belongs to the object at ffff888102daa080
[   33.897411]  which belongs to the cache kmalloc-64 of size 64
[   33.898192] The buggy address is located 0 bytes to the right of
[   33.898192]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.899473] 
[   33.899741] The buggy address belongs to the physical page:
[   33.900308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.900929] flags: 0x200000000000000(node=0|zone=2)
[   33.901395] page_type: f5(slab)
[   33.901691] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.902408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.902879] page dumped because: kasan: bad access detected
[   33.903389] 
[   33.903712] Memory state around the buggy address:
[   33.904115]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.904802]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.905515] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.906148]                                      ^
[   33.906574]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.907231]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.907805] ==================================================================
[   34.055513] ==================================================================
[   34.056929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   34.057651] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.058240] 
[   34.058522] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.058726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.058779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.058830] Call Trace:
[   34.058873]  <TASK>
[   34.058917]  dump_stack_lvl+0x73/0xb0
[   34.058998]  print_report+0xd1/0x650
[   34.059061]  ? __virt_addr_valid+0x1db/0x2d0
[   34.059128]  ? kasan_atomics_helper+0x177f/0x5450
[   34.059193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.059266]  ? kasan_atomics_helper+0x177f/0x5450
[   34.059319]  kasan_report+0x141/0x180
[   34.059359]  ? kasan_atomics_helper+0x177f/0x5450
[   34.059396]  kasan_check_range+0x10c/0x1c0
[   34.059429]  __kasan_check_write+0x18/0x20
[   34.059461]  kasan_atomics_helper+0x177f/0x5450
[   34.059492]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.059523]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.059583]  ? kasan_atomics+0x152/0x310
[   34.059620]  kasan_atomics+0x1dc/0x310
[   34.059677]  ? __pfx_kasan_atomics+0x10/0x10
[   34.059711]  ? __pfx_read_tsc+0x10/0x10
[   34.059745]  ? ktime_get_ts64+0x86/0x230
[   34.059779]  kunit_try_run_case+0x1a5/0x480
[   34.059814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.059856]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.059892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.059926]  ? __kthread_parkme+0x82/0x180
[   34.059956]  ? preempt_count_sub+0x50/0x80
[   34.059988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.060022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.060055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.060087]  kthread+0x337/0x6f0
[   34.060115]  ? trace_preempt_on+0x20/0xc0
[   34.060148]  ? __pfx_kthread+0x10/0x10
[   34.060177]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.060208]  ? calculate_sigpending+0x7b/0xa0
[   34.060240]  ? __pfx_kthread+0x10/0x10
[   34.060269]  ret_from_fork+0x116/0x1d0
[   34.060297]  ? __pfx_kthread+0x10/0x10
[   34.060326]  ret_from_fork_asm+0x1a/0x30
[   34.060367]  </TASK>
[   34.060383] 
[   34.077457] Allocated by task 295:
[   34.077763]  kasan_save_stack+0x45/0x70
[   34.078034]  kasan_save_track+0x18/0x40
[   34.078291]  kasan_save_alloc_info+0x3b/0x50
[   34.078754]  __kasan_kmalloc+0xb7/0xc0
[   34.079117]  __kmalloc_cache_noprof+0x189/0x420
[   34.079480]  kasan_atomics+0x95/0x310
[   34.079957]  kunit_try_run_case+0x1a5/0x480
[   34.080350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.080843]  kthread+0x337/0x6f0
[   34.081214]  ret_from_fork+0x116/0x1d0
[   34.081480]  ret_from_fork_asm+0x1a/0x30
[   34.081868] 
[   34.082071] The buggy address belongs to the object at ffff888102daa080
[   34.082071]  which belongs to the cache kmalloc-64 of size 64
[   34.082870] The buggy address is located 0 bytes to the right of
[   34.082870]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.083518] 
[   34.083778] The buggy address belongs to the physical page:
[   34.084323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.084899] flags: 0x200000000000000(node=0|zone=2)
[   34.085321] page_type: f5(slab)
[   34.085553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.086179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.086676] page dumped because: kasan: bad access detected
[   34.087066] 
[   34.087266] Memory state around the buggy address:
[   34.087761]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.088320]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.088866] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.089315]                                      ^
[   34.089746]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.090364]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.090817] ==================================================================
[   34.656853] ==================================================================
[   34.657314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   34.658053] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.658661] 
[   34.658947] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.659060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.659095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.659150] Call Trace:
[   34.659208]  <TASK>
[   34.659271]  dump_stack_lvl+0x73/0xb0
[   34.659348]  print_report+0xd1/0x650
[   34.659410]  ? __virt_addr_valid+0x1db/0x2d0
[   34.659475]  ? kasan_atomics_helper+0x20c8/0x5450
[   34.659555]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.659666]  ? kasan_atomics_helper+0x20c8/0x5450
[   34.659747]  kasan_report+0x141/0x180
[   34.659841]  ? kasan_atomics_helper+0x20c8/0x5450
[   34.659918]  kasan_check_range+0x10c/0x1c0
[   34.659987]  __kasan_check_write+0x18/0x20
[   34.660055]  kasan_atomics_helper+0x20c8/0x5450
[   34.660117]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.660174]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.660242]  ? kasan_atomics+0x152/0x310
[   34.660325]  kasan_atomics+0x1dc/0x310
[   34.660410]  ? __pfx_kasan_atomics+0x10/0x10
[   34.660486]  ? __pfx_read_tsc+0x10/0x10
[   34.660586]  ? ktime_get_ts64+0x86/0x230
[   34.660692]  kunit_try_run_case+0x1a5/0x480
[   34.660758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.660805]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.660848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.660883]  ? __kthread_parkme+0x82/0x180
[   34.660913]  ? preempt_count_sub+0x50/0x80
[   34.660947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.660980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.661015]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.661049]  kthread+0x337/0x6f0
[   34.661076]  ? trace_preempt_on+0x20/0xc0
[   34.661109]  ? __pfx_kthread+0x10/0x10
[   34.661139]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.661170]  ? calculate_sigpending+0x7b/0xa0
[   34.661202]  ? __pfx_kthread+0x10/0x10
[   34.661233]  ret_from_fork+0x116/0x1d0
[   34.661259]  ? __pfx_kthread+0x10/0x10
[   34.661288]  ret_from_fork_asm+0x1a/0x30
[   34.661328]  </TASK>
[   34.661344] 
[   34.676018] Allocated by task 295:
[   34.676482]  kasan_save_stack+0x45/0x70
[   34.677008]  kasan_save_track+0x18/0x40
[   34.677266]  kasan_save_alloc_info+0x3b/0x50
[   34.677806]  __kasan_kmalloc+0xb7/0xc0
[   34.678211]  __kmalloc_cache_noprof+0x189/0x420
[   34.678781]  kasan_atomics+0x95/0x310
[   34.679149]  kunit_try_run_case+0x1a5/0x480
[   34.679594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.680138]  kthread+0x337/0x6f0
[   34.680374]  ret_from_fork+0x116/0x1d0
[   34.680761]  ret_from_fork_asm+0x1a/0x30
[   34.681295] 
[   34.681612] The buggy address belongs to the object at ffff888102daa080
[   34.681612]  which belongs to the cache kmalloc-64 of size 64
[   34.682738] The buggy address is located 0 bytes to the right of
[   34.682738]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.683502] 
[   34.683732] The buggy address belongs to the physical page:
[   34.684374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.685193] flags: 0x200000000000000(node=0|zone=2)
[   34.685694] page_type: f5(slab)
[   34.685923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.686577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.687330] page dumped because: kasan: bad access detected
[   34.687931] 
[   34.688076] Memory state around the buggy address:
[   34.688602]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.689243]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.689758] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.690445]                                      ^
[   34.690935]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.691617]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.692125] ==================================================================
[   33.095146] ==================================================================
[   33.095663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   33.096176] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.097414] 
[   33.097694] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.097815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.097848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.097899] Call Trace:
[   33.097944]  <TASK>
[   33.097988]  dump_stack_lvl+0x73/0xb0
[   33.098062]  print_report+0xd1/0x650
[   33.098122]  ? __virt_addr_valid+0x1db/0x2d0
[   33.098181]  ? kasan_atomics_helper+0xa2b/0x5450
[   33.098231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.098294]  ? kasan_atomics_helper+0xa2b/0x5450
[   33.098353]  kasan_report+0x141/0x180
[   33.098411]  ? kasan_atomics_helper+0xa2b/0x5450
[   33.098477]  kasan_check_range+0x10c/0x1c0
[   33.098559]  __kasan_check_write+0x18/0x20
[   33.098659]  kasan_atomics_helper+0xa2b/0x5450
[   33.098730]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.098795]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.098858]  ? kasan_atomics+0x152/0x310
[   33.098925]  kasan_atomics+0x1dc/0x310
[   33.098984]  ? __pfx_kasan_atomics+0x10/0x10
[   33.099046]  ? __pfx_read_tsc+0x10/0x10
[   33.099109]  ? ktime_get_ts64+0x86/0x230
[   33.099170]  kunit_try_run_case+0x1a5/0x480
[   33.099237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.099298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.099365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.099430]  ? __kthread_parkme+0x82/0x180
[   33.099490]  ? preempt_count_sub+0x50/0x80
[   33.099576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.099680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.099757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.099838]  kthread+0x337/0x6f0
[   33.099893]  ? trace_preempt_on+0x20/0xc0
[   33.099958]  ? __pfx_kthread+0x10/0x10
[   33.100015]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.100082]  ? calculate_sigpending+0x7b/0xa0
[   33.100152]  ? __pfx_kthread+0x10/0x10
[   33.100217]  ret_from_fork+0x116/0x1d0
[   33.100272]  ? __pfx_kthread+0x10/0x10
[   33.100307]  ret_from_fork_asm+0x1a/0x30
[   33.100351]  </TASK>
[   33.100368] 
[   33.112850] Allocated by task 295:
[   33.113220]  kasan_save_stack+0x45/0x70
[   33.113554]  kasan_save_track+0x18/0x40
[   33.113895]  kasan_save_alloc_info+0x3b/0x50
[   33.114283]  __kasan_kmalloc+0xb7/0xc0
[   33.114523]  __kmalloc_cache_noprof+0x189/0x420
[   33.114856]  kasan_atomics+0x95/0x310
[   33.115098]  kunit_try_run_case+0x1a5/0x480
[   33.115505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.116075]  kthread+0x337/0x6f0
[   33.116433]  ret_from_fork+0x116/0x1d0
[   33.116857]  ret_from_fork_asm+0x1a/0x30
[   33.117280] 
[   33.117477] The buggy address belongs to the object at ffff888102daa080
[   33.117477]  which belongs to the cache kmalloc-64 of size 64
[   33.118173] The buggy address is located 0 bytes to the right of
[   33.118173]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.119209] 
[   33.119415] The buggy address belongs to the physical page:
[   33.119970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.120439] flags: 0x200000000000000(node=0|zone=2)
[   33.120774] page_type: f5(slab)
[   33.121103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.121785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.122270] page dumped because: kasan: bad access detected
[   33.122594] 
[   33.122765] Memory state around the buggy address:
[   33.123025]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.123366]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.123937] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.124509]                                      ^
[   33.125030]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.125726]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.126325] ==================================================================
[   32.552426] ==================================================================
[   32.553013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   32.553794] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.554317] 
[   32.554506] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.554691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.554725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.554771] Call Trace:
[   32.554812]  <TASK>
[   32.554877]  dump_stack_lvl+0x73/0xb0
[   32.554972]  print_report+0xd1/0x650
[   32.555051]  ? __virt_addr_valid+0x1db/0x2d0
[   32.555114]  ? kasan_atomics_helper+0x4ba2/0x5450
[   32.555168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.555235]  ? kasan_atomics_helper+0x4ba2/0x5450
[   32.555296]  kasan_report+0x141/0x180
[   32.555358]  ? kasan_atomics_helper+0x4ba2/0x5450
[   32.555432]  __asan_report_store4_noabort+0x1b/0x30
[   32.555501]  kasan_atomics_helper+0x4ba2/0x5450
[   32.555581]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.555658]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.555705]  ? kasan_atomics+0x152/0x310
[   32.555741]  kasan_atomics+0x1dc/0x310
[   32.555773]  ? __pfx_kasan_atomics+0x10/0x10
[   32.555805]  ? __pfx_read_tsc+0x10/0x10
[   32.555849]  ? ktime_get_ts64+0x86/0x230
[   32.555883]  kunit_try_run_case+0x1a5/0x480
[   32.555917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.555948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.555981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.556014]  ? __kthread_parkme+0x82/0x180
[   32.556041]  ? preempt_count_sub+0x50/0x80
[   32.556072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.556104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.556136]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.556168]  kthread+0x337/0x6f0
[   32.556195]  ? trace_preempt_on+0x20/0xc0
[   32.556226]  ? __pfx_kthread+0x10/0x10
[   32.556253]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.556283]  ? calculate_sigpending+0x7b/0xa0
[   32.556314]  ? __pfx_kthread+0x10/0x10
[   32.556342]  ret_from_fork+0x116/0x1d0
[   32.556366]  ? __pfx_kthread+0x10/0x10
[   32.556393]  ret_from_fork_asm+0x1a/0x30
[   32.556432]  </TASK>
[   32.556448] 
[   32.572019] Allocated by task 295:
[   32.572403]  kasan_save_stack+0x45/0x70
[   32.572751]  kasan_save_track+0x18/0x40
[   32.573150]  kasan_save_alloc_info+0x3b/0x50
[   32.573423]  __kasan_kmalloc+0xb7/0xc0
[   32.573745]  __kmalloc_cache_noprof+0x189/0x420
[   32.574497]  kasan_atomics+0x95/0x310
[   32.575021]  kunit_try_run_case+0x1a5/0x480
[   32.575409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.575797]  kthread+0x337/0x6f0
[   32.576175]  ret_from_fork+0x116/0x1d0
[   32.576519]  ret_from_fork_asm+0x1a/0x30
[   32.577004] 
[   32.577203] The buggy address belongs to the object at ffff888102daa080
[   32.577203]  which belongs to the cache kmalloc-64 of size 64
[   32.578014] The buggy address is located 0 bytes to the right of
[   32.578014]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.579032] 
[   32.579183] The buggy address belongs to the physical page:
[   32.579692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.580433] flags: 0x200000000000000(node=0|zone=2)
[   32.580807] page_type: f5(slab)
[   32.581198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.581891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.582366] page dumped because: kasan: bad access detected
[   32.582938] 
[   32.583167] Memory state around the buggy address:
[   32.583705]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.584208]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.584738] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.585204]                                      ^
[   32.585691]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.586166]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.586596] ==================================================================
[   34.583907] ==================================================================
[   34.585144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   34.585891] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.586582] 
[   34.586853] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.586978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.587014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.587069] Call Trace:
[   34.587113]  <TASK>
[   34.587159]  dump_stack_lvl+0x73/0xb0
[   34.587238]  print_report+0xd1/0x650
[   34.587303]  ? __virt_addr_valid+0x1db/0x2d0
[   34.587372]  ? kasan_atomics_helper+0x2006/0x5450
[   34.587435]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.587510]  ? kasan_atomics_helper+0x2006/0x5450
[   34.587594]  kasan_report+0x141/0x180
[   34.587679]  ? kasan_atomics_helper+0x2006/0x5450
[   34.587773]  kasan_check_range+0x10c/0x1c0
[   34.587857]  __kasan_check_write+0x18/0x20
[   34.587946]  kasan_atomics_helper+0x2006/0x5450
[   34.588029]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.588111]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.588199]  ? kasan_atomics+0x152/0x310
[   34.588290]  kasan_atomics+0x1dc/0x310
[   34.588377]  ? __pfx_kasan_atomics+0x10/0x10
[   34.588442]  ? __pfx_read_tsc+0x10/0x10
[   34.588504]  ? ktime_get_ts64+0x86/0x230
[   34.588589]  kunit_try_run_case+0x1a5/0x480
[   34.588661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.588729]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.588801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.588864]  ? __kthread_parkme+0x82/0x180
[   34.588927]  ? preempt_count_sub+0x50/0x80
[   34.588995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.589068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.589142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.589211]  kthread+0x337/0x6f0
[   34.589271]  ? trace_preempt_on+0x20/0xc0
[   34.589339]  ? __pfx_kthread+0x10/0x10
[   34.589402]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.589468]  ? calculate_sigpending+0x7b/0xa0
[   34.589556]  ? __pfx_kthread+0x10/0x10
[   34.589621]  ret_from_fork+0x116/0x1d0
[   34.589671]  ? __pfx_kthread+0x10/0x10
[   34.589725]  ret_from_fork_asm+0x1a/0x30
[   34.589794]  </TASK>
[   34.589820] 
[   34.602727] Allocated by task 295:
[   34.603177]  kasan_save_stack+0x45/0x70
[   34.603672]  kasan_save_track+0x18/0x40
[   34.604131]  kasan_save_alloc_info+0x3b/0x50
[   34.604653]  __kasan_kmalloc+0xb7/0xc0
[   34.605082]  __kmalloc_cache_noprof+0x189/0x420
[   34.605551]  kasan_atomics+0x95/0x310
[   34.605986]  kunit_try_run_case+0x1a5/0x480
[   34.606317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.606710]  kthread+0x337/0x6f0
[   34.607001]  ret_from_fork+0x116/0x1d0
[   34.607298]  ret_from_fork_asm+0x1a/0x30
[   34.607755] 
[   34.607984] The buggy address belongs to the object at ffff888102daa080
[   34.607984]  which belongs to the cache kmalloc-64 of size 64
[   34.609201] The buggy address is located 0 bytes to the right of
[   34.609201]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.610717] 
[   34.610937] The buggy address belongs to the physical page:
[   34.611429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.612062] flags: 0x200000000000000(node=0|zone=2)
[   34.612354] page_type: f5(slab)
[   34.612589] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.613332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.614064] page dumped because: kasan: bad access detected
[   34.614645] 
[   34.614838] Memory state around the buggy address:
[   34.615101]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.615440]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.617569] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.618660]                                      ^
[   34.619070]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.619628]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.620317] ==================================================================
[   33.985364] ==================================================================
[   33.985954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   33.986781] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.987384] 
[   33.987683] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.987889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.987961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.988043] Call Trace:
[   33.988091]  <TASK>
[   33.988132]  dump_stack_lvl+0x73/0xb0
[   33.988217]  print_report+0xd1/0x650
[   33.988284]  ? __virt_addr_valid+0x1db/0x2d0
[   33.988351]  ? kasan_atomics_helper+0x164f/0x5450
[   33.988415]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.988492]  ? kasan_atomics_helper+0x164f/0x5450
[   33.988567]  kasan_report+0x141/0x180
[   33.988670]  ? kasan_atomics_helper+0x164f/0x5450
[   33.988747]  kasan_check_range+0x10c/0x1c0
[   33.988811]  __kasan_check_write+0x18/0x20
[   33.988875]  kasan_atomics_helper+0x164f/0x5450
[   33.989001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.989067]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.989134]  ? kasan_atomics+0x152/0x310
[   33.989246]  kasan_atomics+0x1dc/0x310
[   33.989310]  ? __pfx_kasan_atomics+0x10/0x10
[   33.989377]  ? __pfx_read_tsc+0x10/0x10
[   33.989432]  ? ktime_get_ts64+0x86/0x230
[   33.989471]  kunit_try_run_case+0x1a5/0x480
[   33.989508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.989562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.989601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.989658]  ? __kthread_parkme+0x82/0x180
[   33.989694]  ? preempt_count_sub+0x50/0x80
[   33.989728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.989762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.989797]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.989831]  kthread+0x337/0x6f0
[   33.989859]  ? trace_preempt_on+0x20/0xc0
[   33.989894]  ? __pfx_kthread+0x10/0x10
[   33.989923]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.989955]  ? calculate_sigpending+0x7b/0xa0
[   33.989988]  ? __pfx_kthread+0x10/0x10
[   33.990017]  ret_from_fork+0x116/0x1d0
[   33.990045]  ? __pfx_kthread+0x10/0x10
[   33.990074]  ret_from_fork_asm+0x1a/0x30
[   33.990115]  </TASK>
[   33.990131] 
[   34.002442] Allocated by task 295:
[   34.002851]  kasan_save_stack+0x45/0x70
[   34.003317]  kasan_save_track+0x18/0x40
[   34.003600]  kasan_save_alloc_info+0x3b/0x50
[   34.004100]  __kasan_kmalloc+0xb7/0xc0
[   34.004533]  __kmalloc_cache_noprof+0x189/0x420
[   34.005080]  kasan_atomics+0x95/0x310
[   34.005489]  kunit_try_run_case+0x1a5/0x480
[   34.005931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.006414]  kthread+0x337/0x6f0
[   34.006687]  ret_from_fork+0x116/0x1d0
[   34.007187]  ret_from_fork_asm+0x1a/0x30
[   34.007628] 
[   34.007838] The buggy address belongs to the object at ffff888102daa080
[   34.007838]  which belongs to the cache kmalloc-64 of size 64
[   34.008385] The buggy address is located 0 bytes to the right of
[   34.008385]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.009400] 
[   34.009635] The buggy address belongs to the physical page:
[   34.010419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.011137] flags: 0x200000000000000(node=0|zone=2)
[   34.011607] page_type: f5(slab)
[   34.011843] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.013056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.013703] page dumped because: kasan: bad access detected
[   34.013990] 
[   34.014118] Memory state around the buggy address:
[   34.015090]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.016125]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.017056] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.017451]                                      ^
[   34.017959]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.018330]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.018991] ==================================================================
[   34.515306] ==================================================================
[   34.516896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   34.517484] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.517985] 
[   34.518166] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.518281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.518332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.518403] Call Trace:
[   34.518450]  <TASK>
[   34.518495]  dump_stack_lvl+0x73/0xb0
[   34.518595]  print_report+0xd1/0x650
[   34.518698]  ? __virt_addr_valid+0x1db/0x2d0
[   34.518767]  ? kasan_atomics_helper+0x1f43/0x5450
[   34.518824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.518895]  ? kasan_atomics_helper+0x1f43/0x5450
[   34.518966]  kasan_report+0x141/0x180
[   34.519045]  ? kasan_atomics_helper+0x1f43/0x5450
[   34.519117]  kasan_check_range+0x10c/0x1c0
[   34.519184]  __kasan_check_write+0x18/0x20
[   34.519258]  kasan_atomics_helper+0x1f43/0x5450
[   34.519338]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.519405]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.519460]  ? kasan_atomics+0x152/0x310
[   34.519500]  kasan_atomics+0x1dc/0x310
[   34.519533]  ? __pfx_kasan_atomics+0x10/0x10
[   34.519604]  ? __pfx_read_tsc+0x10/0x10
[   34.519703]  ? ktime_get_ts64+0x86/0x230
[   34.519781]  kunit_try_run_case+0x1a5/0x480
[   34.519883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.519939]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.520009]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.520089]  ? __kthread_parkme+0x82/0x180
[   34.520156]  ? preempt_count_sub+0x50/0x80
[   34.520222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.520288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.520329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.520364]  kthread+0x337/0x6f0
[   34.520394]  ? trace_preempt_on+0x20/0xc0
[   34.520428]  ? __pfx_kthread+0x10/0x10
[   34.520458]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.520490]  ? calculate_sigpending+0x7b/0xa0
[   34.520526]  ? __pfx_kthread+0x10/0x10
[   34.520580]  ret_from_fork+0x116/0x1d0
[   34.520608]  ? __pfx_kthread+0x10/0x10
[   34.520662]  ret_from_fork_asm+0x1a/0x30
[   34.520707]  </TASK>
[   34.520723] 
[   34.535705] Allocated by task 295:
[   34.536143]  kasan_save_stack+0x45/0x70
[   34.536741]  kasan_save_track+0x18/0x40
[   34.537066]  kasan_save_alloc_info+0x3b/0x50
[   34.537503]  __kasan_kmalloc+0xb7/0xc0
[   34.538047]  __kmalloc_cache_noprof+0x189/0x420
[   34.538606]  kasan_atomics+0x95/0x310
[   34.538846]  kunit_try_run_case+0x1a5/0x480
[   34.539370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.539951]  kthread+0x337/0x6f0
[   34.540372]  ret_from_fork+0x116/0x1d0
[   34.540815]  ret_from_fork_asm+0x1a/0x30
[   34.541238] 
[   34.541376] The buggy address belongs to the object at ffff888102daa080
[   34.541376]  which belongs to the cache kmalloc-64 of size 64
[   34.542232] The buggy address is located 0 bytes to the right of
[   34.542232]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.543831] 
[   34.544107] The buggy address belongs to the physical page:
[   34.544731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.545110] flags: 0x200000000000000(node=0|zone=2)
[   34.545572] page_type: f5(slab)
[   34.546006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.546762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.547226] page dumped because: kasan: bad access detected
[   34.547691] 
[   34.548092] Memory state around the buggy address:
[   34.548454]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.549261]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.549596] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.550563]                                      ^
[   34.551100]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.551594]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.552089] ==================================================================
[   33.561342] ==================================================================
[   33.561856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   33.562433] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.563322] 
[   33.563612] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.563765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.563801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.563867] Call Trace:
[   33.563923]  <TASK>
[   33.563984]  dump_stack_lvl+0x73/0xb0
[   33.564068]  print_report+0xd1/0x650
[   33.564134]  ? __virt_addr_valid+0x1db/0x2d0
[   33.564204]  ? kasan_atomics_helper+0x1148/0x5450
[   33.564261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.564329]  ? kasan_atomics_helper+0x1148/0x5450
[   33.564386]  kasan_report+0x141/0x180
[   33.564443]  ? kasan_atomics_helper+0x1148/0x5450
[   33.564512]  kasan_check_range+0x10c/0x1c0
[   33.564603]  __kasan_check_write+0x18/0x20
[   33.564712]  kasan_atomics_helper+0x1148/0x5450
[   33.564776]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.564838]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.564899]  ? kasan_atomics+0x152/0x310
[   33.564977]  kasan_atomics+0x1dc/0x310
[   33.565062]  ? __pfx_kasan_atomics+0x10/0x10
[   33.565115]  ? __pfx_read_tsc+0x10/0x10
[   33.565151]  ? ktime_get_ts64+0x86/0x230
[   33.565189]  kunit_try_run_case+0x1a5/0x480
[   33.565226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.565258]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.565294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.565328]  ? __kthread_parkme+0x82/0x180
[   33.565357]  ? preempt_count_sub+0x50/0x80
[   33.565389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.565422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.565455]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.565488]  kthread+0x337/0x6f0
[   33.565515]  ? trace_preempt_on+0x20/0xc0
[   33.565569]  ? __pfx_kthread+0x10/0x10
[   33.565600]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.565651]  ? calculate_sigpending+0x7b/0xa0
[   33.565706]  ? __pfx_kthread+0x10/0x10
[   33.565738]  ret_from_fork+0x116/0x1d0
[   33.565766]  ? __pfx_kthread+0x10/0x10
[   33.565795]  ret_from_fork_asm+0x1a/0x30
[   33.565838]  </TASK>
[   33.565854] 
[   33.578745] Allocated by task 295:
[   33.579166]  kasan_save_stack+0x45/0x70
[   33.579619]  kasan_save_track+0x18/0x40
[   33.579990]  kasan_save_alloc_info+0x3b/0x50
[   33.580428]  __kasan_kmalloc+0xb7/0xc0
[   33.580877]  __kmalloc_cache_noprof+0x189/0x420
[   33.581161]  kasan_atomics+0x95/0x310
[   33.581584]  kunit_try_run_case+0x1a5/0x480
[   33.582032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.582458]  kthread+0x337/0x6f0
[   33.582804]  ret_from_fork+0x116/0x1d0
[   33.583231]  ret_from_fork_asm+0x1a/0x30
[   33.583694] 
[   33.583896] The buggy address belongs to the object at ffff888102daa080
[   33.583896]  which belongs to the cache kmalloc-64 of size 64
[   33.584748] The buggy address is located 0 bytes to the right of
[   33.584748]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.585376] 
[   33.585523] The buggy address belongs to the physical page:
[   33.585820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.586201] flags: 0x200000000000000(node=0|zone=2)
[   33.586554] page_type: f5(slab)
[   33.586990] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.587814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.588893] page dumped because: kasan: bad access detected
[   33.589399] 
[   33.589616] Memory state around the buggy address:
[   33.590066]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.590785]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.591335] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.591858]                                      ^
[   33.592291]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.592940]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.593444] ==================================================================
[   32.808463] ==================================================================
[   32.809248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   32.809984] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.810562] 
[   32.810873] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.811012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.811068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.811120] Call Trace:
[   32.811163]  <TASK>
[   32.811206]  dump_stack_lvl+0x73/0xb0
[   32.811306]  print_report+0xd1/0x650
[   32.811374]  ? __virt_addr_valid+0x1db/0x2d0
[   32.811440]  ? kasan_atomics_helper+0x565/0x5450
[   32.811500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.811592]  ? kasan_atomics_helper+0x565/0x5450
[   32.811688]  kasan_report+0x141/0x180
[   32.811750]  ? kasan_atomics_helper+0x565/0x5450
[   32.811861]  kasan_check_range+0x10c/0x1c0
[   32.811940]  __kasan_check_write+0x18/0x20
[   32.812007]  kasan_atomics_helper+0x565/0x5450
[   32.812074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.812140]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.812204]  ? kasan_atomics+0x152/0x310
[   32.812301]  kasan_atomics+0x1dc/0x310
[   32.812366]  ? __pfx_kasan_atomics+0x10/0x10
[   32.812427]  ? __pfx_read_tsc+0x10/0x10
[   32.812488]  ? ktime_get_ts64+0x86/0x230
[   32.812567]  kunit_try_run_case+0x1a5/0x480
[   32.812608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.812679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.812720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.812756]  ? __kthread_parkme+0x82/0x180
[   32.812786]  ? preempt_count_sub+0x50/0x80
[   32.812819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.812853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.812887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.812920]  kthread+0x337/0x6f0
[   32.812949]  ? trace_preempt_on+0x20/0xc0
[   32.812981]  ? __pfx_kthread+0x10/0x10
[   32.813011]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.813043]  ? calculate_sigpending+0x7b/0xa0
[   32.813076]  ? __pfx_kthread+0x10/0x10
[   32.813105]  ret_from_fork+0x116/0x1d0
[   32.813132]  ? __pfx_kthread+0x10/0x10
[   32.813161]  ret_from_fork_asm+0x1a/0x30
[   32.813202]  </TASK>
[   32.813219] 
[   32.827558] Allocated by task 295:
[   32.827851]  kasan_save_stack+0x45/0x70
[   32.828132]  kasan_save_track+0x18/0x40
[   32.828380]  kasan_save_alloc_info+0x3b/0x50
[   32.828864]  __kasan_kmalloc+0xb7/0xc0
[   32.829172]  __kmalloc_cache_noprof+0x189/0x420
[   32.829490]  kasan_atomics+0x95/0x310
[   32.829865]  kunit_try_run_case+0x1a5/0x480
[   32.830230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.830797]  kthread+0x337/0x6f0
[   32.831074]  ret_from_fork+0x116/0x1d0
[   32.831454]  ret_from_fork_asm+0x1a/0x30
[   32.831809] 
[   32.832024] The buggy address belongs to the object at ffff888102daa080
[   32.832024]  which belongs to the cache kmalloc-64 of size 64
[   32.832668] The buggy address is located 0 bytes to the right of
[   32.832668]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.833710] 
[   32.833871] The buggy address belongs to the physical page:
[   32.834154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.834903] flags: 0x200000000000000(node=0|zone=2)
[   32.835358] page_type: f5(slab)
[   32.835599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.836298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.836897] page dumped because: kasan: bad access detected
[   32.837361] 
[   32.837563] Memory state around the buggy address:
[   32.837977]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.838391]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.838982] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.839445]                                      ^
[   32.839854]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.840253]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.840911] ==================================================================
[   33.594988] ==================================================================
[   33.595695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   33.596332] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.596841] 
[   33.597174] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.597313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.597352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.597409] Call Trace:
[   33.597456]  <TASK>
[   33.597502]  dump_stack_lvl+0x73/0xb0
[   33.597603]  print_report+0xd1/0x650
[   33.597662]  ? __virt_addr_valid+0x1db/0x2d0
[   33.597726]  ? kasan_atomics_helper+0x4a02/0x5450
[   33.597779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.597848]  ? kasan_atomics_helper+0x4a02/0x5450
[   33.597911]  kasan_report+0x141/0x180
[   33.597978]  ? kasan_atomics_helper+0x4a02/0x5450
[   33.598054]  __asan_report_load4_noabort+0x18/0x20
[   33.598137]  kasan_atomics_helper+0x4a02/0x5450
[   33.598221]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.598287]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.598358]  ? kasan_atomics+0x152/0x310
[   33.598433]  kasan_atomics+0x1dc/0x310
[   33.598499]  ? __pfx_kasan_atomics+0x10/0x10
[   33.598585]  ? __pfx_read_tsc+0x10/0x10
[   33.598650]  ? ktime_get_ts64+0x86/0x230
[   33.598721]  kunit_try_run_case+0x1a5/0x480
[   33.598793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.598858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.598943]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.599009]  ? __kthread_parkme+0x82/0x180
[   33.599076]  ? preempt_count_sub+0x50/0x80
[   33.599157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.599228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.599293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.599352]  kthread+0x337/0x6f0
[   33.599397]  ? trace_preempt_on+0x20/0xc0
[   33.599462]  ? __pfx_kthread+0x10/0x10
[   33.599517]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.599605]  ? calculate_sigpending+0x7b/0xa0
[   33.599686]  ? __pfx_kthread+0x10/0x10
[   33.599748]  ret_from_fork+0x116/0x1d0
[   33.599800]  ? __pfx_kthread+0x10/0x10
[   33.599872]  ret_from_fork_asm+0x1a/0x30
[   33.599962]  </TASK>
[   33.600009] 
[   33.612592] Allocated by task 295:
[   33.612993]  kasan_save_stack+0x45/0x70
[   33.613438]  kasan_save_track+0x18/0x40
[   33.613806]  kasan_save_alloc_info+0x3b/0x50
[   33.614083]  __kasan_kmalloc+0xb7/0xc0
[   33.614305]  __kmalloc_cache_noprof+0x189/0x420
[   33.614604]  kasan_atomics+0x95/0x310
[   33.615255]  kunit_try_run_case+0x1a5/0x480
[   33.615754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.616286]  kthread+0x337/0x6f0
[   33.616690]  ret_from_fork+0x116/0x1d0
[   33.617103]  ret_from_fork_asm+0x1a/0x30
[   33.617568] 
[   33.617758] The buggy address belongs to the object at ffff888102daa080
[   33.617758]  which belongs to the cache kmalloc-64 of size 64
[   33.618408] The buggy address is located 0 bytes to the right of
[   33.618408]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.619294] 
[   33.619567] The buggy address belongs to the physical page:
[   33.620209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.620973] flags: 0x200000000000000(node=0|zone=2)
[   33.621361] page_type: f5(slab)
[   33.621763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.622157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.622521] page dumped because: kasan: bad access detected
[   33.624420] 
[   33.624641] Memory state around the buggy address:
[   33.625147]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.625899]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.626772] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.627326]                                      ^
[   33.627662]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.628459]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.629030] ==================================================================
[   32.588891] ==================================================================
[   32.589871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   32.590671] Read of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.591222] 
[   32.591710] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.591838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.591873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.591967] Call Trace:
[   32.592013]  <TASK>
[   32.592057]  dump_stack_lvl+0x73/0xb0
[   32.592129]  print_report+0xd1/0x650
[   32.592188]  ? __virt_addr_valid+0x1db/0x2d0
[   32.592238]  ? kasan_atomics_helper+0x4b88/0x5450
[   32.592269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.592305]  ? kasan_atomics_helper+0x4b88/0x5450
[   32.592334]  kasan_report+0x141/0x180
[   32.592364]  ? kasan_atomics_helper+0x4b88/0x5450
[   32.592398]  __asan_report_load4_noabort+0x18/0x20
[   32.592430]  kasan_atomics_helper+0x4b88/0x5450
[   32.592459]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.592488]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.592520]  ? kasan_atomics+0x152/0x310
[   32.592577]  kasan_atomics+0x1dc/0x310
[   32.592608]  ? __pfx_kasan_atomics+0x10/0x10
[   32.592654]  ? __pfx_read_tsc+0x10/0x10
[   32.592689]  ? ktime_get_ts64+0x86/0x230
[   32.592731]  kunit_try_run_case+0x1a5/0x480
[   32.592766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.592806]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.592841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.592882]  ? __kthread_parkme+0x82/0x180
[   32.592911]  ? preempt_count_sub+0x50/0x80
[   32.592948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.592985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.593043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.593088]  kthread+0x337/0x6f0
[   32.593118]  ? trace_preempt_on+0x20/0xc0
[   32.593155]  ? __pfx_kthread+0x10/0x10
[   32.593183]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.593214]  ? calculate_sigpending+0x7b/0xa0
[   32.593246]  ? __pfx_kthread+0x10/0x10
[   32.593274]  ret_from_fork+0x116/0x1d0
[   32.593300]  ? __pfx_kthread+0x10/0x10
[   32.593327]  ret_from_fork_asm+0x1a/0x30
[   32.593366]  </TASK>
[   32.593380] 
[   32.610251] Allocated by task 295:
[   32.610865]  kasan_save_stack+0x45/0x70
[   32.611316]  kasan_save_track+0x18/0x40
[   32.611904]  kasan_save_alloc_info+0x3b/0x50
[   32.612146]  __kasan_kmalloc+0xb7/0xc0
[   32.612618]  __kmalloc_cache_noprof+0x189/0x420
[   32.613342]  kasan_atomics+0x95/0x310
[   32.613933]  kunit_try_run_case+0x1a5/0x480
[   32.614478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.614839]  kthread+0x337/0x6f0
[   32.615212]  ret_from_fork+0x116/0x1d0
[   32.615634]  ret_from_fork_asm+0x1a/0x30
[   32.616263] 
[   32.616410] The buggy address belongs to the object at ffff888102daa080
[   32.616410]  which belongs to the cache kmalloc-64 of size 64
[   32.617488] The buggy address is located 0 bytes to the right of
[   32.617488]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.618753] 
[   32.618968] The buggy address belongs to the physical page:
[   32.619465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.620274] flags: 0x200000000000000(node=0|zone=2)
[   32.620704] page_type: f5(slab)
[   32.621044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.621653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.622230] page dumped because: kasan: bad access detected
[   32.622513] 
[   32.622801] Memory state around the buggy address:
[   32.623327]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.623990]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.624438] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.625115]                                      ^
[   32.625616]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.626221]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.626871] ==================================================================
[   34.802390] ==================================================================
[   34.802954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   34.803654] Write of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.804397] 
[   34.804765] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.804892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.804925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.805024] Call Trace:
[   34.805071]  <TASK>
[   34.805118]  dump_stack_lvl+0x73/0xb0
[   34.805250]  print_report+0xd1/0x650
[   34.805319]  ? __virt_addr_valid+0x1db/0x2d0
[   34.805388]  ? kasan_atomics_helper+0x224c/0x5450
[   34.805449]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.805518]  ? kasan_atomics_helper+0x224c/0x5450
[   34.805686]  kasan_report+0x141/0x180
[   34.805755]  ? kasan_atomics_helper+0x224c/0x5450
[   34.805821]  kasan_check_range+0x10c/0x1c0
[   34.805864]  __kasan_check_write+0x18/0x20
[   34.805901]  kasan_atomics_helper+0x224c/0x5450
[   34.805933]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.805964]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.806000]  ? kasan_atomics+0x152/0x310
[   34.806036]  kasan_atomics+0x1dc/0x310
[   34.806067]  ? __pfx_kasan_atomics+0x10/0x10
[   34.806100]  ? __pfx_read_tsc+0x10/0x10
[   34.806131]  ? ktime_get_ts64+0x86/0x230
[   34.806164]  kunit_try_run_case+0x1a5/0x480
[   34.806199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.806230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.806265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.806300]  ? __kthread_parkme+0x82/0x180
[   34.806329]  ? preempt_count_sub+0x50/0x80
[   34.806361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.806394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.806427]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.806460]  kthread+0x337/0x6f0
[   34.806488]  ? trace_preempt_on+0x20/0xc0
[   34.806521]  ? __pfx_kthread+0x10/0x10
[   34.806576]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.806609]  ? calculate_sigpending+0x7b/0xa0
[   34.806684]  ? __pfx_kthread+0x10/0x10
[   34.806716]  ret_from_fork+0x116/0x1d0
[   34.806744]  ? __pfx_kthread+0x10/0x10
[   34.806774]  ret_from_fork_asm+0x1a/0x30
[   34.806816]  </TASK>
[   34.806833] 
[   34.820318] Allocated by task 295:
[   34.820801]  kasan_save_stack+0x45/0x70
[   34.821105]  kasan_save_track+0x18/0x40
[   34.821343]  kasan_save_alloc_info+0x3b/0x50
[   34.821670]  __kasan_kmalloc+0xb7/0xc0
[   34.822140]  __kmalloc_cache_noprof+0x189/0x420
[   34.822653]  kasan_atomics+0x95/0x310
[   34.823095]  kunit_try_run_case+0x1a5/0x480
[   34.823582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.824148]  kthread+0x337/0x6f0
[   34.824573]  ret_from_fork+0x116/0x1d0
[   34.825023]  ret_from_fork_asm+0x1a/0x30
[   34.825488] 
[   34.825774] The buggy address belongs to the object at ffff888102daa080
[   34.825774]  which belongs to the cache kmalloc-64 of size 64
[   34.826672] The buggy address is located 0 bytes to the right of
[   34.826672]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.827470] 
[   34.827717] The buggy address belongs to the physical page:
[   34.828333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.829056] flags: 0x200000000000000(node=0|zone=2)
[   34.829527] page_type: f5(slab)
[   34.829935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.830419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.830800] page dumped because: kasan: bad access detected
[   34.831257] 
[   34.831470] Memory state around the buggy address:
[   34.831941]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.832704]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.833319] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.833912]                                      ^
[   34.834183]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.834513]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.836281] ==================================================================
[   32.880256] ==================================================================
[   32.880846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   32.881413] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   32.882013] 
[   32.882254] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   32.882374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.882411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.882465] Call Trace:
[   32.882508]  <TASK>
[   32.882576]  dump_stack_lvl+0x73/0xb0
[   32.882710]  print_report+0xd1/0x650
[   32.882774]  ? __virt_addr_valid+0x1db/0x2d0
[   32.882840]  ? kasan_atomics_helper+0x697/0x5450
[   32.882903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   32.882975]  ? kasan_atomics_helper+0x697/0x5450
[   32.883032]  kasan_report+0x141/0x180
[   32.883094]  ? kasan_atomics_helper+0x697/0x5450
[   32.883173]  kasan_check_range+0x10c/0x1c0
[   32.883255]  __kasan_check_write+0x18/0x20
[   32.883320]  kasan_atomics_helper+0x697/0x5450
[   32.883379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   32.883440]  ? __kmalloc_cache_noprof+0x189/0x420
[   32.883514]  ? kasan_atomics+0x152/0x310
[   32.883606]  kasan_atomics+0x1dc/0x310
[   32.883703]  ? __pfx_kasan_atomics+0x10/0x10
[   32.883767]  ? __pfx_read_tsc+0x10/0x10
[   32.883848]  ? ktime_get_ts64+0x86/0x230
[   32.883935]  kunit_try_run_case+0x1a5/0x480
[   32.884006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.884099]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   32.884166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   32.884218]  ? __kthread_parkme+0x82/0x180
[   32.884264]  ? preempt_count_sub+0x50/0x80
[   32.884315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   32.884368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.884419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   32.884468]  kthread+0x337/0x6f0
[   32.884511]  ? trace_preempt_on+0x20/0xc0
[   32.884582]  ? __pfx_kthread+0x10/0x10
[   32.884614]  ? _raw_spin_unlock_irq+0x47/0x80
[   32.884663]  ? calculate_sigpending+0x7b/0xa0
[   32.884700]  ? __pfx_kthread+0x10/0x10
[   32.884731]  ret_from_fork+0x116/0x1d0
[   32.884760]  ? __pfx_kthread+0x10/0x10
[   32.884789]  ret_from_fork_asm+0x1a/0x30
[   32.884830]  </TASK>
[   32.884846] 
[   32.900165] Allocated by task 295:
[   32.900616]  kasan_save_stack+0x45/0x70
[   32.901132]  kasan_save_track+0x18/0x40
[   32.901596]  kasan_save_alloc_info+0x3b/0x50
[   32.902128]  __kasan_kmalloc+0xb7/0xc0
[   32.902340]  __kmalloc_cache_noprof+0x189/0x420
[   32.902985]  kasan_atomics+0x95/0x310
[   32.903442]  kunit_try_run_case+0x1a5/0x480
[   32.903939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   32.904361]  kthread+0x337/0x6f0
[   32.904818]  ret_from_fork+0x116/0x1d0
[   32.905267]  ret_from_fork_asm+0x1a/0x30
[   32.905785] 
[   32.906048] The buggy address belongs to the object at ffff888102daa080
[   32.906048]  which belongs to the cache kmalloc-64 of size 64
[   32.906848] The buggy address is located 0 bytes to the right of
[   32.906848]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   32.907212] 
[   32.907286] The buggy address belongs to the physical page:
[   32.907436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   32.908117] flags: 0x200000000000000(node=0|zone=2)
[   32.908618] page_type: f5(slab)
[   32.908981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   32.909641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.910009] page dumped because: kasan: bad access detected
[   32.910497] 
[   32.910768] Memory state around the buggy address:
[   32.911194]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.911569]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.912239] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.912875]                                      ^
[   32.913406]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.913948]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.914654] ==================================================================
[   33.024765] ==================================================================
[   33.025374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   33.025988] Write of size 4 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   33.026585] 
[   33.026882] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   33.027000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.027033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   33.027125] Call Trace:
[   33.027204]  <TASK>
[   33.027251]  dump_stack_lvl+0x73/0xb0
[   33.027342]  print_report+0xd1/0x650
[   33.027406]  ? __virt_addr_valid+0x1db/0x2d0
[   33.027493]  ? kasan_atomics_helper+0x8f9/0x5450
[   33.027587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.027713]  ? kasan_atomics_helper+0x8f9/0x5450
[   33.027794]  kasan_report+0x141/0x180
[   33.027874]  ? kasan_atomics_helper+0x8f9/0x5450
[   33.027948]  kasan_check_range+0x10c/0x1c0
[   33.028025]  __kasan_check_write+0x18/0x20
[   33.028112]  kasan_atomics_helper+0x8f9/0x5450
[   33.028180]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   33.028246]  ? __kmalloc_cache_noprof+0x189/0x420
[   33.028316]  ? kasan_atomics+0x152/0x310
[   33.028392]  kasan_atomics+0x1dc/0x310
[   33.028456]  ? __pfx_kasan_atomics+0x10/0x10
[   33.028526]  ? __pfx_read_tsc+0x10/0x10
[   33.028607]  ? ktime_get_ts64+0x86/0x230
[   33.028701]  kunit_try_run_case+0x1a5/0x480
[   33.028741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.028774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.028811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.028845]  ? __kthread_parkme+0x82/0x180
[   33.028874]  ? preempt_count_sub+0x50/0x80
[   33.028907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.028940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.028973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.029007]  kthread+0x337/0x6f0
[   33.029035]  ? trace_preempt_on+0x20/0xc0
[   33.029068]  ? __pfx_kthread+0x10/0x10
[   33.029098]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.029129]  ? calculate_sigpending+0x7b/0xa0
[   33.029162]  ? __pfx_kthread+0x10/0x10
[   33.029192]  ret_from_fork+0x116/0x1d0
[   33.029219]  ? __pfx_kthread+0x10/0x10
[   33.029248]  ret_from_fork_asm+0x1a/0x30
[   33.029288]  </TASK>
[   33.029305] 
[   33.044065] Allocated by task 295:
[   33.044556]  kasan_save_stack+0x45/0x70
[   33.045049]  kasan_save_track+0x18/0x40
[   33.045449]  kasan_save_alloc_info+0x3b/0x50
[   33.045922]  __kasan_kmalloc+0xb7/0xc0
[   33.046176]  __kmalloc_cache_noprof+0x189/0x420
[   33.046446]  kasan_atomics+0x95/0x310
[   33.046913]  kunit_try_run_case+0x1a5/0x480
[   33.047462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   33.048072]  kthread+0x337/0x6f0
[   33.048439]  ret_from_fork+0x116/0x1d0
[   33.048931]  ret_from_fork_asm+0x1a/0x30
[   33.049379] 
[   33.049614] The buggy address belongs to the object at ffff888102daa080
[   33.049614]  which belongs to the cache kmalloc-64 of size 64
[   33.050195] The buggy address is located 0 bytes to the right of
[   33.050195]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   33.051415] 
[   33.051730] The buggy address belongs to the physical page:
[   33.052300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   33.052922] flags: 0x200000000000000(node=0|zone=2)
[   33.053407] page_type: f5(slab)
[   33.053858] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   33.054512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.055284] page dumped because: kasan: bad access detected
[   33.055790] 
[   33.056045] Memory state around the buggy address:
[   33.056576]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.057210]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.057885] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.058456]                                      ^
[   33.058797]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.059431]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.059997] ==================================================================
[   34.693437] ==================================================================
[   34.693948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   34.694498] Read of size 8 at addr ffff888102daa0b0 by task kunit_try_catch/295
[   34.695213] 
[   34.695472] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   34.695609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.695670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.695713] Call Trace:
[   34.695774]  <TASK>
[   34.695815]  dump_stack_lvl+0x73/0xb0
[   34.695893]  print_report+0xd1/0x650
[   34.695942]  ? __virt_addr_valid+0x1db/0x2d0
[   34.695994]  ? kasan_atomics_helper+0x4fb2/0x5450
[   34.696039]  ? kasan_complete_mode_report_info+0x2a/0x200
[   34.696136]  ? kasan_atomics_helper+0x4fb2/0x5450
[   34.696197]  kasan_report+0x141/0x180
[   34.696306]  ? kasan_atomics_helper+0x4fb2/0x5450
[   34.696436]  __asan_report_load8_noabort+0x18/0x20
[   34.696530]  kasan_atomics_helper+0x4fb2/0x5450
[   34.696614]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   34.696714]  ? __kmalloc_cache_noprof+0x189/0x420
[   34.696784]  ? kasan_atomics+0x152/0x310
[   34.696890]  kasan_atomics+0x1dc/0x310
[   34.696959]  ? __pfx_kasan_atomics+0x10/0x10
[   34.697035]  ? __pfx_read_tsc+0x10/0x10
[   34.697115]  ? ktime_get_ts64+0x86/0x230
[   34.697181]  kunit_try_run_case+0x1a5/0x480
[   34.697246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.697310]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   34.697378]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   34.697435]  ? __kthread_parkme+0x82/0x180
[   34.697484]  ? preempt_count_sub+0x50/0x80
[   34.697587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.697680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.697753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.697820]  kthread+0x337/0x6f0
[   34.697937]  ? trace_preempt_on+0x20/0xc0
[   34.698033]  ? __pfx_kthread+0x10/0x10
[   34.698093]  ? _raw_spin_unlock_irq+0x47/0x80
[   34.698195]  ? calculate_sigpending+0x7b/0xa0
[   34.698279]  ? __pfx_kthread+0x10/0x10
[   34.698343]  ret_from_fork+0x116/0x1d0
[   34.698394]  ? __pfx_kthread+0x10/0x10
[   34.698438]  ret_from_fork_asm+0x1a/0x30
[   34.698482]  </TASK>
[   34.698498] 
[   34.713060] Allocated by task 295:
[   34.713328]  kasan_save_stack+0x45/0x70
[   34.713786]  kasan_save_track+0x18/0x40
[   34.714435]  kasan_save_alloc_info+0x3b/0x50
[   34.715021]  __kasan_kmalloc+0xb7/0xc0
[   34.715429]  __kmalloc_cache_noprof+0x189/0x420
[   34.716075]  kasan_atomics+0x95/0x310
[   34.716477]  kunit_try_run_case+0x1a5/0x480
[   34.717016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   34.717683]  kthread+0x337/0x6f0
[   34.718172]  ret_from_fork+0x116/0x1d0
[   34.718617]  ret_from_fork_asm+0x1a/0x30
[   34.718963] 
[   34.719245] The buggy address belongs to the object at ffff888102daa080
[   34.719245]  which belongs to the cache kmalloc-64 of size 64
[   34.720255] The buggy address is located 0 bytes to the right of
[   34.720255]  allocated 48-byte region [ffff888102daa080, ffff888102daa0b0)
[   34.721278] 
[   34.721502] The buggy address belongs to the physical page:
[   34.722084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102daa
[   34.722745] flags: 0x200000000000000(node=0|zone=2)
[   34.723079] page_type: f5(slab)
[   34.723457] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   34.724062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.724810] page dumped because: kasan: bad access detected
[   34.725331] 
[   34.725589] Memory state around the buggy address:
[   34.726001]  ffff888102da9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.726748]  ffff888102daa000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.727253] >ffff888102daa080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.727913]                                      ^
[   34.728343]  ffff888102daa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.728944]  ffff888102daa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.729519] ==================================================================