Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
juno-r2
qemu-arm64
qemu-x86_64

[   67.836201] ==================================================================
[   67.843514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   67.850918] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   67.858320] 
[   67.859846] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   67.859875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.859884] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.859894] Call trace:
[   67.859902]  show_stack+0x20/0x38 (C)
[   67.859919]  dump_stack_lvl+0x8c/0xd0
[   67.859937]  print_report+0x118/0x608
[   67.859955]  kasan_report+0xdc/0x128
[   67.859972]  kasan_check_range+0x100/0x1a8
[   67.859992]  __kasan_check_read+0x20/0x30
[   67.860008]  kasan_atomics_helper+0xdd4/0x4858
[   67.860026]  kasan_atomics+0x198/0x2e0
[   67.860043]  kunit_try_run_case+0x170/0x3f0
[   67.860061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.860081]  kthread+0x328/0x630
[   67.860094]  ret_from_fork+0x10/0x20
[   67.860110] 
[   67.933169] Allocated by task 351:
[   67.936625]  kasan_save_stack+0x3c/0x68
[   67.940523]  kasan_save_track+0x20/0x40
[   67.944420]  kasan_save_alloc_info+0x40/0x58
[   67.948759]  __kasan_kmalloc+0xd4/0xd8
[   67.952568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.957170]  kasan_atomics+0xb8/0x2e0
[   67.960891]  kunit_try_run_case+0x170/0x3f0
[   67.965145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.970704]  kthread+0x328/0x630
[   67.973989]  ret_from_fork+0x10/0x20
[   67.977625] 
[   67.979148] The buggy address belongs to the object at ffff0000934cf200
[   67.979148]  which belongs to the cache kmalloc-64 of size 64
[   67.991629] The buggy address is located 0 bytes to the right of
[   67.991629]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   68.004633] 
[   68.006156] The buggy address belongs to the physical page:
[   68.011803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   68.019903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.026511] page_type: f5(slab)
[   68.029712] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.037550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.045384] page dumped because: kasan: bad access detected
[   68.051031] 
[   68.052554] Memory state around the buggy address:
[   68.057409]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.064722]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.072036] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.079347]                                      ^
[   68.084203]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.091516]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.098827] ==================================================================
[   66.225295] ==================================================================
[   66.232607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   66.240012] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   66.247501] 
[   66.249026] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   66.249055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.249063] Hardware name: Thundercomm Dragonboard 845c (DT)
[   66.249072] Call trace:
[   66.249078]  show_stack+0x20/0x38 (C)
[   66.249096]  dump_stack_lvl+0x8c/0xd0
[   66.249114]  print_report+0x118/0x608
[   66.249132]  kasan_report+0xdc/0x128
[   66.249150]  kasan_check_range+0x100/0x1a8
[   66.249168]  __kasan_check_write+0x20/0x30
[   66.249184]  kasan_atomics_helper+0xc08/0x4858
[   66.249202]  kasan_atomics+0x198/0x2e0
[   66.249219]  kunit_try_run_case+0x170/0x3f0
[   66.249236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.249256]  kthread+0x328/0x630
[   66.249268]  ret_from_fork+0x10/0x20
[   66.249286] 
[   66.322420] Allocated by task 351:
[   66.325876]  kasan_save_stack+0x3c/0x68
[   66.329774]  kasan_save_track+0x20/0x40
[   66.333671]  kasan_save_alloc_info+0x40/0x58
[   66.338008]  __kasan_kmalloc+0xd4/0xd8
[   66.341818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.346420]  kasan_atomics+0xb8/0x2e0
[   66.350142]  kunit_try_run_case+0x170/0x3f0
[   66.354396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.359965]  kthread+0x328/0x630
[   66.363250]  ret_from_fork+0x10/0x20
[   66.366885] 
[   66.368408] The buggy address belongs to the object at ffff0000934cf200
[   66.368408]  which belongs to the cache kmalloc-64 of size 64
[   66.380887] The buggy address is located 0 bytes to the right of
[   66.380887]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   66.393890] 
[   66.395413] The buggy address belongs to the physical page:
[   66.401060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   66.409157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.415764] page_type: f5(slab)
[   66.418963] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.426799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.434633] page dumped because: kasan: bad access detected
[   66.440279] 
[   66.441802] Memory state around the buggy address:
[   66.446658]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.453970]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.461282] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.468593]                                      ^
[   66.473450]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.480763]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.488075] ==================================================================
[   69.720719] ==================================================================
[   69.728033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   69.735439] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   69.742929] 
[   69.744454] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   69.744483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.744490] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.744502] Call trace:
[   69.744507]  show_stack+0x20/0x38 (C)
[   69.744524]  dump_stack_lvl+0x8c/0xd0
[   69.744541]  print_report+0x118/0x608
[   69.744559]  kasan_report+0xdc/0x128
[   69.744577]  kasan_check_range+0x100/0x1a8
[   69.744596]  __kasan_check_write+0x20/0x30
[   69.744611]  kasan_atomics_helper+0xff0/0x4858
[   69.744629]  kasan_atomics+0x198/0x2e0
[   69.744645]  kunit_try_run_case+0x170/0x3f0
[   69.744662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.744682]  kthread+0x328/0x630
[   69.744695]  ret_from_fork+0x10/0x20
[   69.744711] 
[   69.817867] Allocated by task 351:
[   69.821324]  kasan_save_stack+0x3c/0x68
[   69.825224]  kasan_save_track+0x20/0x40
[   69.829121]  kasan_save_alloc_info+0x40/0x58
[   69.833459]  __kasan_kmalloc+0xd4/0xd8
[   69.837268]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.841869]  kasan_atomics+0xb8/0x2e0
[   69.845591]  kunit_try_run_case+0x170/0x3f0
[   69.849845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.855414]  kthread+0x328/0x630
[   69.858700]  ret_from_fork+0x10/0x20
[   69.862335] 
[   69.863857] The buggy address belongs to the object at ffff0000934cf200
[   69.863857]  which belongs to the cache kmalloc-64 of size 64
[   69.876336] The buggy address is located 0 bytes to the right of
[   69.876336]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   69.889339] 
[   69.890862] The buggy address belongs to the physical page:
[   69.896509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   69.904606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.911214] page_type: f5(slab)
[   69.914413] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.922249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.930082] page dumped because: kasan: bad access detected
[   69.935728] 
[   69.937250] Memory state around the buggy address:
[   69.942105]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.949418]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.956731] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.964043]                                      ^
[   69.968899]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.976211]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.983521] ==================================================================
[   63.263223] ==================================================================
[   63.270536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   63.277941] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   63.285433] 
[   63.286958] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   63.286987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.286995] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.287005] Call trace:
[   63.287011]  show_stack+0x20/0x38 (C)
[   63.287028]  dump_stack_lvl+0x8c/0xd0
[   63.287045]  print_report+0x118/0x608
[   63.287062]  kasan_report+0xdc/0x128
[   63.287081]  kasan_check_range+0x100/0x1a8
[   63.287101]  __kasan_check_write+0x20/0x30
[   63.287117]  kasan_atomics_helper+0x7cc/0x4858
[   63.287135]  kasan_atomics+0x198/0x2e0
[   63.287152]  kunit_try_run_case+0x170/0x3f0
[   63.287169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.287189]  kthread+0x328/0x630
[   63.287204]  ret_from_fork+0x10/0x20
[   63.287220] 
[   63.360369] Allocated by task 351:
[   63.363826]  kasan_save_stack+0x3c/0x68
[   63.367724]  kasan_save_track+0x20/0x40
[   63.371621]  kasan_save_alloc_info+0x40/0x58
[   63.375961]  __kasan_kmalloc+0xd4/0xd8
[   63.379771]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.384373]  kasan_atomics+0xb8/0x2e0
[   63.388094]  kunit_try_run_case+0x170/0x3f0
[   63.392348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.397909]  kthread+0x328/0x630
[   63.401196]  ret_from_fork+0x10/0x20
[   63.404831] 
[   63.406354] The buggy address belongs to the object at ffff0000934cf200
[   63.406354]  which belongs to the cache kmalloc-64 of size 64
[   63.418834] The buggy address is located 0 bytes to the right of
[   63.418834]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   63.431840] 
[   63.433363] The buggy address belongs to the physical page:
[   63.439011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   63.447109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.453717] page_type: f5(slab)
[   63.456916] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.464753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.472588] page dumped because: kasan: bad access detected
[   63.478236] 
[   63.479758] Memory state around the buggy address:
[   63.484613]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.491927]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.499240] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.506552]                                      ^
[   63.511408]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.518722]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.526034] ==================================================================
[   62.452663] ==================================================================
[   62.459975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   62.467380] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   62.474868] 
[   62.476393] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   62.476421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.476429] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.476439] Call trace:
[   62.476444]  show_stack+0x20/0x38 (C)
[   62.476461]  dump_stack_lvl+0x8c/0xd0
[   62.476479]  print_report+0x118/0x608
[   62.476497]  kasan_report+0xdc/0x128
[   62.476514]  kasan_check_range+0x100/0x1a8
[   62.476534]  __kasan_check_write+0x20/0x30
[   62.476550]  kasan_atomics_helper+0x684/0x4858
[   62.476568]  kasan_atomics+0x198/0x2e0
[   62.476584]  kunit_try_run_case+0x170/0x3f0
[   62.476601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.476621]  kthread+0x328/0x630
[   62.476634]  ret_from_fork+0x10/0x20
[   62.476650] 
[   62.549805] Allocated by task 351:
[   62.553260]  kasan_save_stack+0x3c/0x68
[   62.557158]  kasan_save_track+0x20/0x40
[   62.561054]  kasan_save_alloc_info+0x40/0x58
[   62.565393]  __kasan_kmalloc+0xd4/0xd8
[   62.569203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.573805]  kasan_atomics+0xb8/0x2e0
[   62.577527]  kunit_try_run_case+0x170/0x3f0
[   62.581780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.587350]  kthread+0x328/0x630
[   62.590636]  ret_from_fork+0x10/0x20
[   62.594271] 
[   62.595793] The buggy address belongs to the object at ffff0000934cf200
[   62.595793]  which belongs to the cache kmalloc-64 of size 64
[   62.608273] The buggy address is located 0 bytes to the right of
[   62.608273]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   62.621277] 
[   62.622800] The buggy address belongs to the physical page:
[   62.628445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   62.636542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.643149] page_type: f5(slab)
[   62.646349] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.654187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.662021] page dumped because: kasan: bad access detected
[   62.667667] 
[   62.669189] Memory state around the buggy address:
[   62.674045]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.681359]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.688672] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.695984]                                      ^
[   62.700840]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.708153]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.715465] ==================================================================
[   69.450536] ==================================================================
[   69.457850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   69.465255] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   69.472746] 
[   69.474270] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   69.474298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.474307] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.474316] Call trace:
[   69.474322]  show_stack+0x20/0x38 (C)
[   69.474339]  dump_stack_lvl+0x8c/0xd0
[   69.474357]  print_report+0x118/0x608
[   69.474375]  kasan_report+0xdc/0x128
[   69.474393]  kasan_check_range+0x100/0x1a8
[   69.474412]  __kasan_check_write+0x20/0x30
[   69.474427]  kasan_atomics_helper+0xf88/0x4858
[   69.474445]  kasan_atomics+0x198/0x2e0
[   69.474462]  kunit_try_run_case+0x170/0x3f0
[   69.474480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.474501]  kthread+0x328/0x630
[   69.474515]  ret_from_fork+0x10/0x20
[   69.474531] 
[   69.547675] Allocated by task 351:
[   69.551131]  kasan_save_stack+0x3c/0x68
[   69.555029]  kasan_save_track+0x20/0x40
[   69.558926]  kasan_save_alloc_info+0x40/0x58
[   69.563265]  __kasan_kmalloc+0xd4/0xd8
[   69.567074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.571676]  kasan_atomics+0xb8/0x2e0
[   69.575398]  kunit_try_run_case+0x170/0x3f0
[   69.579651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.585222]  kthread+0x328/0x630
[   69.588507]  ret_from_fork+0x10/0x20
[   69.592142] 
[   69.593665] The buggy address belongs to the object at ffff0000934cf200
[   69.593665]  which belongs to the cache kmalloc-64 of size 64
[   69.606144] The buggy address is located 0 bytes to the right of
[   69.606144]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   69.619148] 
[   69.620673] The buggy address belongs to the physical page:
[   69.626320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   69.634417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.641025] page_type: f5(slab)
[   69.644225] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.652063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.659897] page dumped because: kasan: bad access detected
[   69.665544] 
[   69.667066] Memory state around the buggy address:
[   69.671922]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.679234]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.686548] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.693858]                                      ^
[   69.698714]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.706026]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.713337] ==================================================================
[   62.993034] ==================================================================
[   63.000347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   63.007751] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   63.015240] 
[   63.016766] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   63.016794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.016802] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.016813] Call trace:
[   63.016819]  show_stack+0x20/0x38 (C)
[   63.016837]  dump_stack_lvl+0x8c/0xd0
[   63.016855]  print_report+0x118/0x608
[   63.016872]  kasan_report+0xdc/0x128
[   63.016891]  kasan_check_range+0x100/0x1a8
[   63.016909]  __kasan_check_write+0x20/0x30
[   63.016924]  kasan_atomics_helper+0x760/0x4858
[   63.016942]  kasan_atomics+0x198/0x2e0
[   63.016959]  kunit_try_run_case+0x170/0x3f0
[   63.016976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.016998]  kthread+0x328/0x630
[   63.017013]  ret_from_fork+0x10/0x20
[   63.017030] 
[   63.090180] Allocated by task 351:
[   63.093637]  kasan_save_stack+0x3c/0x68
[   63.097534]  kasan_save_track+0x20/0x40
[   63.101431]  kasan_save_alloc_info+0x40/0x58
[   63.105769]  __kasan_kmalloc+0xd4/0xd8
[   63.109578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.114180]  kasan_atomics+0xb8/0x2e0
[   63.117902]  kunit_try_run_case+0x170/0x3f0
[   63.122155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.127724]  kthread+0x328/0x630
[   63.131010]  ret_from_fork+0x10/0x20
[   63.134644] 
[   63.136167] The buggy address belongs to the object at ffff0000934cf200
[   63.136167]  which belongs to the cache kmalloc-64 of size 64
[   63.148649] The buggy address is located 0 bytes to the right of
[   63.148649]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   63.161653] 
[   63.163176] The buggy address belongs to the physical page:
[   63.168823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   63.176920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.183529] page_type: f5(slab)
[   63.186728] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.194565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.202398] page dumped because: kasan: bad access detected
[   63.208045] 
[   63.209568] Memory state around the buggy address:
[   63.214423]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.221736]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.229049] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.236359]                                      ^
[   63.241216]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.248529]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.255839] ==================================================================
[   68.106211] ==================================================================
[   68.113524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   68.121017] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   68.128419] 
[   68.129945] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   68.129973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.129982] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.129992] Call trace:
[   68.129997]  show_stack+0x20/0x38 (C)
[   68.130015]  dump_stack_lvl+0x8c/0xd0
[   68.130031]  print_report+0x118/0x608
[   68.130051]  kasan_report+0xdc/0x128
[   68.130069]  __asan_report_load8_noabort+0x20/0x30
[   68.130085]  kasan_atomics_helper+0x3f58/0x4858
[   68.130104]  kasan_atomics+0x198/0x2e0
[   68.130120]  kunit_try_run_case+0x170/0x3f0
[   68.130137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.130159]  kthread+0x328/0x630
[   68.130173]  ret_from_fork+0x10/0x20
[   68.130190] 
[   68.199993] Allocated by task 351:
[   68.203449]  kasan_save_stack+0x3c/0x68
[   68.207348]  kasan_save_track+0x20/0x40
[   68.211246]  kasan_save_alloc_info+0x40/0x58
[   68.215586]  __kasan_kmalloc+0xd4/0xd8
[   68.219397]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.223999]  kasan_atomics+0xb8/0x2e0
[   68.227721]  kunit_try_run_case+0x170/0x3f0
[   68.231976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.237545]  kthread+0x328/0x630
[   68.240831]  ret_from_fork+0x10/0x20
[   68.244466] 
[   68.245989] The buggy address belongs to the object at ffff0000934cf200
[   68.245989]  which belongs to the cache kmalloc-64 of size 64
[   68.258469] The buggy address is located 0 bytes to the right of
[   68.258469]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   68.271473] 
[   68.272996] The buggy address belongs to the physical page:
[   68.278644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   68.286741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.293349] page_type: f5(slab)
[   68.296548] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.304385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.312219] page dumped because: kasan: bad access detected
[   68.317865] 
[   68.319389] Memory state around the buggy address:
[   68.324244]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.331556]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.338870] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.346181]                                      ^
[   68.351036]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.358350]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.365660] ==================================================================
[   65.688291] ==================================================================
[   65.695604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   65.703010] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   65.710500] 
[   65.712026] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   65.712053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.712061] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.712073] Call trace:
[   65.712078]  show_stack+0x20/0x38 (C)
[   65.712096]  dump_stack_lvl+0x8c/0xd0
[   65.712113]  print_report+0x118/0x608
[   65.712131]  kasan_report+0xdc/0x128
[   65.712150]  kasan_check_range+0x100/0x1a8
[   65.712169]  __kasan_check_write+0x20/0x30
[   65.712184]  kasan_atomics_helper+0xb70/0x4858
[   65.712201]  kasan_atomics+0x198/0x2e0
[   65.712219]  kunit_try_run_case+0x170/0x3f0
[   65.712236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.712256]  kthread+0x328/0x630
[   65.712270]  ret_from_fork+0x10/0x20
[   65.712288] 
[   65.785435] Allocated by task 351:
[   65.788890]  kasan_save_stack+0x3c/0x68
[   65.792788]  kasan_save_track+0x20/0x40
[   65.796686]  kasan_save_alloc_info+0x40/0x58
[   65.801024]  __kasan_kmalloc+0xd4/0xd8
[   65.804833]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.809434]  kasan_atomics+0xb8/0x2e0
[   65.813157]  kunit_try_run_case+0x170/0x3f0
[   65.817410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.822970]  kthread+0x328/0x630
[   65.826255]  ret_from_fork+0x10/0x20
[   65.829890] 
[   65.831413] The buggy address belongs to the object at ffff0000934cf200
[   65.831413]  which belongs to the cache kmalloc-64 of size 64
[   65.843893] The buggy address is located 0 bytes to the right of
[   65.843893]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   65.856897] 
[   65.858423] The buggy address belongs to the physical page:
[   65.864069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   65.872166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.878774] page_type: f5(slab)
[   65.881973] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.889813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.897646] page dumped because: kasan: bad access detected
[   65.903293] 
[   65.904816] Memory state around the buggy address:
[   65.909671]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.916984]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.924297] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.931609]                                      ^
[   65.936465]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.943777]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.951088] ==================================================================
[   75.113532] ==================================================================
[   75.120846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   75.128338] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   75.135828] 
[   75.137353] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   75.137381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.137388] Hardware name: Thundercomm Dragonboard 845c (DT)
[   75.137398] Call trace:
[   75.137403]  show_stack+0x20/0x38 (C)
[   75.137420]  dump_stack_lvl+0x8c/0xd0
[   75.137438]  print_report+0x118/0x608
[   75.137456]  kasan_report+0xdc/0x128
[   75.137474]  kasan_check_range+0x100/0x1a8
[   75.137495]  __kasan_check_write+0x20/0x30
[   75.137509]  kasan_atomics_helper+0x175c/0x4858
[   75.137527]  kasan_atomics+0x198/0x2e0
[   75.137544]  kunit_try_run_case+0x170/0x3f0
[   75.137561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.137580]  kthread+0x328/0x630
[   75.137593]  ret_from_fork+0x10/0x20
[   75.137610] 
[   75.210831] Allocated by task 351:
[   75.214288]  kasan_save_stack+0x3c/0x68
[   75.218185]  kasan_save_track+0x20/0x40
[   75.222082]  kasan_save_alloc_info+0x40/0x58
[   75.226421]  __kasan_kmalloc+0xd4/0xd8
[   75.230229]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.234831]  kasan_atomics+0xb8/0x2e0
[   75.238553]  kunit_try_run_case+0x170/0x3f0
[   75.242806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.248375]  kthread+0x328/0x630
[   75.251660]  ret_from_fork+0x10/0x20
[   75.255295] 
[   75.256817] The buggy address belongs to the object at ffff0000934cf200
[   75.256817]  which belongs to the cache kmalloc-64 of size 64
[   75.269296] The buggy address is located 0 bytes to the right of
[   75.269296]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   75.282299] 
[   75.283822] The buggy address belongs to the physical page:
[   75.289468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   75.297565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.304173] page_type: f5(slab)
[   75.307372] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   75.315208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.323041] page dumped because: kasan: bad access detected
[   75.328687] 
[   75.330210] Memory state around the buggy address:
[   75.335065]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.342378]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.349691] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.357002]                                      ^
[   75.361858]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.369170]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.376480] ==================================================================
[   71.883474] ==================================================================
[   71.890786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   71.898279] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   71.905769] 
[   71.907294] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   71.907322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.907330] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.907340] Call trace:
[   71.907345]  show_stack+0x20/0x38 (C)
[   71.907362]  dump_stack_lvl+0x8c/0xd0
[   71.907379]  print_report+0x118/0x608
[   71.907397]  kasan_report+0xdc/0x128
[   71.907415]  kasan_check_range+0x100/0x1a8
[   71.907433]  __kasan_check_write+0x20/0x30
[   71.907449]  kasan_atomics_helper+0x1384/0x4858
[   71.907467]  kasan_atomics+0x198/0x2e0
[   71.907484]  kunit_try_run_case+0x170/0x3f0
[   71.907502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.907521]  kthread+0x328/0x630
[   71.907535]  ret_from_fork+0x10/0x20
[   71.907552] 
[   71.980787] Allocated by task 351:
[   71.984243]  kasan_save_stack+0x3c/0x68
[   71.988143]  kasan_save_track+0x20/0x40
[   71.992041]  kasan_save_alloc_info+0x40/0x58
[   71.996380]  __kasan_kmalloc+0xd4/0xd8
[   72.000188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.004790]  kasan_atomics+0xb8/0x2e0
[   72.008512]  kunit_try_run_case+0x170/0x3f0
[   72.012765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.018323]  kthread+0x328/0x630
[   72.021610]  ret_from_fork+0x10/0x20
[   72.025245] 
[   72.026768] The buggy address belongs to the object at ffff0000934cf200
[   72.026768]  which belongs to the cache kmalloc-64 of size 64
[   72.039248] The buggy address is located 0 bytes to the right of
[   72.039248]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   72.052251] 
[   72.053774] The buggy address belongs to the physical page:
[   72.059420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   72.067517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.074127] page_type: f5(slab)
[   72.077327] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.085165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.092998] page dumped because: kasan: bad access detected
[   72.098645] 
[   72.100168] Memory state around the buggy address:
[   72.105025]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.112338]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.119651] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.126962]                                      ^
[   72.131818]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.139131]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.146442] ==================================================================
[   67.299221] ==================================================================
[   67.306534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   67.313938] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   67.321428] 
[   67.322954] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   67.322981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.322990] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.323001] Call trace:
[   67.323007]  show_stack+0x20/0x38 (C)
[   67.323025]  dump_stack_lvl+0x8c/0xd0
[   67.323042]  print_report+0x118/0x608
[   67.323060]  kasan_report+0xdc/0x128
[   67.323079]  kasan_check_range+0x100/0x1a8
[   67.323099]  __kasan_check_write+0x20/0x30
[   67.323114]  kasan_atomics_helper+0xd3c/0x4858
[   67.323133]  kasan_atomics+0x198/0x2e0
[   67.323149]  kunit_try_run_case+0x170/0x3f0
[   67.323166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.323187]  kthread+0x328/0x630
[   67.323201]  ret_from_fork+0x10/0x20
[   67.323217] 
[   67.396375] Allocated by task 351:
[   67.399831]  kasan_save_stack+0x3c/0x68
[   67.403730]  kasan_save_track+0x20/0x40
[   67.407627]  kasan_save_alloc_info+0x40/0x58
[   67.411965]  __kasan_kmalloc+0xd4/0xd8
[   67.415773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.420374]  kasan_atomics+0xb8/0x2e0
[   67.424096]  kunit_try_run_case+0x170/0x3f0
[   67.428349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.433918]  kthread+0x328/0x630
[   67.437204]  ret_from_fork+0x10/0x20
[   67.440838] 
[   67.442360] The buggy address belongs to the object at ffff0000934cf200
[   67.442360]  which belongs to the cache kmalloc-64 of size 64
[   67.454840] The buggy address is located 0 bytes to the right of
[   67.454840]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   67.467844] 
[   67.469367] The buggy address belongs to the physical page:
[   67.475014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   67.483111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.489719] page_type: f5(slab)
[   67.492919] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   67.500755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.508587] page dumped because: kasan: bad access detected
[   67.514234] 
[   67.515756] Memory state around the buggy address:
[   67.520611]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.527923]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.535237] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.542547]                                      ^
[   67.547403]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.554716]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.562027] ==================================================================
[   60.022922] ==================================================================
[   60.030254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   60.037672] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   60.045172] 
[   60.046706] CPU: 0 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   60.046737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.046746] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.046758] Call trace:
[   60.046766]  show_stack+0x20/0x38 (C)
[   60.046786]  dump_stack_lvl+0x8c/0xd0
[   60.046805]  print_report+0x118/0x608
[   60.046824]  kasan_report+0xdc/0x128
[   60.046844]  kasan_check_range+0x100/0x1a8
[   60.046866]  __kasan_check_write+0x20/0x30
[   60.046884]  kasan_atomics_helper+0x32c/0x4858
[   60.046903]  kasan_atomics+0x198/0x2e0
[   60.046922]  kunit_try_run_case+0x170/0x3f0
[   60.046940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.046964]  kthread+0x328/0x630
[   60.046978]  ret_from_fork+0x10/0x20
[   60.046997] 
[   60.120193] Allocated by task 351:
[   60.123660]  kasan_save_stack+0x3c/0x68
[   60.127567]  kasan_save_track+0x20/0x40
[   60.131473]  kasan_save_alloc_info+0x40/0x58
[   60.135819]  __kasan_kmalloc+0xd4/0xd8
[   60.139638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.144244]  kasan_atomics+0xb8/0x2e0
[   60.147975]  kunit_try_run_case+0x170/0x3f0
[   60.152237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.157806]  kthread+0x328/0x630
[   60.161094]  ret_from_fork+0x10/0x20
[   60.164740] 
[   60.166271] The buggy address belongs to the object at ffff0000934cf200
[   60.166271]  which belongs to the cache kmalloc-64 of size 64
[   60.178760] The buggy address is located 0 bytes to the right of
[   60.178760]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   60.191768] 
[   60.193299] The buggy address belongs to the physical page:
[   60.198945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   60.207050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.213674] page_type: f5(slab)
[   60.216874] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   60.224722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.232565] page dumped because: kasan: bad access detected
[   60.238212] 
[   60.239742] Memory state around the buggy address:
[   60.244600]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.251915]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.259232] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.266545]                                      ^
[   60.271406]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.278721]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.286034] ==================================================================
[   71.342745] ==================================================================
[   71.350057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   71.357549] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   71.365040] 
[   71.366565] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   71.366594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.366604] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.366615] Call trace:
[   71.366620]  show_stack+0x20/0x38 (C)
[   71.366637]  dump_stack_lvl+0x8c/0xd0
[   71.366654]  print_report+0x118/0x608
[   71.366672]  kasan_report+0xdc/0x128
[   71.366690]  kasan_check_range+0x100/0x1a8
[   71.366710]  __kasan_check_write+0x20/0x30
[   71.366725]  kasan_atomics_helper+0x126c/0x4858
[   71.366743]  kasan_atomics+0x198/0x2e0
[   71.366759]  kunit_try_run_case+0x170/0x3f0
[   71.366776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.366796]  kthread+0x328/0x630
[   71.366810]  ret_from_fork+0x10/0x20
[   71.366826] 
[   71.440070] Allocated by task 351:
[   71.443526]  kasan_save_stack+0x3c/0x68
[   71.447426]  kasan_save_track+0x20/0x40
[   71.451325]  kasan_save_alloc_info+0x40/0x58
[   71.455663]  __kasan_kmalloc+0xd4/0xd8
[   71.459472]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.464074]  kasan_atomics+0xb8/0x2e0
[   71.467795]  kunit_try_run_case+0x170/0x3f0
[   71.472048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.477618]  kthread+0x328/0x630
[   71.480903]  ret_from_fork+0x10/0x20
[   71.484538] 
[   71.486060] The buggy address belongs to the object at ffff0000934cf200
[   71.486060]  which belongs to the cache kmalloc-64 of size 64
[   71.498541] The buggy address is located 0 bytes to the right of
[   71.498541]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   71.511546] 
[   71.513069] The buggy address belongs to the physical page:
[   71.518716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   71.526813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.533422] page_type: f5(slab)
[   71.536621] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.544458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.552291] page dumped because: kasan: bad access detected
[   71.557937] 
[   71.559460] Memory state around the buggy address:
[   71.564316]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.571630]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.578943] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.586255]                                      ^
[   71.591112]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.598425]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.605736] ==================================================================
[   63.803599] ==================================================================
[   63.810912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   63.818405] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   63.825808] 
[   63.827333] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   63.827361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.827370] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.827380] Call trace:
[   63.827388]  show_stack+0x20/0x38 (C)
[   63.827406]  dump_stack_lvl+0x8c/0xd0
[   63.827424]  print_report+0x118/0x608
[   63.827444]  kasan_report+0xdc/0x128
[   63.827462]  __asan_report_load4_noabort+0x20/0x30
[   63.827479]  kasan_atomics_helper+0x42d8/0x4858
[   63.827499]  kasan_atomics+0x198/0x2e0
[   63.827516]  kunit_try_run_case+0x170/0x3f0
[   63.827535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.827555]  kthread+0x328/0x630
[   63.827569]  ret_from_fork+0x10/0x20
[   63.827587] 
[   63.897379] Allocated by task 351:
[   63.900836]  kasan_save_stack+0x3c/0x68
[   63.904734]  kasan_save_track+0x20/0x40
[   63.908632]  kasan_save_alloc_info+0x40/0x58
[   63.912972]  __kasan_kmalloc+0xd4/0xd8
[   63.916780]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.921383]  kasan_atomics+0xb8/0x2e0
[   63.925106]  kunit_try_run_case+0x170/0x3f0
[   63.929359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.934930]  kthread+0x328/0x630
[   63.938217]  ret_from_fork+0x10/0x20
[   63.941853] 
[   63.943375] The buggy address belongs to the object at ffff0000934cf200
[   63.943375]  which belongs to the cache kmalloc-64 of size 64
[   63.955855] The buggy address is located 0 bytes to the right of
[   63.955855]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   63.968861] 
[   63.970385] The buggy address belongs to the physical page:
[   63.976032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   63.984130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.990740] page_type: f5(slab)
[   63.993938] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.001775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.009608] page dumped because: kasan: bad access detected
[   64.015257] 
[   64.016781] Memory state around the buggy address:
[   64.021636]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.028948]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.036263] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.043573]                                      ^
[   64.048430]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.055742]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.063052] ==================================================================
[   64.340619] ==================================================================
[   64.347932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   64.355337] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   64.362827] 
[   64.364353] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   64.364382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.364390] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.364401] Call trace:
[   64.364407]  show_stack+0x20/0x38 (C)
[   64.364424]  dump_stack_lvl+0x8c/0xd0
[   64.364442]  print_report+0x118/0x608
[   64.364459]  kasan_report+0xdc/0x128
[   64.364477]  kasan_check_range+0x100/0x1a8
[   64.364497]  __kasan_check_write+0x20/0x30
[   64.364512]  kasan_atomics_helper+0x99c/0x4858
[   64.364531]  kasan_atomics+0x198/0x2e0
[   64.364549]  kunit_try_run_case+0x170/0x3f0
[   64.364565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.364585]  kthread+0x328/0x630
[   64.364599]  ret_from_fork+0x10/0x20
[   64.364616] 
[   64.437774] Allocated by task 351:
[   64.441230]  kasan_save_stack+0x3c/0x68
[   64.445129]  kasan_save_track+0x20/0x40
[   64.449026]  kasan_save_alloc_info+0x40/0x58
[   64.453364]  __kasan_kmalloc+0xd4/0xd8
[   64.457173]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.461776]  kasan_atomics+0xb8/0x2e0
[   64.465498]  kunit_try_run_case+0x170/0x3f0
[   64.469750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.475320]  kthread+0x328/0x630
[   64.478607]  ret_from_fork+0x10/0x20
[   64.482243] 
[   64.483766] The buggy address belongs to the object at ffff0000934cf200
[   64.483766]  which belongs to the cache kmalloc-64 of size 64
[   64.496247] The buggy address is located 0 bytes to the right of
[   64.496247]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   64.509252] 
[   64.510776] The buggy address belongs to the physical page:
[   64.516424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   64.524521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.531131] page_type: f5(slab)
[   64.534330] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.542167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.550001] page dumped because: kasan: bad access detected
[   64.555647] 
[   64.557171] Memory state around the buggy address:
[   64.562027]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.569340]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.576654] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.583966]                                      ^
[   64.588822]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.596134]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.603446] ==================================================================
[   60.561262] ==================================================================
[   60.568583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   60.575994] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   60.583487] 
[   60.585023] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   60.585052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.585062] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.585072] Call trace:
[   60.585079]  show_stack+0x20/0x38 (C)
[   60.585096]  dump_stack_lvl+0x8c/0xd0
[   60.585115]  print_report+0x118/0x608
[   60.585132]  kasan_report+0xdc/0x128
[   60.585150]  kasan_check_range+0x100/0x1a8
[   60.585169]  __kasan_check_write+0x20/0x30
[   60.585186]  kasan_atomics_helper+0x3ac/0x4858
[   60.585204]  kasan_atomics+0x198/0x2e0
[   60.585221]  kunit_try_run_case+0x170/0x3f0
[   60.585237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.585257]  kthread+0x328/0x630
[   60.585271]  ret_from_fork+0x10/0x20
[   60.585287] 
[   60.658437] Allocated by task 351:
[   60.661890]  kasan_save_stack+0x3c/0x68
[   60.665786]  kasan_save_track+0x20/0x40
[   60.669690]  kasan_save_alloc_info+0x40/0x58
[   60.674025]  __kasan_kmalloc+0xd4/0xd8
[   60.677840]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.682440]  kasan_atomics+0xb8/0x2e0
[   60.686167]  kunit_try_run_case+0x170/0x3f0
[   60.690417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.695978]  kthread+0x328/0x630
[   60.699262]  ret_from_fork+0x10/0x20
[   60.702893] 
[   60.704424] The buggy address belongs to the object at ffff0000934cf200
[   60.704424]  which belongs to the cache kmalloc-64 of size 64
[   60.716903] The buggy address is located 0 bytes to the right of
[   60.716903]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   60.729909] 
[   60.731441] The buggy address belongs to the physical page:
[   60.737083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   60.745184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.751795] page_type: f5(slab)
[   60.754995] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   60.762837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.770673] page dumped because: kasan: bad access detected
[   60.776313] 
[   60.777836] Memory state around the buggy address:
[   60.782688]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.790004]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.797319] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.804634]                                      ^
[   60.809486]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.816799]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.824114] ==================================================================
[   66.762269] ==================================================================
[   66.769583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   66.776989] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   66.784480] 
[   66.786005] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   66.786035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.786043] Hardware name: Thundercomm Dragonboard 845c (DT)
[   66.786052] Call trace:
[   66.786058]  show_stack+0x20/0x38 (C)
[   66.786074]  dump_stack_lvl+0x8c/0xd0
[   66.786093]  print_report+0x118/0x608
[   66.786110]  kasan_report+0xdc/0x128
[   66.786129]  kasan_check_range+0x100/0x1a8
[   66.786148]  __kasan_check_write+0x20/0x30
[   66.786162]  kasan_atomics_helper+0xca0/0x4858
[   66.786180]  kasan_atomics+0x198/0x2e0
[   66.786196]  kunit_try_run_case+0x170/0x3f0
[   66.786213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.786233]  kthread+0x328/0x630
[   66.786246]  ret_from_fork+0x10/0x20
[   66.786262] 
[   66.859408] Allocated by task 351:
[   66.862865]  kasan_save_stack+0x3c/0x68
[   66.866762]  kasan_save_track+0x20/0x40
[   66.870659]  kasan_save_alloc_info+0x40/0x58
[   66.874997]  __kasan_kmalloc+0xd4/0xd8
[   66.878805]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.883407]  kasan_atomics+0xb8/0x2e0
[   66.887129]  kunit_try_run_case+0x170/0x3f0
[   66.891382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.896940]  kthread+0x328/0x630
[   66.900226]  ret_from_fork+0x10/0x20
[   66.903860] 
[   66.905382] The buggy address belongs to the object at ffff0000934cf200
[   66.905382]  which belongs to the cache kmalloc-64 of size 64
[   66.917864] The buggy address is located 0 bytes to the right of
[   66.917864]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   66.930866] 
[   66.932389] The buggy address belongs to the physical page:
[   66.938035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   66.946132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.952740] page_type: f5(slab)
[   66.955940] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.963777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.971611] page dumped because: kasan: bad access detected
[   66.977257] 
[   66.978780] Memory state around the buggy address:
[   66.983635]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.990948]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.998260] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.005572]                                      ^
[   67.010428]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.017741]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.025053] ==================================================================
[   67.032436] ==================================================================
[   67.039748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   67.047239] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   67.054642] 
[   67.056167] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   67.056195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.056203] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.056212] Call trace:
[   67.056218]  show_stack+0x20/0x38 (C)
[   67.056235]  dump_stack_lvl+0x8c/0xd0
[   67.056252]  print_report+0x118/0x608
[   67.056271]  kasan_report+0xdc/0x128
[   67.056289]  __asan_report_load4_noabort+0x20/0x30
[   67.056305]  kasan_atomics_helper+0x3dd8/0x4858
[   67.056323]  kasan_atomics+0x198/0x2e0
[   67.056339]  kunit_try_run_case+0x170/0x3f0
[   67.056356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.056375]  kthread+0x328/0x630
[   67.056388]  ret_from_fork+0x10/0x20
[   67.056404] 
[   67.126203] Allocated by task 351:
[   67.129659]  kasan_save_stack+0x3c/0x68
[   67.133557]  kasan_save_track+0x20/0x40
[   67.137454]  kasan_save_alloc_info+0x40/0x58
[   67.141791]  __kasan_kmalloc+0xd4/0xd8
[   67.145600]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.150201]  kasan_atomics+0xb8/0x2e0
[   67.153923]  kunit_try_run_case+0x170/0x3f0
[   67.158176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.163745]  kthread+0x328/0x630
[   67.167031]  ret_from_fork+0x10/0x20
[   67.170665] 
[   67.172187] The buggy address belongs to the object at ffff0000934cf200
[   67.172187]  which belongs to the cache kmalloc-64 of size 64
[   67.184666] The buggy address is located 0 bytes to the right of
[   67.184666]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   67.197670] 
[   67.199192] The buggy address belongs to the physical page:
[   67.204839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   67.212935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.219543] page_type: f5(slab)
[   67.222742] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   67.230578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.238411] page dumped because: kasan: bad access detected
[   67.244058] 
[   67.245579] Memory state around the buggy address:
[   67.250435]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.257747]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.265060] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.272371]                                      ^
[   67.277227]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.284539]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.291850] ==================================================================
[   70.261240] ==================================================================
[   70.268555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   70.276050] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   70.283541] 
[   70.285066] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   70.285096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.285105] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.285116] Call trace:
[   70.285122]  show_stack+0x20/0x38 (C)
[   70.285140]  dump_stack_lvl+0x8c/0xd0
[   70.285158]  print_report+0x118/0x608
[   70.285176]  kasan_report+0xdc/0x128
[   70.285195]  kasan_check_range+0x100/0x1a8
[   70.285215]  __kasan_check_write+0x20/0x30
[   70.285231]  kasan_atomics_helper+0x10c0/0x4858
[   70.285249]  kasan_atomics+0x198/0x2e0
[   70.285266]  kunit_try_run_case+0x170/0x3f0
[   70.285283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.285303]  kthread+0x328/0x630
[   70.285317]  ret_from_fork+0x10/0x20
[   70.285333] 
[   70.358578] Allocated by task 351:
[   70.362035]  kasan_save_stack+0x3c/0x68
[   70.365933]  kasan_save_track+0x20/0x40
[   70.369831]  kasan_save_alloc_info+0x40/0x58
[   70.374169]  __kasan_kmalloc+0xd4/0xd8
[   70.377978]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.382581]  kasan_atomics+0xb8/0x2e0
[   70.386302]  kunit_try_run_case+0x170/0x3f0
[   70.390556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.396115]  kthread+0x328/0x630
[   70.399401]  ret_from_fork+0x10/0x20
[   70.403036] 
[   70.404560] The buggy address belongs to the object at ffff0000934cf200
[   70.404560]  which belongs to the cache kmalloc-64 of size 64
[   70.417039] The buggy address is located 0 bytes to the right of
[   70.417039]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   70.430042] 
[   70.431564] The buggy address belongs to the physical page:
[   70.437211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   70.445307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.451916] page_type: f5(slab)
[   70.455115] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.462952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.470785] page dumped because: kasan: bad access detected
[   70.476431] 
[   70.477954] Memory state around the buggy address:
[   70.482809]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.490121]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.497434] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.504746]                                      ^
[   70.509603]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.516915]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.524226] ==================================================================
[   64.070422] ==================================================================
[   64.077734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   64.085138] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   64.092630] 
[   64.094155] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   64.094183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.094191] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.094200] Call trace:
[   64.094207]  show_stack+0x20/0x38 (C)
[   64.094223]  dump_stack_lvl+0x8c/0xd0
[   64.094240]  print_report+0x118/0x608
[   64.094259]  kasan_report+0xdc/0x128
[   64.094277]  kasan_check_range+0x100/0x1a8
[   64.094298]  __kasan_check_write+0x20/0x30
[   64.094313]  kasan_atomics_helper+0x934/0x4858
[   64.094331]  kasan_atomics+0x198/0x2e0
[   64.094348]  kunit_try_run_case+0x170/0x3f0
[   64.094366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.094386]  kthread+0x328/0x630
[   64.094401]  ret_from_fork+0x10/0x20
[   64.094418] 
[   64.167576] Allocated by task 351:
[   64.171031]  kasan_save_stack+0x3c/0x68
[   64.174931]  kasan_save_track+0x20/0x40
[   64.178829]  kasan_save_alloc_info+0x40/0x58
[   64.183169]  __kasan_kmalloc+0xd4/0xd8
[   64.186977]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.191580]  kasan_atomics+0xb8/0x2e0
[   64.195302]  kunit_try_run_case+0x170/0x3f0
[   64.199555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.205113]  kthread+0x328/0x630
[   64.208400]  ret_from_fork+0x10/0x20
[   64.212035] 
[   64.213558] The buggy address belongs to the object at ffff0000934cf200
[   64.213558]  which belongs to the cache kmalloc-64 of size 64
[   64.226041] The buggy address is located 0 bytes to the right of
[   64.226041]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   64.239045] 
[   64.240569] The buggy address belongs to the physical page:
[   64.246215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   64.254313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.260922] page_type: f5(slab)
[   64.264123] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.271960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.279793] page dumped because: kasan: bad access detected
[   64.285441] 
[   64.286963] Memory state around the buggy address:
[   64.291819]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.299131]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.306444] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.313756]                                      ^
[   64.318612]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.325925]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.333236] ==================================================================
[   65.151276] ==================================================================
[   65.158590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   65.165998] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   65.173489] 
[   65.175015] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   65.175045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.175052] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.175062] Call trace:
[   65.175069]  show_stack+0x20/0x38 (C)
[   65.175086]  dump_stack_lvl+0x8c/0xd0
[   65.175104]  print_report+0x118/0x608
[   65.175124]  kasan_report+0xdc/0x128
[   65.175141]  kasan_check_range+0x100/0x1a8
[   65.175162]  __kasan_check_write+0x20/0x30
[   65.175177]  kasan_atomics_helper+0xad4/0x4858
[   65.175196]  kasan_atomics+0x198/0x2e0
[   65.175212]  kunit_try_run_case+0x170/0x3f0
[   65.175229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.175249]  kthread+0x328/0x630
[   65.175262]  ret_from_fork+0x10/0x20
[   65.175278] 
[   65.248415] Allocated by task 351:
[   65.251871]  kasan_save_stack+0x3c/0x68
[   65.255769]  kasan_save_track+0x20/0x40
[   65.259667]  kasan_save_alloc_info+0x40/0x58
[   65.264005]  __kasan_kmalloc+0xd4/0xd8
[   65.267814]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.272415]  kasan_atomics+0xb8/0x2e0
[   65.276137]  kunit_try_run_case+0x170/0x3f0
[   65.280390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.285949]  kthread+0x328/0x630
[   65.289235]  ret_from_fork+0x10/0x20
[   65.292870] 
[   65.294392] The buggy address belongs to the object at ffff0000934cf200
[   65.294392]  which belongs to the cache kmalloc-64 of size 64
[   65.306872] The buggy address is located 0 bytes to the right of
[   65.306872]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   65.319877] 
[   65.321400] The buggy address belongs to the physical page:
[   65.327047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   65.335144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.341753] page_type: f5(slab)
[   65.344953] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.352790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.360624] page dumped because: kasan: bad access detected
[   65.366272] 
[   65.367794] Memory state around the buggy address:
[   65.372650]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.379963]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.387276] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.394590]                                      ^
[   65.399446]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.406758]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.414070] ==================================================================
[   69.180385] ==================================================================
[   69.187697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   69.195102] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   69.202591] 
[   69.204116] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   69.204144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.204151] Hardware name: Thundercomm Dragonboard 845c (DT)
[   69.204161] Call trace:
[   69.204167]  show_stack+0x20/0x38 (C)
[   69.204184]  dump_stack_lvl+0x8c/0xd0
[   69.204203]  print_report+0x118/0x608
[   69.204221]  kasan_report+0xdc/0x128
[   69.204239]  kasan_check_range+0x100/0x1a8
[   69.204258]  __kasan_check_write+0x20/0x30
[   69.204272]  kasan_atomics_helper+0xf20/0x4858
[   69.204290]  kasan_atomics+0x198/0x2e0
[   69.204307]  kunit_try_run_case+0x170/0x3f0
[   69.204324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.204344]  kthread+0x328/0x630
[   69.204357]  ret_from_fork+0x10/0x20
[   69.204373] 
[   69.277519] Allocated by task 351:
[   69.280976]  kasan_save_stack+0x3c/0x68
[   69.284874]  kasan_save_track+0x20/0x40
[   69.288771]  kasan_save_alloc_info+0x40/0x58
[   69.293110]  __kasan_kmalloc+0xd4/0xd8
[   69.296918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.301519]  kasan_atomics+0xb8/0x2e0
[   69.305241]  kunit_try_run_case+0x170/0x3f0
[   69.309493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.315062]  kthread+0x328/0x630
[   69.318347]  ret_from_fork+0x10/0x20
[   69.321982] 
[   69.323505] The buggy address belongs to the object at ffff0000934cf200
[   69.323505]  which belongs to the cache kmalloc-64 of size 64
[   69.335985] The buggy address is located 0 bytes to the right of
[   69.335985]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   69.348988] 
[   69.350511] The buggy address belongs to the physical page:
[   69.356158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   69.364255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.370863] page_type: f5(slab)
[   69.374061] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.381899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.389731] page dumped because: kasan: bad access detected
[   69.395377] 
[   69.396899] Memory state around the buggy address:
[   69.401754]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.409066]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.416379] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.423690]                                      ^
[   69.428546]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.435858]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.443168] ==================================================================
[   70.801977] ==================================================================
[   70.809293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   70.816787] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   70.824278] 
[   70.825804] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   70.825833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.825842] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.825852] Call trace:
[   70.825859]  show_stack+0x20/0x38 (C)
[   70.825876]  dump_stack_lvl+0x8c/0xd0
[   70.825895]  print_report+0x118/0x608
[   70.825915]  kasan_report+0xdc/0x128
[   70.825933]  kasan_check_range+0x100/0x1a8
[   70.825953]  __kasan_check_write+0x20/0x30
[   70.825970]  kasan_atomics_helper+0x1190/0x4858
[   70.825988]  kasan_atomics+0x198/0x2e0
[   70.826004]  kunit_try_run_case+0x170/0x3f0
[   70.826022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.826043]  kthread+0x328/0x630
[   70.826057]  ret_from_fork+0x10/0x20
[   70.826073] 
[   70.899308] Allocated by task 351:
[   70.902766]  kasan_save_stack+0x3c/0x68
[   70.906665]  kasan_save_track+0x20/0x40
[   70.910563]  kasan_save_alloc_info+0x40/0x58
[   70.914901]  __kasan_kmalloc+0xd4/0xd8
[   70.918711]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.923313]  kasan_atomics+0xb8/0x2e0
[   70.927035]  kunit_try_run_case+0x170/0x3f0
[   70.931289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.936858]  kthread+0x328/0x630
[   70.940144]  ret_from_fork+0x10/0x20
[   70.943781] 
[   70.945303] The buggy address belongs to the object at ffff0000934cf200
[   70.945303]  which belongs to the cache kmalloc-64 of size 64
[   70.957784] The buggy address is located 0 bytes to the right of
[   70.957784]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   70.970790] 
[   70.972312] The buggy address belongs to the physical page:
[   70.977960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   70.986059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.992668] page_type: f5(slab)
[   70.995868] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.003706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.011540] page dumped because: kasan: bad access detected
[   71.017189] 
[   71.018712] Memory state around the buggy address:
[   71.023568]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.030880]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.038193] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.045503]                                      ^
[   71.050361]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.057674]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.064985] ==================================================================
[   59.755972] ==================================================================
[   59.763284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   59.770775] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   59.778173] 
[   59.779707] CPU: 6 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   59.779738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.779746] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.779755] Call trace:
[   59.779763]  show_stack+0x20/0x38 (C)
[   59.779780]  dump_stack_lvl+0x8c/0xd0
[   59.779798]  print_report+0x118/0x608
[   59.779817]  kasan_report+0xdc/0x128
[   59.779836]  __asan_report_load4_noabort+0x20/0x30
[   59.779853]  kasan_atomics_helper+0x40fc/0x4858
[   59.779873]  kasan_atomics+0x198/0x2e0
[   59.779890]  kunit_try_run_case+0x170/0x3f0
[   59.779909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.779930]  kthread+0x328/0x630
[   59.779945]  ret_from_fork+0x10/0x20
[   59.779962] 
[   59.849738] Allocated by task 351:
[   59.853193]  kasan_save_stack+0x3c/0x68
[   59.857099]  kasan_save_track+0x20/0x40
[   59.860994]  kasan_save_alloc_info+0x40/0x58
[   59.865329]  __kasan_kmalloc+0xd4/0xd8
[   59.869136]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.873734]  kasan_atomics+0xb8/0x2e0
[   59.877455]  kunit_try_run_case+0x170/0x3f0
[   59.881704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.887270]  kthread+0x328/0x630
[   59.890552]  ret_from_fork+0x10/0x20
[   59.894185] 
[   59.895714] The buggy address belongs to the object at ffff0000934cf200
[   59.895714]  which belongs to the cache kmalloc-64 of size 64
[   59.908194] The buggy address is located 0 bytes to the right of
[   59.908194]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   59.921200] 
[   59.922724] The buggy address belongs to the physical page:
[   59.928365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   59.936467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.943074] page_type: f5(slab)
[   59.946269] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.954112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.961950] page dumped because: kasan: bad access detected
[   59.967592] 
[   59.969123] Memory state around the buggy address:
[   59.973979]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.981287]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.988593] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.995897]                                      ^
[   60.000751]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.008057]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.015362] ==================================================================
[   75.383850] ==================================================================
[   75.391163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   75.398655] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   75.406059] 
[   75.407584] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   75.407612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.407620] Hardware name: Thundercomm Dragonboard 845c (DT)
[   75.407630] Call trace:
[   75.407636]  show_stack+0x20/0x38 (C)
[   75.407652]  dump_stack_lvl+0x8c/0xd0
[   75.407670]  print_report+0x118/0x608
[   75.407687]  kasan_report+0xdc/0x128
[   75.407704]  __asan_report_load8_noabort+0x20/0x30
[   75.407721]  kasan_atomics_helper+0x3e20/0x4858
[   75.407740]  kasan_atomics+0x198/0x2e0
[   75.407757]  kunit_try_run_case+0x170/0x3f0
[   75.407774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.407794]  kthread+0x328/0x630
[   75.407808]  ret_from_fork+0x10/0x20
[   75.407824] 
[   75.477624] Allocated by task 351:
[   75.481079]  kasan_save_stack+0x3c/0x68
[   75.484977]  kasan_save_track+0x20/0x40
[   75.488874]  kasan_save_alloc_info+0x40/0x58
[   75.493212]  __kasan_kmalloc+0xd4/0xd8
[   75.497021]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.501623]  kasan_atomics+0xb8/0x2e0
[   75.505344]  kunit_try_run_case+0x170/0x3f0
[   75.509597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.515167]  kthread+0x328/0x630
[   75.518452]  ret_from_fork+0x10/0x20
[   75.522086] 
[   75.523609] The buggy address belongs to the object at ffff0000934cf200
[   75.523609]  which belongs to the cache kmalloc-64 of size 64
[   75.536088] The buggy address is located 0 bytes to the right of
[   75.536088]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   75.549090] 
[   75.550613] The buggy address belongs to the physical page:
[   75.556259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   75.564355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.570963] page_type: f5(slab)
[   75.574162] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   75.581998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.589831] page dumped because: kasan: bad access detected
[   75.595477] 
[   75.596999] Memory state around the buggy address:
[   75.601855]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.609168]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.616481] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.623792]                                      ^
[   75.628648]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.635960]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.643270] ==================================================================
[   68.643222] ==================================================================
[   68.650533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   68.658025] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   68.665514] 
[   68.667039] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   68.667067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.667075] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.667086] Call trace:
[   68.667092]  show_stack+0x20/0x38 (C)
[   68.667109]  dump_stack_lvl+0x8c/0xd0
[   68.667127]  print_report+0x118/0x608
[   68.667145]  kasan_report+0xdc/0x128
[   68.667162]  __asan_report_store8_noabort+0x20/0x30
[   68.667179]  kasan_atomics_helper+0x3e5c/0x4858
[   68.667198]  kasan_atomics+0x198/0x2e0
[   68.667215]  kunit_try_run_case+0x170/0x3f0
[   68.667233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.667252]  kthread+0x328/0x630
[   68.667266]  ret_from_fork+0x10/0x20
[   68.667282] 
[   68.737179] Allocated by task 351:
[   68.740635]  kasan_save_stack+0x3c/0x68
[   68.744534]  kasan_save_track+0x20/0x40
[   68.748432]  kasan_save_alloc_info+0x40/0x58
[   68.752769]  __kasan_kmalloc+0xd4/0xd8
[   68.756578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.761180]  kasan_atomics+0xb8/0x2e0
[   68.764901]  kunit_try_run_case+0x170/0x3f0
[   68.769155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.774724]  kthread+0x328/0x630
[   68.778010]  ret_from_fork+0x10/0x20
[   68.781644] 
[   68.783167] The buggy address belongs to the object at ffff0000934cf200
[   68.783167]  which belongs to the cache kmalloc-64 of size 64
[   68.795647] The buggy address is located 0 bytes to the right of
[   68.795647]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   68.808649] 
[   68.810172] The buggy address belongs to the physical page:
[   68.815819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   68.823915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.830524] page_type: f5(slab)
[   68.833723] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.841560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.849393] page dumped because: kasan: bad access detected
[   68.855039] 
[   68.856562] Memory state around the buggy address:
[   68.861417]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.868730]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.876043] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.883354]                                      ^
[   68.888211]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.895523]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.902834] ==================================================================
[   58.676944] ==================================================================
[   58.684266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   58.691763] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   58.699250] 
[   58.700784] CPU: 7 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   58.700814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.700821] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.700832] Call trace:
[   58.700840]  show_stack+0x20/0x38 (C)
[   58.700857]  dump_stack_lvl+0x8c/0xd0
[   58.700875]  print_report+0x118/0x608
[   58.700894]  kasan_report+0xdc/0x128
[   58.700914]  __asan_report_store4_noabort+0x20/0x30
[   58.700930]  kasan_atomics_helper+0x3f7c/0x4858
[   58.700949]  kasan_atomics+0x198/0x2e0
[   58.700966]  kunit_try_run_case+0x170/0x3f0
[   58.700985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.701005]  kthread+0x328/0x630
[   58.701018]  ret_from_fork+0x10/0x20
[   58.701035] 
[   58.770923] Allocated by task 351:
[   58.774376]  kasan_save_stack+0x3c/0x68
[   58.778282]  kasan_save_track+0x20/0x40
[   58.782187]  kasan_save_alloc_info+0x40/0x58
[   58.786522]  __kasan_kmalloc+0xd4/0xd8
[   58.790338]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.794936]  kasan_atomics+0xb8/0x2e0
[   58.798655]  kunit_try_run_case+0x170/0x3f0
[   58.802905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.808467]  kthread+0x328/0x630
[   58.811750]  ret_from_fork+0x10/0x20
[   58.815382] 
[   58.816914] The buggy address belongs to the object at ffff0000934cf200
[   58.816914]  which belongs to the cache kmalloc-64 of size 64
[   58.829396] The buggy address is located 0 bytes to the right of
[   58.829396]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   58.842402] 
[   58.843933] The buggy address belongs to the physical page:
[   58.849576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   58.857677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.864290] page_type: f5(slab)
[   58.867487] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.875331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.883168] page dumped because: kasan: bad access detected
[   58.888807] 
[   58.890331] Memory state around the buggy address:
[   58.895184]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.902490]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.909806] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.917111]                                      ^
[   58.921963]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.929269]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.936573] ==================================================================
[   68.910205] ==================================================================
[   68.917518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   68.924924] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   68.932413] 
[   68.933938] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   68.933966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.933974] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.933985] Call trace:
[   68.933991]  show_stack+0x20/0x38 (C)
[   68.934008]  dump_stack_lvl+0x8c/0xd0
[   68.934025]  print_report+0x118/0x608
[   68.934044]  kasan_report+0xdc/0x128
[   68.934062]  kasan_check_range+0x100/0x1a8
[   68.934082]  __kasan_check_write+0x20/0x30
[   68.934097]  kasan_atomics_helper+0xeb8/0x4858
[   68.934115]  kasan_atomics+0x198/0x2e0
[   68.934131]  kunit_try_run_case+0x170/0x3f0
[   68.934149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.934169]  kthread+0x328/0x630
[   68.934182]  ret_from_fork+0x10/0x20
[   68.934199] 
[   69.007356] Allocated by task 351:
[   69.010812]  kasan_save_stack+0x3c/0x68
[   69.014710]  kasan_save_track+0x20/0x40
[   69.018607]  kasan_save_alloc_info+0x40/0x58
[   69.022945]  __kasan_kmalloc+0xd4/0xd8
[   69.026754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   69.031355]  kasan_atomics+0xb8/0x2e0
[   69.035076]  kunit_try_run_case+0x170/0x3f0
[   69.039329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   69.044898]  kthread+0x328/0x630
[   69.048184]  ret_from_fork+0x10/0x20
[   69.051818] 
[   69.053340] The buggy address belongs to the object at ffff0000934cf200
[   69.053340]  which belongs to the cache kmalloc-64 of size 64
[   69.065820] The buggy address is located 0 bytes to the right of
[   69.065820]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   69.078822] 
[   69.080346] The buggy address belongs to the physical page:
[   69.085992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   69.094090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   69.100698] page_type: f5(slab)
[   69.103897] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   69.111733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.119566] page dumped because: kasan: bad access detected
[   69.125212] 
[   69.126734] Memory state around the buggy address:
[   69.131589]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.138901]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.146214] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.153524]                                      ^
[   69.158380]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.165692]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.173002] ==================================================================
[   73.502045] ==================================================================
[   73.509359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   73.516851] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   73.524341] 
[   73.525866] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   73.525895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.525903] Hardware name: Thundercomm Dragonboard 845c (DT)
[   73.525914] Call trace:
[   73.525919]  show_stack+0x20/0x38 (C)
[   73.525936]  dump_stack_lvl+0x8c/0xd0
[   73.525953]  print_report+0x118/0x608
[   73.525971]  kasan_report+0xdc/0x128
[   73.525989]  kasan_check_range+0x100/0x1a8
[   73.526008]  __kasan_check_write+0x20/0x30
[   73.526024]  kasan_atomics_helper+0x15b4/0x4858
[   73.526042]  kasan_atomics+0x198/0x2e0
[   73.526059]  kunit_try_run_case+0x170/0x3f0
[   73.526076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.526095]  kthread+0x328/0x630
[   73.526109]  ret_from_fork+0x10/0x20
[   73.526125] 
[   73.599368] Allocated by task 351:
[   73.602824]  kasan_save_stack+0x3c/0x68
[   73.606722]  kasan_save_track+0x20/0x40
[   73.610619]  kasan_save_alloc_info+0x40/0x58
[   73.614957]  __kasan_kmalloc+0xd4/0xd8
[   73.618765]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.623366]  kasan_atomics+0xb8/0x2e0
[   73.627088]  kunit_try_run_case+0x170/0x3f0
[   73.631340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.636909]  kthread+0x328/0x630
[   73.640195]  ret_from_fork+0x10/0x20
[   73.643829] 
[   73.645351] The buggy address belongs to the object at ffff0000934cf200
[   73.645351]  which belongs to the cache kmalloc-64 of size 64
[   73.657830] The buggy address is located 0 bytes to the right of
[   73.657830]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   73.670833] 
[   73.672356] The buggy address belongs to the physical page:
[   73.678002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   73.686099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.692707] page_type: f5(slab)
[   73.695906] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.703742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.711575] page dumped because: kasan: bad access detected
[   73.717222] 
[   73.718744] Memory state around the buggy address:
[   73.723600]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.730913]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.738225] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.745536]                                      ^
[   73.750392]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.757704]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.765014] ==================================================================
[   74.039178] ==================================================================
[   74.046492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   74.053984] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   74.061474] 
[   74.062999] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   74.063027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.063034] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.063044] Call trace:
[   74.063050]  show_stack+0x20/0x38 (C)
[   74.063068]  dump_stack_lvl+0x8c/0xd0
[   74.063085]  print_report+0x118/0x608
[   74.063103]  kasan_report+0xdc/0x128
[   74.063121]  kasan_check_range+0x100/0x1a8
[   74.063142]  __kasan_check_write+0x20/0x30
[   74.063157]  kasan_atomics_helper+0x1644/0x4858
[   74.063175]  kasan_atomics+0x198/0x2e0
[   74.063191]  kunit_try_run_case+0x170/0x3f0
[   74.063208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.063227]  kthread+0x328/0x630
[   74.063241]  ret_from_fork+0x10/0x20
[   74.063258] 
[   74.136501] Allocated by task 351:
[   74.139958]  kasan_save_stack+0x3c/0x68
[   74.143856]  kasan_save_track+0x20/0x40
[   74.147753]  kasan_save_alloc_info+0x40/0x58
[   74.152092]  __kasan_kmalloc+0xd4/0xd8
[   74.155903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.160504]  kasan_atomics+0xb8/0x2e0
[   74.164226]  kunit_try_run_case+0x170/0x3f0
[   74.168479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.174047]  kthread+0x328/0x630
[   74.177333]  ret_from_fork+0x10/0x20
[   74.180968] 
[   74.182490] The buggy address belongs to the object at ffff0000934cf200
[   74.182490]  which belongs to the cache kmalloc-64 of size 64
[   74.194968] The buggy address is located 0 bytes to the right of
[   74.194968]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   74.207972] 
[   74.209496] The buggy address belongs to the physical page:
[   74.215143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   74.223241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.229850] page_type: f5(slab)
[   74.233048] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   74.240885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.248717] page dumped because: kasan: bad access detected
[   74.254364] 
[   74.255887] Memory state around the buggy address:
[   74.260742]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.268055]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.275368] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.282679]                                      ^
[   74.287535]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.294847]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.302157] ==================================================================
[   74.309528] ==================================================================
[   74.316840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   74.324334] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   74.331737] 
[   74.333262] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   74.333291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.333298] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.333308] Call trace:
[   74.333315]  show_stack+0x20/0x38 (C)
[   74.333332]  dump_stack_lvl+0x8c/0xd0
[   74.333350]  print_report+0x118/0x608
[   74.333369]  kasan_report+0xdc/0x128
[   74.333387]  __asan_report_load8_noabort+0x20/0x30
[   74.333404]  kasan_atomics_helper+0x3df4/0x4858
[   74.333423]  kasan_atomics+0x198/0x2e0
[   74.333440]  kunit_try_run_case+0x170/0x3f0
[   74.333457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.333477]  kthread+0x328/0x630
[   74.333490]  ret_from_fork+0x10/0x20
[   74.333507] 
[   74.403318] Allocated by task 351:
[   74.406773]  kasan_save_stack+0x3c/0x68
[   74.410672]  kasan_save_track+0x20/0x40
[   74.414569]  kasan_save_alloc_info+0x40/0x58
[   74.418908]  __kasan_kmalloc+0xd4/0xd8
[   74.422717]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.427319]  kasan_atomics+0xb8/0x2e0
[   74.431041]  kunit_try_run_case+0x170/0x3f0
[   74.435294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.440864]  kthread+0x328/0x630
[   74.444150]  ret_from_fork+0x10/0x20
[   74.447784] 
[   74.449306] The buggy address belongs to the object at ffff0000934cf200
[   74.449306]  which belongs to the cache kmalloc-64 of size 64
[   74.461786] The buggy address is located 0 bytes to the right of
[   74.461786]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   74.474790] 
[   74.476314] The buggy address belongs to the physical page:
[   74.481960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   74.490057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.496667] page_type: f5(slab)
[   74.499865] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   74.507703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.515536] page dumped because: kasan: bad access detected
[   74.521183] 
[   74.522705] Memory state around the buggy address:
[   74.527561]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.534873]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.542187] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.549497]                                      ^
[   74.554353]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.561665]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.568977] ==================================================================
[   72.420642] ==================================================================
[   72.427956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   72.435449] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   72.442939] 
[   72.444465] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   72.444494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.444503] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.444513] Call trace:
[   72.444518]  show_stack+0x20/0x38 (C)
[   72.444535]  dump_stack_lvl+0x8c/0xd0
[   72.444552]  print_report+0x118/0x608
[   72.444571]  kasan_report+0xdc/0x128
[   72.444589]  kasan_check_range+0x100/0x1a8
[   72.444608]  __kasan_check_write+0x20/0x30
[   72.444622]  kasan_atomics_helper+0x1414/0x4858
[   72.444641]  kasan_atomics+0x198/0x2e0
[   72.444658]  kunit_try_run_case+0x170/0x3f0
[   72.444675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.444696]  kthread+0x328/0x630
[   72.444711]  ret_from_fork+0x10/0x20
[   72.444727] 
[   72.517971] Allocated by task 351:
[   72.521426]  kasan_save_stack+0x3c/0x68
[   72.525326]  kasan_save_track+0x20/0x40
[   72.529223]  kasan_save_alloc_info+0x40/0x58
[   72.533562]  __kasan_kmalloc+0xd4/0xd8
[   72.537371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.541973]  kasan_atomics+0xb8/0x2e0
[   72.545695]  kunit_try_run_case+0x170/0x3f0
[   72.549948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.555507]  kthread+0x328/0x630
[   72.558792]  ret_from_fork+0x10/0x20
[   72.562427] 
[   72.563950] The buggy address belongs to the object at ffff0000934cf200
[   72.563950]  which belongs to the cache kmalloc-64 of size 64
[   72.576429] The buggy address is located 0 bytes to the right of
[   72.576429]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   72.589432] 
[   72.590955] The buggy address belongs to the physical page:
[   72.596601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   72.604698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.611307] page_type: f5(slab)
[   72.614505] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.622342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.630175] page dumped because: kasan: bad access detected
[   72.635822] 
[   72.637344] Memory state around the buggy address:
[   72.642199]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.649513]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.656826] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.664137]                                      ^
[   72.668993]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.676305]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.683615] ==================================================================
[   61.101694] ==================================================================
[   61.109007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   61.116413] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   61.123904] 
[   61.125430] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   61.125458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.125466] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.125476] Call trace:
[   61.125481]  show_stack+0x20/0x38 (C)
[   61.125499]  dump_stack_lvl+0x8c/0xd0
[   61.125518]  print_report+0x118/0x608
[   61.125537]  kasan_report+0xdc/0x128
[   61.125554]  kasan_check_range+0x100/0x1a8
[   61.125573]  __kasan_check_write+0x20/0x30
[   61.125588]  kasan_atomics_helper+0x47c/0x4858
[   61.125606]  kasan_atomics+0x198/0x2e0
[   61.125622]  kunit_try_run_case+0x170/0x3f0
[   61.125640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.125661]  kthread+0x328/0x630
[   61.125675]  ret_from_fork+0x10/0x20
[   61.125692] 
[   61.198838] Allocated by task 351:
[   61.202295]  kasan_save_stack+0x3c/0x68
[   61.206193]  kasan_save_track+0x20/0x40
[   61.210090]  kasan_save_alloc_info+0x40/0x58
[   61.214429]  __kasan_kmalloc+0xd4/0xd8
[   61.218240]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.222841]  kasan_atomics+0xb8/0x2e0
[   61.226564]  kunit_try_run_case+0x170/0x3f0
[   61.230818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.236387]  kthread+0x328/0x630
[   61.239674]  ret_from_fork+0x10/0x20
[   61.243308] 
[   61.244841] The buggy address belongs to the object at ffff0000934cf200
[   61.244841]  which belongs to the cache kmalloc-64 of size 64
[   61.257318] The buggy address is located 0 bytes to the right of
[   61.257318]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   61.270322] 
[   61.271846] The buggy address belongs to the physical page:
[   61.277492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   61.285591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.292200] page_type: f5(slab)
[   61.295400] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.303238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.311073] page dumped because: kasan: bad access detected
[   61.316721] 
[   61.318243] Memory state around the buggy address:
[   61.323098]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.330411]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.337723] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.345034]                                      ^
[   61.349891]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.357203]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.364513] ==================================================================
[   69.990890] ==================================================================
[   69.998203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   70.005694] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   70.013183] 
[   70.014708] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   70.014737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.014745] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.014756] Call trace:
[   70.014762]  show_stack+0x20/0x38 (C)
[   70.014779]  dump_stack_lvl+0x8c/0xd0
[   70.014796]  print_report+0x118/0x608
[   70.014815]  kasan_report+0xdc/0x128
[   70.014833]  kasan_check_range+0x100/0x1a8
[   70.014854]  __kasan_check_write+0x20/0x30
[   70.014871]  kasan_atomics_helper+0x1058/0x4858
[   70.014889]  kasan_atomics+0x198/0x2e0
[   70.014906]  kunit_try_run_case+0x170/0x3f0
[   70.014924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.014943]  kthread+0x328/0x630
[   70.014958]  ret_from_fork+0x10/0x20
[   70.014975] 
[   70.088207] Allocated by task 351:
[   70.091663]  kasan_save_stack+0x3c/0x68
[   70.095561]  kasan_save_track+0x20/0x40
[   70.099458]  kasan_save_alloc_info+0x40/0x58
[   70.103797]  __kasan_kmalloc+0xd4/0xd8
[   70.107605]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.112207]  kasan_atomics+0xb8/0x2e0
[   70.115928]  kunit_try_run_case+0x170/0x3f0
[   70.120182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.125742]  kthread+0x328/0x630
[   70.129028]  ret_from_fork+0x10/0x20
[   70.132663] 
[   70.134186] The buggy address belongs to the object at ffff0000934cf200
[   70.134186]  which belongs to the cache kmalloc-64 of size 64
[   70.146666] The buggy address is located 0 bytes to the right of
[   70.146666]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   70.159670] 
[   70.161193] The buggy address belongs to the physical page:
[   70.166840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   70.174938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.181547] page_type: f5(slab)
[   70.184745] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.192582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.200417] page dumped because: kasan: bad access detected
[   70.206063] 
[   70.207586] Memory state around the buggy address:
[   70.212441]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.219753]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.227068] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.234378]                                      ^
[   70.239234]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.246546]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.253856] ==================================================================
[   64.610817] ==================================================================
[   64.618127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   64.625532] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   64.633023] 
[   64.634549] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   64.634577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.634584] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.634594] Call trace:
[   64.634601]  show_stack+0x20/0x38 (C)
[   64.634617]  dump_stack_lvl+0x8c/0xd0
[   64.634635]  print_report+0x118/0x608
[   64.634655]  kasan_report+0xdc/0x128
[   64.634673]  kasan_check_range+0x100/0x1a8
[   64.634693]  __kasan_check_write+0x20/0x30
[   64.634708]  kasan_atomics_helper+0xa04/0x4858
[   64.634727]  kasan_atomics+0x198/0x2e0
[   64.634744]  kunit_try_run_case+0x170/0x3f0
[   64.634762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.634782]  kthread+0x328/0x630
[   64.634797]  ret_from_fork+0x10/0x20
[   64.634813] 
[   64.707962] Allocated by task 351:
[   64.711418]  kasan_save_stack+0x3c/0x68
[   64.715315]  kasan_save_track+0x20/0x40
[   64.719212]  kasan_save_alloc_info+0x40/0x58
[   64.723551]  __kasan_kmalloc+0xd4/0xd8
[   64.727360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   64.731961]  kasan_atomics+0xb8/0x2e0
[   64.735683]  kunit_try_run_case+0x170/0x3f0
[   64.739936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.745505]  kthread+0x328/0x630
[   64.748792]  ret_from_fork+0x10/0x20
[   64.752427] 
[   64.753949] The buggy address belongs to the object at ffff0000934cf200
[   64.753949]  which belongs to the cache kmalloc-64 of size 64
[   64.766428] The buggy address is located 0 bytes to the right of
[   64.766428]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   64.779431] 
[   64.780956] The buggy address belongs to the physical page:
[   64.786601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   64.794699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.801308] page_type: f5(slab)
[   64.804508] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   64.812345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.820179] page dumped because: kasan: bad access detected
[   64.825829] 
[   64.827352] Memory state around the buggy address:
[   64.832218]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.839539]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.846856] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.854169]                                      ^
[   64.859028]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.866343]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.873657] ==================================================================
[   75.650653] ==================================================================
[   75.657964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   75.665457] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   75.672947] 
[   75.674472] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   75.674500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.674507] Hardware name: Thundercomm Dragonboard 845c (DT)
[   75.674517] Call trace:
[   75.674522]  show_stack+0x20/0x38 (C)
[   75.674539]  dump_stack_lvl+0x8c/0xd0
[   75.674557]  print_report+0x118/0x608
[   75.674576]  kasan_report+0xdc/0x128
[   75.674593]  kasan_check_range+0x100/0x1a8
[   75.674613]  __kasan_check_write+0x20/0x30
[   75.674628]  kasan_atomics_helper+0x17ec/0x4858
[   75.674647]  kasan_atomics+0x198/0x2e0
[   75.674664]  kunit_try_run_case+0x170/0x3f0
[   75.674681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.674701]  kthread+0x328/0x630
[   75.674715]  ret_from_fork+0x10/0x20
[   75.674731] 
[   75.747952] Allocated by task 351:
[   75.751408]  kasan_save_stack+0x3c/0x68
[   75.755306]  kasan_save_track+0x20/0x40
[   75.759203]  kasan_save_alloc_info+0x40/0x58
[   75.763541]  __kasan_kmalloc+0xd4/0xd8
[   75.767350]  __kmalloc_cache_noprof+0x16c/0x3c0
[   75.771952]  kasan_atomics+0xb8/0x2e0
[   75.775673]  kunit_try_run_case+0x170/0x3f0
[   75.779927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.785496]  kthread+0x328/0x630
[   75.788782]  ret_from_fork+0x10/0x20
[   75.792417] 
[   75.793939] The buggy address belongs to the object at ffff0000934cf200
[   75.793939]  which belongs to the cache kmalloc-64 of size 64
[   75.806418] The buggy address is located 0 bytes to the right of
[   75.806418]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   75.819422] 
[   75.820945] The buggy address belongs to the physical page:
[   75.826592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   75.834689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.841296] page_type: f5(slab)
[   75.844496] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   75.852332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.860165] page dumped because: kasan: bad access detected
[   75.865812] 
[   75.867334] Memory state around the buggy address:
[   75.872189]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.879502]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.886814] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.894124]                                      ^
[   75.898980]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.906292]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.913602] ==================================================================
[   68.373030] ==================================================================
[   68.380344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   68.387749] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   68.395238] 
[   68.396763] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   68.396791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.396799] Hardware name: Thundercomm Dragonboard 845c (DT)
[   68.396809] Call trace:
[   68.396816]  show_stack+0x20/0x38 (C)
[   68.396833]  dump_stack_lvl+0x8c/0xd0
[   68.396851]  print_report+0x118/0x608
[   68.396869]  kasan_report+0xdc/0x128
[   68.396887]  kasan_check_range+0x100/0x1a8
[   68.396908]  __kasan_check_write+0x20/0x30
[   68.396925]  kasan_atomics_helper+0xe44/0x4858
[   68.396942]  kasan_atomics+0x198/0x2e0
[   68.396959]  kunit_try_run_case+0x170/0x3f0
[   68.396976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.396998]  kthread+0x328/0x630
[   68.397011]  ret_from_fork+0x10/0x20
[   68.397027] 
[   68.470186] Allocated by task 351:
[   68.473642]  kasan_save_stack+0x3c/0x68
[   68.477539]  kasan_save_track+0x20/0x40
[   68.481436]  kasan_save_alloc_info+0x40/0x58
[   68.485775]  __kasan_kmalloc+0xd4/0xd8
[   68.489583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   68.494185]  kasan_atomics+0xb8/0x2e0
[   68.497906]  kunit_try_run_case+0x170/0x3f0
[   68.502161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   68.507730]  kthread+0x328/0x630
[   68.511015]  ret_from_fork+0x10/0x20
[   68.514650] 
[   68.516171] The buggy address belongs to the object at ffff0000934cf200
[   68.516171]  which belongs to the cache kmalloc-64 of size 64
[   68.528650] The buggy address is located 0 bytes to the right of
[   68.528650]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   68.541654] 
[   68.543177] The buggy address belongs to the physical page:
[   68.548824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   68.556921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   68.563530] page_type: f5(slab)
[   68.566729] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   68.574567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.582400] page dumped because: kasan: bad access detected
[   68.588046] 
[   68.589568] Memory state around the buggy address:
[   68.594423]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.601735]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.609048] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.616359]                                      ^
[   68.621216]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.628528]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.635840] ==================================================================
[   62.722848] ==================================================================
[   62.730160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   62.737566] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   62.745055] 
[   62.746581] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   62.746609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.746617] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.746628] Call trace:
[   62.746634]  show_stack+0x20/0x38 (C)
[   62.746650]  dump_stack_lvl+0x8c/0xd0
[   62.746668]  print_report+0x118/0x608
[   62.746686]  kasan_report+0xdc/0x128
[   62.746704]  kasan_check_range+0x100/0x1a8
[   62.746722]  __kasan_check_write+0x20/0x30
[   62.746738]  kasan_atomics_helper+0x6ec/0x4858
[   62.746756]  kasan_atomics+0x198/0x2e0
[   62.746774]  kunit_try_run_case+0x170/0x3f0
[   62.746792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.746812]  kthread+0x328/0x630
[   62.746826]  ret_from_fork+0x10/0x20
[   62.746842] 
[   62.820003] Allocated by task 351:
[   62.823459]  kasan_save_stack+0x3c/0x68
[   62.827357]  kasan_save_track+0x20/0x40
[   62.831254]  kasan_save_alloc_info+0x40/0x58
[   62.835593]  __kasan_kmalloc+0xd4/0xd8
[   62.839401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.844004]  kasan_atomics+0xb8/0x2e0
[   62.847727]  kunit_try_run_case+0x170/0x3f0
[   62.851980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.857539]  kthread+0x328/0x630
[   62.860825]  ret_from_fork+0x10/0x20
[   62.864461] 
[   62.865984] The buggy address belongs to the object at ffff0000934cf200
[   62.865984]  which belongs to the cache kmalloc-64 of size 64
[   62.878467] The buggy address is located 0 bytes to the right of
[   62.878467]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   62.891471] 
[   62.892995] The buggy address belongs to the physical page:
[   62.898642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   62.906739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.913348] page_type: f5(slab)
[   62.916548] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.924386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.932219] page dumped because: kasan: bad access detected
[   62.937867] 
[   62.939390] Memory state around the buggy address:
[   62.944245]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.951559]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.958873] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.966185]                                      ^
[   62.971041]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.978354]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.985665] ==================================================================
[   61.642068] ==================================================================
[   61.649382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   61.656787] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   61.664278] 
[   61.665803] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   61.665831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.665838] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.665847] Call trace:
[   61.665853]  show_stack+0x20/0x38 (C)
[   61.665869]  dump_stack_lvl+0x8c/0xd0
[   61.665887]  print_report+0x118/0x608
[   61.665904]  kasan_report+0xdc/0x128
[   61.665922]  kasan_check_range+0x100/0x1a8
[   61.665941]  __kasan_check_write+0x20/0x30
[   61.665957]  kasan_atomics_helper+0x54c/0x4858
[   61.665974]  kasan_atomics+0x198/0x2e0
[   61.665991]  kunit_try_run_case+0x170/0x3f0
[   61.666009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.666029]  kthread+0x328/0x630
[   61.666041]  ret_from_fork+0x10/0x20
[   61.666057] 
[   61.739214] Allocated by task 351:
[   61.742670]  kasan_save_stack+0x3c/0x68
[   61.746567]  kasan_save_track+0x20/0x40
[   61.750464]  kasan_save_alloc_info+0x40/0x58
[   61.754801]  __kasan_kmalloc+0xd4/0xd8
[   61.758610]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.763211]  kasan_atomics+0xb8/0x2e0
[   61.766933]  kunit_try_run_case+0x170/0x3f0
[   61.771187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.776755]  kthread+0x328/0x630
[   61.780041]  ret_from_fork+0x10/0x20
[   61.783676] 
[   61.785198] The buggy address belongs to the object at ffff0000934cf200
[   61.785198]  which belongs to the cache kmalloc-64 of size 64
[   61.797676] The buggy address is located 0 bytes to the right of
[   61.797676]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   61.810679] 
[   61.812203] The buggy address belongs to the physical page:
[   61.817849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   61.825946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.832554] page_type: f5(slab)
[   61.835754] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.843592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.851424] page dumped because: kasan: bad access detected
[   61.857072] 
[   61.858594] Memory state around the buggy address:
[   61.863450]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.870763]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.878075] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.885387]                                      ^
[   61.890244]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.897557]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.904869] ==================================================================
[   71.072363] ==================================================================
[   71.079679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   71.087173] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   71.094666] 
[   71.096191] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   71.096222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.096231] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.096241] Call trace:
[   71.096246]  show_stack+0x20/0x38 (C)
[   71.096264]  dump_stack_lvl+0x8c/0xd0
[   71.096283]  print_report+0x118/0x608
[   71.096301]  kasan_report+0xdc/0x128
[   71.096318]  kasan_check_range+0x100/0x1a8
[   71.096338]  __kasan_check_write+0x20/0x30
[   71.096355]  kasan_atomics_helper+0x11f8/0x4858
[   71.096375]  kasan_atomics+0x198/0x2e0
[   71.096392]  kunit_try_run_case+0x170/0x3f0
[   71.096409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.096430]  kthread+0x328/0x630
[   71.096443]  ret_from_fork+0x10/0x20
[   71.096460] 
[   71.169695] Allocated by task 351:
[   71.173152]  kasan_save_stack+0x3c/0x68
[   71.177051]  kasan_save_track+0x20/0x40
[   71.180947]  kasan_save_alloc_info+0x40/0x58
[   71.185285]  __kasan_kmalloc+0xd4/0xd8
[   71.189095]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.193697]  kasan_atomics+0xb8/0x2e0
[   71.197419]  kunit_try_run_case+0x170/0x3f0
[   71.201672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.207241]  kthread+0x328/0x630
[   71.210526]  ret_from_fork+0x10/0x20
[   71.214162] 
[   71.215684] The buggy address belongs to the object at ffff0000934cf200
[   71.215684]  which belongs to the cache kmalloc-64 of size 64
[   71.228165] The buggy address is located 0 bytes to the right of
[   71.228165]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   71.241170] 
[   71.242693] The buggy address belongs to the physical page:
[   71.248339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   71.256436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.263046] page_type: f5(slab)
[   71.266245] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.274083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.281916] page dumped because: kasan: bad access detected
[   71.287562] 
[   71.289085] Memory state around the buggy address:
[   71.293941]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.301254]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.308567] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.315878]                                      ^
[   71.320735]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.328047]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.335358] ==================================================================
[   64.881056] ==================================================================
[   64.888373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   64.895781] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   64.903273] 
[   64.904801] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   64.904831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.904839] Hardware name: Thundercomm Dragonboard 845c (DT)
[   64.904849] Call trace:
[   64.904855]  show_stack+0x20/0x38 (C)
[   64.904874]  dump_stack_lvl+0x8c/0xd0
[   64.904892]  print_report+0x118/0x608
[   64.904911]  kasan_report+0xdc/0x128
[   64.904929]  kasan_check_range+0x100/0x1a8
[   64.904948]  __kasan_check_write+0x20/0x30
[   64.904963]  kasan_atomics_helper+0xa6c/0x4858
[   64.904983]  kasan_atomics+0x198/0x2e0
[   64.905000]  kunit_try_run_case+0x170/0x3f0
[   64.905019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.905039]  kthread+0x328/0x630
[   64.905052]  ret_from_fork+0x10/0x20
[   64.905069] 
[   64.978231] Allocated by task 351:
[   64.981689]  kasan_save_stack+0x3c/0x68
[   64.985588]  kasan_save_track+0x20/0x40
[   64.989486]  kasan_save_alloc_info+0x40/0x58
[   64.993824]  __kasan_kmalloc+0xd4/0xd8
[   64.997632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.002234]  kasan_atomics+0xb8/0x2e0
[   65.005956]  kunit_try_run_case+0x170/0x3f0
[   65.010211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.015769]  kthread+0x328/0x630
[   65.019056]  ret_from_fork+0x10/0x20
[   65.022690] 
[   65.024214] The buggy address belongs to the object at ffff0000934cf200
[   65.024214]  which belongs to the cache kmalloc-64 of size 64
[   65.036696] The buggy address is located 0 bytes to the right of
[   65.036696]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   65.049700] 
[   65.051225] The buggy address belongs to the physical page:
[   65.056872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   65.064969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.071579] page_type: f5(slab)
[   65.074779] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.082618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.090451] page dumped because: kasan: bad access detected
[   65.096098] 
[   65.097622] Memory state around the buggy address:
[   65.102478]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.109791]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.117106] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.124417]                                      ^
[   65.129275]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.136587]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.143899] ==================================================================
[   60.294195] ==================================================================
[   60.301517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   60.309019] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   60.316514] 
[   60.318043] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   60.318073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.318082] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.318094] Call trace:
[   60.318102]  show_stack+0x20/0x38 (C)
[   60.318121]  dump_stack_lvl+0x8c/0xd0
[   60.318141]  print_report+0x118/0x608
[   60.318160]  kasan_report+0xdc/0x128
[   60.318178]  __asan_report_store4_noabort+0x20/0x30
[   60.318195]  kasan_atomics_helper+0x3f94/0x4858
[   60.318215]  kasan_atomics+0x198/0x2e0
[   60.318232]  kunit_try_run_case+0x170/0x3f0
[   60.318249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.318271]  kthread+0x328/0x630
[   60.318285]  ret_from_fork+0x10/0x20
[   60.318303] 
[   60.388184] Allocated by task 351:
[   60.391640]  kasan_save_stack+0x3c/0x68
[   60.395547]  kasan_save_track+0x20/0x40
[   60.399451]  kasan_save_alloc_info+0x40/0x58
[   60.403784]  __kasan_kmalloc+0xd4/0xd8
[   60.407591]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.412189]  kasan_atomics+0xb8/0x2e0
[   60.415908]  kunit_try_run_case+0x170/0x3f0
[   60.420156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.425723]  kthread+0x328/0x630
[   60.429005]  ret_from_fork+0x10/0x20
[   60.432636] 
[   60.434159] The buggy address belongs to the object at ffff0000934cf200
[   60.434159]  which belongs to the cache kmalloc-64 of size 64
[   60.446638] The buggy address is located 0 bytes to the right of
[   60.446638]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   60.459649] 
[   60.461171] The buggy address belongs to the physical page:
[   60.466816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   60.474915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.481528] page_type: f5(slab)
[   60.484723] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   60.492566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.500397] page dumped because: kasan: bad access detected
[   60.506040] 
[   60.507571] Memory state around the buggy address:
[   60.512424]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.519741]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.527051] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.534363]                                      ^
[   60.539216]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.546523]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.553836] ==================================================================
[   65.421457] ==================================================================
[   65.428771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   65.436265] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   65.443668] 
[   65.445195] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   65.445224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.445233] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.445244] Call trace:
[   65.445250]  show_stack+0x20/0x38 (C)
[   65.445267]  dump_stack_lvl+0x8c/0xd0
[   65.445284]  print_report+0x118/0x608
[   65.445302]  kasan_report+0xdc/0x128
[   65.445320]  __asan_report_load4_noabort+0x20/0x30
[   65.445337]  kasan_atomics_helper+0x3dcc/0x4858
[   65.445355]  kasan_atomics+0x198/0x2e0
[   65.445372]  kunit_try_run_case+0x170/0x3f0
[   65.445390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.445411]  kthread+0x328/0x630
[   65.445425]  ret_from_fork+0x10/0x20
[   65.445441] 
[   65.515244] Allocated by task 351:
[   65.518701]  kasan_save_stack+0x3c/0x68
[   65.522600]  kasan_save_track+0x20/0x40
[   65.526499]  kasan_save_alloc_info+0x40/0x58
[   65.530838]  __kasan_kmalloc+0xd4/0xd8
[   65.534646]  __kmalloc_cache_noprof+0x16c/0x3c0
[   65.539249]  kasan_atomics+0xb8/0x2e0
[   65.542970]  kunit_try_run_case+0x170/0x3f0
[   65.547225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.552795]  kthread+0x328/0x630
[   65.556081]  ret_from_fork+0x10/0x20
[   65.559717] 
[   65.561239] The buggy address belongs to the object at ffff0000934cf200
[   65.561239]  which belongs to the cache kmalloc-64 of size 64
[   65.573721] The buggy address is located 0 bytes to the right of
[   65.573721]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   65.586724] 
[   65.588248] The buggy address belongs to the physical page:
[   65.593896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   65.601993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   65.608602] page_type: f5(slab)
[   65.611802] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   65.619639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.627473] page dumped because: kasan: bad access detected
[   65.633121] 
[   65.634642] Memory state around the buggy address:
[   65.639499]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.646812]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.654126] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.661438]                                      ^
[   65.666295]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.673608]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.680919] ==================================================================
[   58.402238] ==================================================================
[   58.417295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   58.424797] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   58.432208] 
[   58.433739] CPU: 7 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   58.433771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.433780] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.433795] Call trace:
[   58.433802]  show_stack+0x20/0x38 (C)
[   58.433822]  dump_stack_lvl+0x8c/0xd0
[   58.433841]  print_report+0x118/0x608
[   58.433860]  kasan_report+0xdc/0x128
[   58.433878]  __asan_report_load4_noabort+0x20/0x30
[   58.433895]  kasan_atomics_helper+0x40a8/0x4858
[   58.433914]  kasan_atomics+0x198/0x2e0
[   58.433932]  kunit_try_run_case+0x170/0x3f0
[   58.433952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.433973]  kthread+0x328/0x630
[   58.433989]  ret_from_fork+0x10/0x20
[   58.434007] 
[   58.503820] Allocated by task 351:
[   58.507278]  kasan_save_stack+0x3c/0x68
[   58.511175]  kasan_save_track+0x20/0x40
[   58.515069]  kasan_save_alloc_info+0x40/0x58
[   58.519403]  __kasan_kmalloc+0xd4/0xd8
[   58.523210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.527805]  kasan_atomics+0xb8/0x2e0
[   58.531524]  kunit_try_run_case+0x170/0x3f0
[   58.535774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.541340]  kthread+0x328/0x630
[   58.544621]  ret_from_fork+0x10/0x20
[   58.548253] 
[   58.549777] The buggy address belongs to the object at ffff0000934cf200
[   58.549777]  which belongs to the cache kmalloc-64 of size 64
[   58.562259] The buggy address is located 0 bytes to the right of
[   58.562259]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   58.575264] 
[   58.576796] The buggy address belongs to the physical page:
[   58.582438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   58.590537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.597148] page_type: f5(slab)
[   58.600343] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   58.608183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.616018] page dumped because: kasan: bad access detected
[   58.621659] 
[   58.623191] Memory state around the buggy address:
[   58.628049]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.635366]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.642680] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.649993]                                      ^
[   58.654845]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.662159]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.669472] ==================================================================
[   72.690986] ==================================================================
[   72.698299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   72.705791] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   72.713281] 
[   72.714806] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   72.714834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.714843] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.714853] Call trace:
[   72.714859]  show_stack+0x20/0x38 (C)
[   72.714876]  dump_stack_lvl+0x8c/0xd0
[   72.714893]  print_report+0x118/0x608
[   72.714912]  kasan_report+0xdc/0x128
[   72.714930]  kasan_check_range+0x100/0x1a8
[   72.714949]  __kasan_check_write+0x20/0x30
[   72.714964]  kasan_atomics_helper+0x147c/0x4858
[   72.714983]  kasan_atomics+0x198/0x2e0
[   72.715000]  kunit_try_run_case+0x170/0x3f0
[   72.715018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.715039]  kthread+0x328/0x630
[   72.715052]  ret_from_fork+0x10/0x20
[   72.715069] 
[   72.788302] Allocated by task 351:
[   72.791758]  kasan_save_stack+0x3c/0x68
[   72.795657]  kasan_save_track+0x20/0x40
[   72.799554]  kasan_save_alloc_info+0x40/0x58
[   72.803893]  __kasan_kmalloc+0xd4/0xd8
[   72.807702]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.812304]  kasan_atomics+0xb8/0x2e0
[   72.816026]  kunit_try_run_case+0x170/0x3f0
[   72.820279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.825848]  kthread+0x328/0x630
[   72.829135]  ret_from_fork+0x10/0x20
[   72.832771] 
[   72.834293] The buggy address belongs to the object at ffff0000934cf200
[   72.834293]  which belongs to the cache kmalloc-64 of size 64
[   72.846774] The buggy address is located 0 bytes to the right of
[   72.846774]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   72.859777] 
[   72.861301] The buggy address belongs to the physical page:
[   72.866948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   72.875044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.881653] page_type: f5(slab)
[   72.884853] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.892690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.900523] page dumped because: kasan: bad access detected
[   72.906170] 
[   72.907692] Memory state around the buggy address:
[   72.912548]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.919861]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.927175] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.934487]                                      ^
[   72.939343]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.946656]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.953966] ==================================================================
[   72.961349] ==================================================================
[   72.968663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   72.976155] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   72.983645] 
[   72.985170] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   72.985198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.985207] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.985217] Call trace:
[   72.985222]  show_stack+0x20/0x38 (C)
[   72.985239]  dump_stack_lvl+0x8c/0xd0
[   72.985257]  print_report+0x118/0x608
[   72.985275]  kasan_report+0xdc/0x128
[   72.985294]  kasan_check_range+0x100/0x1a8
[   72.985313]  __kasan_check_write+0x20/0x30
[   72.985329]  kasan_atomics_helper+0x14e4/0x4858
[   72.985347]  kasan_atomics+0x198/0x2e0
[   72.985364]  kunit_try_run_case+0x170/0x3f0
[   72.985381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.985402]  kthread+0x328/0x630
[   72.985416]  ret_from_fork+0x10/0x20
[   72.985432] 
[   73.058677] Allocated by task 351:
[   73.062133]  kasan_save_stack+0x3c/0x68
[   73.066032]  kasan_save_track+0x20/0x40
[   73.069929]  kasan_save_alloc_info+0x40/0x58
[   73.074267]  __kasan_kmalloc+0xd4/0xd8
[   73.078076]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.082678]  kasan_atomics+0xb8/0x2e0
[   73.086400]  kunit_try_run_case+0x170/0x3f0
[   73.090653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.096222]  kthread+0x328/0x630
[   73.099509]  ret_from_fork+0x10/0x20
[   73.103143] 
[   73.104666] The buggy address belongs to the object at ffff0000934cf200
[   73.104666]  which belongs to the cache kmalloc-64 of size 64
[   73.117146] The buggy address is located 0 bytes to the right of
[   73.117146]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   73.130149] 
[   73.131672] The buggy address belongs to the physical page:
[   73.137318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   73.145415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.152023] page_type: f5(slab)
[   73.155222] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.163060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.170893] page dumped because: kasan: bad access detected
[   73.176540] 
[   73.178063] Memory state around the buggy address:
[   73.182919]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.190232]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.197546] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.204856]                                      ^
[   73.209712]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.217024]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.224334] ==================================================================
[   73.772384] ==================================================================
[   73.779698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   73.787191] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   73.794594] 
[   73.796119] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   73.796147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.796155] Hardware name: Thundercomm Dragonboard 845c (DT)
[   73.796164] Call trace:
[   73.796170]  show_stack+0x20/0x38 (C)
[   73.796187]  dump_stack_lvl+0x8c/0xd0
[   73.796204]  print_report+0x118/0x608
[   73.796223]  kasan_report+0xdc/0x128
[   73.796241]  __asan_report_load8_noabort+0x20/0x30
[   73.796257]  kasan_atomics_helper+0x3db0/0x4858
[   73.796276]  kasan_atomics+0x198/0x2e0
[   73.796292]  kunit_try_run_case+0x170/0x3f0
[   73.796310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.796330]  kthread+0x328/0x630
[   73.796343]  ret_from_fork+0x10/0x20
[   73.796359] 
[   73.866149] Allocated by task 351:
[   73.869606]  kasan_save_stack+0x3c/0x68
[   73.873504]  kasan_save_track+0x20/0x40
[   73.877400]  kasan_save_alloc_info+0x40/0x58
[   73.881738]  __kasan_kmalloc+0xd4/0xd8
[   73.885547]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.890149]  kasan_atomics+0xb8/0x2e0
[   73.893870]  kunit_try_run_case+0x170/0x3f0
[   73.898123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.903692]  kthread+0x328/0x630
[   73.906977]  ret_from_fork+0x10/0x20
[   73.910612] 
[   73.912134] The buggy address belongs to the object at ffff0000934cf200
[   73.912134]  which belongs to the cache kmalloc-64 of size 64
[   73.924613] The buggy address is located 0 bytes to the right of
[   73.924613]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   73.937616] 
[   73.939138] The buggy address belongs to the physical page:
[   73.944784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   73.952880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.959488] page_type: f5(slab)
[   73.962687] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.970524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.978358] page dumped because: kasan: bad access detected
[   73.984004] 
[   73.985526] Memory state around the buggy address:
[   73.990381]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.997693]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.005006] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.012317]                                      ^
[   74.017174]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.024486]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.031796] ==================================================================
[   65.958472] ==================================================================
[   65.965785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   65.973280] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   65.980683] 
[   65.982208] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   65.982236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.982245] Hardware name: Thundercomm Dragonboard 845c (DT)
[   65.982256] Call trace:
[   65.982264]  show_stack+0x20/0x38 (C)
[   65.982281]  dump_stack_lvl+0x8c/0xd0
[   65.982298]  print_report+0x118/0x608
[   65.982316]  kasan_report+0xdc/0x128
[   65.982335]  __asan_report_load4_noabort+0x20/0x30
[   65.982351]  kasan_atomics_helper+0x3dbc/0x4858
[   65.982369]  kasan_atomics+0x198/0x2e0
[   65.982385]  kunit_try_run_case+0x170/0x3f0
[   65.982403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.982423]  kthread+0x328/0x630
[   65.982437]  ret_from_fork+0x10/0x20
[   65.982454] 
[   66.052253] Allocated by task 351:
[   66.055710]  kasan_save_stack+0x3c/0x68
[   66.059609]  kasan_save_track+0x20/0x40
[   66.063506]  kasan_save_alloc_info+0x40/0x58
[   66.067845]  __kasan_kmalloc+0xd4/0xd8
[   66.071654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.076256]  kasan_atomics+0xb8/0x2e0
[   66.079978]  kunit_try_run_case+0x170/0x3f0
[   66.084231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.089800]  kthread+0x328/0x630
[   66.093087]  ret_from_fork+0x10/0x20
[   66.096722] 
[   66.098245] The buggy address belongs to the object at ffff0000934cf200
[   66.098245]  which belongs to the cache kmalloc-64 of size 64
[   66.110725] The buggy address is located 0 bytes to the right of
[   66.110725]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   66.123730] 
[   66.125253] The buggy address belongs to the physical page:
[   66.130900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   66.138998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.145606] page_type: f5(slab)
[   66.148806] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.156644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.164478] page dumped because: kasan: bad access detected
[   66.170126] 
[   66.171648] Memory state around the buggy address:
[   66.176503]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.183818]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.191131] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.198441]                                      ^
[   66.203299]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.210613]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.217924] ==================================================================
[   61.371886] ==================================================================
[   61.379201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   61.386607] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   61.394098] 
[   61.395624] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   61.395653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.395660] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.395670] Call trace:
[   61.395676]  show_stack+0x20/0x38 (C)
[   61.395693]  dump_stack_lvl+0x8c/0xd0
[   61.395710]  print_report+0x118/0x608
[   61.395728]  kasan_report+0xdc/0x128
[   61.395745]  kasan_check_range+0x100/0x1a8
[   61.395766]  __kasan_check_write+0x20/0x30
[   61.395780]  kasan_atomics_helper+0x4e4/0x4858
[   61.395797]  kasan_atomics+0x198/0x2e0
[   61.395814]  kunit_try_run_case+0x170/0x3f0
[   61.395831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.395852]  kthread+0x328/0x630
[   61.395865]  ret_from_fork+0x10/0x20
[   61.395882] 
[   61.469039] Allocated by task 351:
[   61.472495]  kasan_save_stack+0x3c/0x68
[   61.476393]  kasan_save_track+0x20/0x40
[   61.480290]  kasan_save_alloc_info+0x40/0x58
[   61.484628]  __kasan_kmalloc+0xd4/0xd8
[   61.488437]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.493038]  kasan_atomics+0xb8/0x2e0
[   61.496761]  kunit_try_run_case+0x170/0x3f0
[   61.501014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.506573]  kthread+0x328/0x630
[   61.509860]  ret_from_fork+0x10/0x20
[   61.513495] 
[   61.515018] The buggy address belongs to the object at ffff0000934cf200
[   61.515018]  which belongs to the cache kmalloc-64 of size 64
[   61.527493] The buggy address is located 0 bytes to the right of
[   61.527493]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   61.540496] 
[   61.542019] The buggy address belongs to the physical page:
[   61.547664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   61.555762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.562370] page_type: f5(slab)
[   61.565568] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.573406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.581239] page dumped because: kasan: bad access detected
[   61.586886] 
[   61.588408] Memory state around the buggy address:
[   61.593264]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.600577]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.607891] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.615202]                                      ^
[   61.620058]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.627371]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.634682] ==================================================================
[   61.912278] ==================================================================
[   61.919594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   61.927001] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   61.934491] 
[   61.936018] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   61.936045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.936053] Hardware name: Thundercomm Dragonboard 845c (DT)
[   61.936064] Call trace:
[   61.936070]  show_stack+0x20/0x38 (C)
[   61.936087]  dump_stack_lvl+0x8c/0xd0
[   61.936105]  print_report+0x118/0x608
[   61.936123]  kasan_report+0xdc/0x128
[   61.936141]  kasan_check_range+0x100/0x1a8
[   61.936161]  __kasan_check_write+0x20/0x30
[   61.936176]  kasan_atomics_helper+0x5b4/0x4858
[   61.936194]  kasan_atomics+0x198/0x2e0
[   61.936211]  kunit_try_run_case+0x170/0x3f0
[   61.936228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.936249]  kthread+0x328/0x630
[   61.936263]  ret_from_fork+0x10/0x20
[   61.936279] 
[   62.009439] Allocated by task 351:
[   62.012895]  kasan_save_stack+0x3c/0x68
[   62.016795]  kasan_save_track+0x20/0x40
[   62.020692]  kasan_save_alloc_info+0x40/0x58
[   62.025030]  __kasan_kmalloc+0xd4/0xd8
[   62.028840]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.033442]  kasan_atomics+0xb8/0x2e0
[   62.037164]  kunit_try_run_case+0x170/0x3f0
[   62.041417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.046978]  kthread+0x328/0x630
[   62.050263]  ret_from_fork+0x10/0x20
[   62.053897] 
[   62.055420] The buggy address belongs to the object at ffff0000934cf200
[   62.055420]  which belongs to the cache kmalloc-64 of size 64
[   62.067900] The buggy address is located 0 bytes to the right of
[   62.067900]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   62.080903] 
[   62.082426] The buggy address belongs to the physical page:
[   62.088073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   62.096169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.102778] page_type: f5(slab)
[   62.105977] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.113813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.121647] page dumped because: kasan: bad access detected
[   62.127294] 
[   62.128817] Memory state around the buggy address:
[   62.133673]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.140987]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.148300] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.155611]                                      ^
[   62.160468]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.167780]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.175091] ==================================================================
[   62.182481] ==================================================================
[   62.189795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   62.197201] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   62.204692] 
[   62.206217] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   62.206245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.206252] Hardware name: Thundercomm Dragonboard 845c (DT)
[   62.206262] Call trace:
[   62.206268]  show_stack+0x20/0x38 (C)
[   62.206286]  dump_stack_lvl+0x8c/0xd0
[   62.206303]  print_report+0x118/0x608
[   62.206321]  kasan_report+0xdc/0x128
[   62.206338]  kasan_check_range+0x100/0x1a8
[   62.206357]  __kasan_check_write+0x20/0x30
[   62.206372]  kasan_atomics_helper+0x61c/0x4858
[   62.206391]  kasan_atomics+0x198/0x2e0
[   62.206407]  kunit_try_run_case+0x170/0x3f0
[   62.206425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.206444]  kthread+0x328/0x630
[   62.206457]  ret_from_fork+0x10/0x20
[   62.206473] 
[   62.279631] Allocated by task 351:
[   62.283087]  kasan_save_stack+0x3c/0x68
[   62.286986]  kasan_save_track+0x20/0x40
[   62.290884]  kasan_save_alloc_info+0x40/0x58
[   62.295222]  __kasan_kmalloc+0xd4/0xd8
[   62.299031]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.303633]  kasan_atomics+0xb8/0x2e0
[   62.307354]  kunit_try_run_case+0x170/0x3f0
[   62.311608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.317177]  kthread+0x328/0x630
[   62.320462]  ret_from_fork+0x10/0x20
[   62.324097] 
[   62.325619] The buggy address belongs to the object at ffff0000934cf200
[   62.325619]  which belongs to the cache kmalloc-64 of size 64
[   62.338099] The buggy address is located 0 bytes to the right of
[   62.338099]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   62.351103] 
[   62.352627] The buggy address belongs to the physical page:
[   62.358273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   62.366370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.372978] page_type: f5(slab)
[   62.376177] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   62.384014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.391848] page dumped because: kasan: bad access detected
[   62.397496] 
[   62.399019] Memory state around the buggy address:
[   62.403875]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.411188]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.418502] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.425813]                                      ^
[   62.430670]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.437982]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.445293] ==================================================================
[   58.944180] ==================================================================
[   58.951512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   58.958930] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   58.966333] 
[   58.967869] CPU: 0 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   58.967899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.967909] Hardware name: Thundercomm Dragonboard 845c (DT)
[   58.967921] Call trace:
[   58.967930]  show_stack+0x20/0x38 (C)
[   58.967948]  dump_stack_lvl+0x8c/0xd0
[   58.967967]  print_report+0x118/0x608
[   58.967988]  kasan_report+0xdc/0x128
[   58.968008]  kasan_check_range+0x100/0x1a8
[   58.968029]  __kasan_check_read+0x20/0x30
[   58.968047]  kasan_atomics_helper+0x1ec/0x4858
[   58.968066]  kasan_atomics+0x198/0x2e0
[   58.968086]  kunit_try_run_case+0x170/0x3f0
[   58.968106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.968128]  kthread+0x328/0x630
[   58.968143]  ret_from_fork+0x10/0x20
[   58.968161] 
[   59.041274] Allocated by task 351:
[   59.044740]  kasan_save_stack+0x3c/0x68
[   59.048647]  kasan_save_track+0x20/0x40
[   59.052553]  kasan_save_alloc_info+0x40/0x58
[   59.056898]  __kasan_kmalloc+0xd4/0xd8
[   59.060715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.065322]  kasan_atomics+0xb8/0x2e0
[   59.069053]  kunit_try_run_case+0x170/0x3f0
[   59.073316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.078886]  kthread+0x328/0x630
[   59.082174]  ret_from_fork+0x10/0x20
[   59.085817] 
[   59.087348] The buggy address belongs to the object at ffff0000934cf200
[   59.087348]  which belongs to the cache kmalloc-64 of size 64
[   59.099837] The buggy address is located 0 bytes to the right of
[   59.099837]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   59.112845] 
[   59.114377] The buggy address belongs to the physical page:
[   59.120023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   59.128128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.134745] page_type: f5(slab)
[   59.137945] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.145794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.153636] page dumped because: kasan: bad access detected
[   59.159283] 
[   59.160813] Memory state around the buggy address:
[   59.165672]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.172988]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.180304] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.187618]                                      ^
[   59.192480]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.199795]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.207108] ==================================================================
[   60.831486] ==================================================================
[   60.838796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   60.846196] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   60.853680] 
[   60.855206] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   60.855235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.855244] Hardware name: Thundercomm Dragonboard 845c (DT)
[   60.855255] Call trace:
[   60.855261]  show_stack+0x20/0x38 (C)
[   60.855278]  dump_stack_lvl+0x8c/0xd0
[   60.855297]  print_report+0x118/0x608
[   60.855315]  kasan_report+0xdc/0x128
[   60.855334]  kasan_check_range+0x100/0x1a8
[   60.855353]  __kasan_check_write+0x20/0x30
[   60.855371]  kasan_atomics_helper+0x414/0x4858
[   60.855389]  kasan_atomics+0x198/0x2e0
[   60.855406]  kunit_try_run_case+0x170/0x3f0
[   60.855423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.855445]  kthread+0x328/0x630
[   60.855458]  ret_from_fork+0x10/0x20
[   60.855475] 
[   60.928624] Allocated by task 351:
[   60.932080]  kasan_save_stack+0x3c/0x68
[   60.935979]  kasan_save_track+0x20/0x40
[   60.939875]  kasan_save_alloc_info+0x40/0x58
[   60.944214]  __kasan_kmalloc+0xd4/0xd8
[   60.948023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.952627]  kasan_atomics+0xb8/0x2e0
[   60.956349]  kunit_try_run_case+0x170/0x3f0
[   60.960601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.966171]  kthread+0x328/0x630
[   60.969458]  ret_from_fork+0x10/0x20
[   60.973093] 
[   60.974616] The buggy address belongs to the object at ffff0000934cf200
[   60.974616]  which belongs to the cache kmalloc-64 of size 64
[   60.987098] The buggy address is located 0 bytes to the right of
[   60.987098]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   61.000102] 
[   61.001626] The buggy address belongs to the physical page:
[   61.007273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   61.015370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.021981] page_type: f5(slab)
[   61.025181] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   61.033018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.040852] page dumped because: kasan: bad access detected
[   61.046499] 
[   61.048021] Memory state around the buggy address:
[   61.052877]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.060191]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.067504] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.074815]                                      ^
[   61.079672]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.086985]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.094296] ==================================================================
[   59.214550] ==================================================================
[   59.221877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   59.229294] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   59.236798] 
[   59.238331] CPU: 0 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   59.238362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.238371] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.238385] Call trace:
[   59.238394]  show_stack+0x20/0x38 (C)
[   59.238412]  dump_stack_lvl+0x8c/0xd0
[   59.238432]  print_report+0x118/0x608
[   59.238451]  kasan_report+0xdc/0x128
[   59.238473]  kasan_check_range+0x100/0x1a8
[   59.238495]  __kasan_check_write+0x20/0x30
[   59.238511]  kasan_atomics_helper+0x24c/0x4858
[   59.238531]  kasan_atomics+0x198/0x2e0
[   59.238550]  kunit_try_run_case+0x170/0x3f0
[   59.238568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.238591]  kthread+0x328/0x630
[   59.238607]  ret_from_fork+0x10/0x20
[   59.238625] 
[   59.311837] Allocated by task 351:
[   59.315299]  kasan_save_stack+0x3c/0x68
[   59.319211]  kasan_save_track+0x20/0x40
[   59.323121]  kasan_save_alloc_info+0x40/0x58
[   59.327460]  __kasan_kmalloc+0xd4/0xd8
[   59.331283]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.335893]  kasan_atomics+0xb8/0x2e0
[   59.339619]  kunit_try_run_case+0x170/0x3f0
[   59.343871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.349442]  kthread+0x328/0x630
[   59.352732]  ret_from_fork+0x10/0x20
[   59.356373] 
[   59.357902] The buggy address belongs to the object at ffff0000934cf200
[   59.357902]  which belongs to the cache kmalloc-64 of size 64
[   59.370393] The buggy address is located 0 bytes to the right of
[   59.370393]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   59.383410] 
[   59.384944] The buggy address belongs to the physical page:
[   59.390596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   59.398699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.405324] page_type: f5(slab)
[   59.408529] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.416376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.424218] page dumped because: kasan: bad access detected
[   59.429868] 
[   59.431397] Memory state around the buggy address:
[   59.436257]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.443576]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.450890] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.458213]                                      ^
[   59.463078]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.470394]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.477716] ==================================================================
[   74.846713] ==================================================================
[   74.854027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   74.861518] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   74.868920] 
[   74.870445] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   74.870474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.870482] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.870492] Call trace:
[   74.870498]  show_stack+0x20/0x38 (C)
[   74.870515]  dump_stack_lvl+0x8c/0xd0
[   74.870532]  print_report+0x118/0x608
[   74.870550]  kasan_report+0xdc/0x128
[   74.870568]  __asan_report_load8_noabort+0x20/0x30
[   74.870584]  kasan_atomics_helper+0x3e10/0x4858
[   74.870602]  kasan_atomics+0x198/0x2e0
[   74.870619]  kunit_try_run_case+0x170/0x3f0
[   74.870636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.870656]  kthread+0x328/0x630
[   74.870670]  ret_from_fork+0x10/0x20
[   74.870687] 
[   74.940498] Allocated by task 351:
[   74.943955]  kasan_save_stack+0x3c/0x68
[   74.947854]  kasan_save_track+0x20/0x40
[   74.951751]  kasan_save_alloc_info+0x40/0x58
[   74.956090]  __kasan_kmalloc+0xd4/0xd8
[   74.959900]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.964500]  kasan_atomics+0xb8/0x2e0
[   74.968222]  kunit_try_run_case+0x170/0x3f0
[   74.972475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.978046]  kthread+0x328/0x630
[   74.981331]  ret_from_fork+0x10/0x20
[   74.984966] 
[   74.986488] The buggy address belongs to the object at ffff0000934cf200
[   74.986488]  which belongs to the cache kmalloc-64 of size 64
[   74.998967] The buggy address is located 0 bytes to the right of
[   74.998967]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   75.011970] 
[   75.013493] The buggy address belongs to the physical page:
[   75.019139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   75.027237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   75.033845] page_type: f5(slab)
[   75.037044] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   75.044881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.052713] page dumped because: kasan: bad access detected
[   75.058360] 
[   75.059881] Memory state around the buggy address:
[   75.064736]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.072049]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.079361] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.086672]                                      ^
[   75.091527]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.098839]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.106149] ==================================================================
[   74.576359] ==================================================================
[   74.583673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   74.591164] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   74.598653] 
[   74.600178] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   74.600206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.600215] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.600224] Call trace:
[   74.600230]  show_stack+0x20/0x38 (C)
[   74.600246]  dump_stack_lvl+0x8c/0xd0
[   74.600264]  print_report+0x118/0x608
[   74.600283]  kasan_report+0xdc/0x128
[   74.600301]  kasan_check_range+0x100/0x1a8
[   74.600321]  __kasan_check_write+0x20/0x30
[   74.600336]  kasan_atomics_helper+0x16d0/0x4858
[   74.600355]  kasan_atomics+0x198/0x2e0
[   74.600371]  kunit_try_run_case+0x170/0x3f0
[   74.600389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.600410]  kthread+0x328/0x630
[   74.600424]  ret_from_fork+0x10/0x20
[   74.600441] 
[   74.673685] Allocated by task 351:
[   74.677141]  kasan_save_stack+0x3c/0x68
[   74.681039]  kasan_save_track+0x20/0x40
[   74.684936]  kasan_save_alloc_info+0x40/0x58
[   74.689275]  __kasan_kmalloc+0xd4/0xd8
[   74.693084]  __kmalloc_cache_noprof+0x16c/0x3c0
[   74.697686]  kasan_atomics+0xb8/0x2e0
[   74.701408]  kunit_try_run_case+0x170/0x3f0
[   74.705661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.711231]  kthread+0x328/0x630
[   74.714517]  ret_from_fork+0x10/0x20
[   74.718152] 
[   74.719675] The buggy address belongs to the object at ffff0000934cf200
[   74.719675]  which belongs to the cache kmalloc-64 of size 64
[   74.732154] The buggy address is located 0 bytes to the right of
[   74.732154]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   74.745157] 
[   74.746680] The buggy address belongs to the physical page:
[   74.752327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   74.760424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.767033] page_type: f5(slab)
[   74.770232] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   74.778070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.785903] page dumped because: kasan: bad access detected
[   74.791550] 
[   74.793073] Memory state around the buggy address:
[   74.797929]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.805241]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.812554] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.819864]                                      ^
[   74.824720]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.832032]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.839344] ==================================================================
[   73.231704] ==================================================================
[   73.239018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   73.246509] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   73.253999] 
[   73.255524] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   73.255552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.255560] Hardware name: Thundercomm Dragonboard 845c (DT)
[   73.255570] Call trace:
[   73.255576]  show_stack+0x20/0x38 (C)
[   73.255592]  dump_stack_lvl+0x8c/0xd0
[   73.255610]  print_report+0x118/0x608
[   73.255627]  kasan_report+0xdc/0x128
[   73.255646]  kasan_check_range+0x100/0x1a8
[   73.255665]  __kasan_check_write+0x20/0x30
[   73.255681]  kasan_atomics_helper+0x154c/0x4858
[   73.255699]  kasan_atomics+0x198/0x2e0
[   73.255715]  kunit_try_run_case+0x170/0x3f0
[   73.255732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.255752]  kthread+0x328/0x630
[   73.255765]  ret_from_fork+0x10/0x20
[   73.255781] 
[   73.329014] Allocated by task 351:
[   73.332470]  kasan_save_stack+0x3c/0x68
[   73.336368]  kasan_save_track+0x20/0x40
[   73.340265]  kasan_save_alloc_info+0x40/0x58
[   73.344603]  __kasan_kmalloc+0xd4/0xd8
[   73.348411]  __kmalloc_cache_noprof+0x16c/0x3c0
[   73.353013]  kasan_atomics+0xb8/0x2e0
[   73.356734]  kunit_try_run_case+0x170/0x3f0
[   73.360987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   73.366556]  kthread+0x328/0x630
[   73.369842]  ret_from_fork+0x10/0x20
[   73.373477] 
[   73.374999] The buggy address belongs to the object at ffff0000934cf200
[   73.374999]  which belongs to the cache kmalloc-64 of size 64
[   73.387479] The buggy address is located 0 bytes to the right of
[   73.387479]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   73.400484] 
[   73.402007] The buggy address belongs to the physical page:
[   73.407653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   73.415749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   73.422357] page_type: f5(slab)
[   73.425556] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   73.433392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.441225] page dumped because: kasan: bad access detected
[   73.446871] 
[   73.448393] Memory state around the buggy address:
[   73.453249]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.460561]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.467874] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.475184]                                      ^
[   73.480041]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.487352]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.494663] ==================================================================
[   70.531597] ==================================================================
[   70.538910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   70.546401] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   70.553891] 
[   70.555416] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   70.555445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.555454] Hardware name: Thundercomm Dragonboard 845c (DT)
[   70.555463] Call trace:
[   70.555469]  show_stack+0x20/0x38 (C)
[   70.555485]  dump_stack_lvl+0x8c/0xd0
[   70.555503]  print_report+0x118/0x608
[   70.555520]  kasan_report+0xdc/0x128
[   70.555538]  kasan_check_range+0x100/0x1a8
[   70.555557]  __kasan_check_write+0x20/0x30
[   70.555574]  kasan_atomics_helper+0x1128/0x4858
[   70.555593]  kasan_atomics+0x198/0x2e0
[   70.555610]  kunit_try_run_case+0x170/0x3f0
[   70.555628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.555647]  kthread+0x328/0x630
[   70.555660]  ret_from_fork+0x10/0x20
[   70.555677] 
[   70.628906] Allocated by task 351:
[   70.632363]  kasan_save_stack+0x3c/0x68
[   70.636260]  kasan_save_track+0x20/0x40
[   70.640157]  kasan_save_alloc_info+0x40/0x58
[   70.644495]  __kasan_kmalloc+0xd4/0xd8
[   70.648304]  __kmalloc_cache_noprof+0x16c/0x3c0
[   70.652906]  kasan_atomics+0xb8/0x2e0
[   70.656627]  kunit_try_run_case+0x170/0x3f0
[   70.660880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.666439]  kthread+0x328/0x630
[   70.669725]  ret_from_fork+0x10/0x20
[   70.673360] 
[   70.674882] The buggy address belongs to the object at ffff0000934cf200
[   70.674882]  which belongs to the cache kmalloc-64 of size 64
[   70.687361] The buggy address is located 0 bytes to the right of
[   70.687361]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   70.700367] 
[   70.701897] The buggy address belongs to the physical page:
[   70.707546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   70.715648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   70.722259] page_type: f5(slab)
[   70.725461] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   70.733299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.741132] page dumped because: kasan: bad access detected
[   70.746779] 
[   70.748302] Memory state around the buggy address:
[   70.753158]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.760471]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.767785] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.775097]                                      ^
[   70.779955]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.787268]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.794579] ==================================================================
[   66.495458] ==================================================================
[   66.502772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   66.510264] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   66.517669] 
[   66.519195] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   66.519224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.519231] Hardware name: Thundercomm Dragonboard 845c (DT)
[   66.519243] Call trace:
[   66.519249]  show_stack+0x20/0x38 (C)
[   66.519266]  dump_stack_lvl+0x8c/0xd0
[   66.519285]  print_report+0x118/0x608
[   66.519303]  kasan_report+0xdc/0x128
[   66.519321]  __asan_report_load4_noabort+0x20/0x30
[   66.519338]  kasan_atomics_helper+0x3de4/0x4858
[   66.519355]  kasan_atomics+0x198/0x2e0
[   66.519371]  kunit_try_run_case+0x170/0x3f0
[   66.519388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.519408]  kthread+0x328/0x630
[   66.519420]  ret_from_fork+0x10/0x20
[   66.519438] 
[   66.589248] Allocated by task 351:
[   66.592706]  kasan_save_stack+0x3c/0x68
[   66.596604]  kasan_save_track+0x20/0x40
[   66.600500]  kasan_save_alloc_info+0x40/0x58
[   66.604838]  __kasan_kmalloc+0xd4/0xd8
[   66.608647]  __kmalloc_cache_noprof+0x16c/0x3c0
[   66.613249]  kasan_atomics+0xb8/0x2e0
[   66.616971]  kunit_try_run_case+0x170/0x3f0
[   66.621224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.626784]  kthread+0x328/0x630
[   66.630071]  ret_from_fork+0x10/0x20
[   66.633706] 
[   66.635229] The buggy address belongs to the object at ffff0000934cf200
[   66.635229]  which belongs to the cache kmalloc-64 of size 64
[   66.647710] The buggy address is located 0 bytes to the right of
[   66.647710]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   66.660713] 
[   66.662237] The buggy address belongs to the physical page:
[   66.667883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   66.675980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   66.682589] page_type: f5(slab)
[   66.685788] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   66.693624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.701458] page dumped because: kasan: bad access detected
[   66.707104] 
[   66.708626] Memory state around the buggy address:
[   66.713482]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.720794]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.728107] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.735419]                                      ^
[   66.740275]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.747588]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.754899] ==================================================================
[   59.485876] ==================================================================
[   59.493205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   59.500617] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   59.508025] 
[   59.509555] CPU: 6 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   59.509587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.509595] Hardware name: Thundercomm Dragonboard 845c (DT)
[   59.509606] Call trace:
[   59.509614]  show_stack+0x20/0x38 (C)
[   59.509634]  dump_stack_lvl+0x8c/0xd0
[   59.509653]  print_report+0x118/0x608
[   59.509672]  kasan_report+0xdc/0x128
[   59.509691]  kasan_check_range+0x100/0x1a8
[   59.509711]  __kasan_check_read+0x20/0x30
[   59.509728]  kasan_atomics_helper+0x2b0/0x4858
[   59.509747]  kasan_atomics+0x198/0x2e0
[   59.509764]  kunit_try_run_case+0x170/0x3f0
[   59.509784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.509805]  kthread+0x328/0x630
[   59.509819]  ret_from_fork+0x10/0x20
[   59.509838] 
[   59.582909] Allocated by task 351:
[   59.586362]  kasan_save_stack+0x3c/0x68
[   59.590261]  kasan_save_track+0x20/0x40
[   59.594166]  kasan_save_alloc_info+0x40/0x58
[   59.598503]  __kasan_kmalloc+0xd4/0xd8
[   59.602319]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.606920]  kasan_atomics+0xb8/0x2e0
[   59.610638]  kunit_try_run_case+0x170/0x3f0
[   59.614891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.620455]  kthread+0x328/0x630
[   59.623737]  ret_from_fork+0x10/0x20
[   59.627369] 
[   59.628892] The buggy address belongs to the object at ffff0000934cf200
[   59.628892]  which belongs to the cache kmalloc-64 of size 64
[   59.641375] The buggy address is located 0 bytes to the right of
[   59.641375]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   59.654382] 
[   59.655914] The buggy address belongs to the physical page:
[   59.661560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   59.669663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.676276] page_type: f5(slab)
[   59.679473] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   59.687308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.695146] page dumped because: kasan: bad access detected
[   59.700787] 
[   59.702310] Memory state around the buggy address:
[   59.707161]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.714468]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.721775] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.729080]                                      ^
[   59.733936]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.741241]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.748545] ==================================================================
[   71.613109] ==================================================================
[   71.620420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   71.627913] Write of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   71.635403] 
[   71.636928] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   71.636957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.636965] Hardware name: Thundercomm Dragonboard 845c (DT)
[   71.636975] Call trace:
[   71.636980]  show_stack+0x20/0x38 (C)
[   71.636998]  dump_stack_lvl+0x8c/0xd0
[   71.637017]  print_report+0x118/0x608
[   71.637035]  kasan_report+0xdc/0x128
[   71.637052]  kasan_check_range+0x100/0x1a8
[   71.637071]  __kasan_check_write+0x20/0x30
[   71.637087]  kasan_atomics_helper+0x12d8/0x4858
[   71.637107]  kasan_atomics+0x198/0x2e0
[   71.637123]  kunit_try_run_case+0x170/0x3f0
[   71.637140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.637160]  kthread+0x328/0x630
[   71.637173]  ret_from_fork+0x10/0x20
[   71.637190] 
[   71.710436] Allocated by task 351:
[   71.713893]  kasan_save_stack+0x3c/0x68
[   71.717791]  kasan_save_track+0x20/0x40
[   71.721688]  kasan_save_alloc_info+0x40/0x58
[   71.726026]  __kasan_kmalloc+0xd4/0xd8
[   71.729836]  __kmalloc_cache_noprof+0x16c/0x3c0
[   71.734439]  kasan_atomics+0xb8/0x2e0
[   71.738160]  kunit_try_run_case+0x170/0x3f0
[   71.742413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   71.747983]  kthread+0x328/0x630
[   71.751268]  ret_from_fork+0x10/0x20
[   71.754903] 
[   71.756426] The buggy address belongs to the object at ffff0000934cf200
[   71.756426]  which belongs to the cache kmalloc-64 of size 64
[   71.768906] The buggy address is located 0 bytes to the right of
[   71.768906]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   71.781909] 
[   71.783432] The buggy address belongs to the physical page:
[   71.789079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   71.797176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   71.803784] page_type: f5(slab)
[   71.806983] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   71.814819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.822651] page dumped because: kasan: bad access detected
[   71.828298] 
[   71.829821] Memory state around the buggy address:
[   71.834677]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.841990]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.849302] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.856612]                                      ^
[   71.861468]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.868780]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.876091] ==================================================================
[   67.569410] ==================================================================
[   67.576721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   67.584212] Read of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   67.591615] 
[   67.593140] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   67.593169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.593177] Hardware name: Thundercomm Dragonboard 845c (DT)
[   67.593187] Call trace:
[   67.593193]  show_stack+0x20/0x38 (C)
[   67.593209]  dump_stack_lvl+0x8c/0xd0
[   67.593227]  print_report+0x118/0x608
[   67.593246]  kasan_report+0xdc/0x128
[   67.593264]  __asan_report_load4_noabort+0x20/0x30
[   67.593281]  kasan_atomics_helper+0x3e04/0x4858
[   67.593301]  kasan_atomics+0x198/0x2e0
[   67.593319]  kunit_try_run_case+0x170/0x3f0
[   67.593336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.593356]  kthread+0x328/0x630
[   67.593370]  ret_from_fork+0x10/0x20
[   67.593387] 
[   67.663184] Allocated by task 351:
[   67.666640]  kasan_save_stack+0x3c/0x68
[   67.670538]  kasan_save_track+0x20/0x40
[   67.674437]  kasan_save_alloc_info+0x40/0x58
[   67.678776]  __kasan_kmalloc+0xd4/0xd8
[   67.682584]  __kmalloc_cache_noprof+0x16c/0x3c0
[   67.687185]  kasan_atomics+0xb8/0x2e0
[   67.690907]  kunit_try_run_case+0x170/0x3f0
[   67.695160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.700718]  kthread+0x328/0x630
[   67.704005]  ret_from_fork+0x10/0x20
[   67.707639] 
[   67.709161] The buggy address belongs to the object at ffff0000934cf200
[   67.709161]  which belongs to the cache kmalloc-64 of size 64
[   67.721640] The buggy address is located 0 bytes to the right of
[   67.721640]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   67.734643] 
[   67.736168] The buggy address belongs to the physical page:
[   67.741815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   67.749910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   67.756520] page_type: f5(slab)
[   67.759718] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   67.767555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.775388] page dumped because: kasan: bad access detected
[   67.781035] 
[   67.782557] Memory state around the buggy address:
[   67.787412]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.794724]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.802037] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.809349]                                      ^
[   67.814205]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.821518]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.828829] ==================================================================
[   72.153813] ==================================================================
[   72.161128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   72.168620] Read of size 8 at addr ffff0000934cf230 by task kunit_try_catch/351
[   72.176024] 
[   72.177550] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   72.177579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.177587] Hardware name: Thundercomm Dragonboard 845c (DT)
[   72.177596] Call trace:
[   72.177602]  show_stack+0x20/0x38 (C)
[   72.177619]  dump_stack_lvl+0x8c/0xd0
[   72.177637]  print_report+0x118/0x608
[   72.177656]  kasan_report+0xdc/0x128
[   72.177673]  __asan_report_load8_noabort+0x20/0x30
[   72.177690]  kasan_atomics_helper+0x3f04/0x4858
[   72.177709]  kasan_atomics+0x198/0x2e0
[   72.177725]  kunit_try_run_case+0x170/0x3f0
[   72.177742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.177763]  kthread+0x328/0x630
[   72.177776]  ret_from_fork+0x10/0x20
[   72.177792] 
[   72.247602] Allocated by task 351:
[   72.251058]  kasan_save_stack+0x3c/0x68
[   72.254958]  kasan_save_track+0x20/0x40
[   72.258855]  kasan_save_alloc_info+0x40/0x58
[   72.263193]  __kasan_kmalloc+0xd4/0xd8
[   72.267002]  __kmalloc_cache_noprof+0x16c/0x3c0
[   72.271603]  kasan_atomics+0xb8/0x2e0
[   72.275325]  kunit_try_run_case+0x170/0x3f0
[   72.279580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   72.285149]  kthread+0x328/0x630
[   72.288434]  ret_from_fork+0x10/0x20
[   72.292069] 
[   72.293591] The buggy address belongs to the object at ffff0000934cf200
[   72.293591]  which belongs to the cache kmalloc-64 of size 64
[   72.306072] The buggy address is located 0 bytes to the right of
[   72.306072]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   72.319075] 
[   72.320599] The buggy address belongs to the physical page:
[   72.326246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   72.334343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   72.340952] page_type: f5(slab)
[   72.344151] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   72.351988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.359820] page dumped because: kasan: bad access detected
[   72.365467] 
[   72.366988] Memory state around the buggy address:
[   72.371843]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.379156]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.386468] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.393778]                                      ^
[   72.398634]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.405947]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.413258] ==================================================================
[   63.533405] ==================================================================
[   63.540717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   63.548122] Write of size 4 at addr ffff0000934cf230 by task kunit_try_catch/351
[   63.555611] 
[   63.557138] CPU: 5 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   63.557166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.557175] Hardware name: Thundercomm Dragonboard 845c (DT)
[   63.557186] Call trace:
[   63.557193]  show_stack+0x20/0x38 (C)
[   63.557210]  dump_stack_lvl+0x8c/0xd0
[   63.557229]  print_report+0x118/0x608
[   63.557248]  kasan_report+0xdc/0x128
[   63.557267]  kasan_check_range+0x100/0x1a8
[   63.557287]  __kasan_check_write+0x20/0x30
[   63.557304]  kasan_atomics_helper+0x894/0x4858
[   63.557323]  kasan_atomics+0x198/0x2e0
[   63.557340]  kunit_try_run_case+0x170/0x3f0
[   63.557358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.557379]  kthread+0x328/0x630
[   63.557392]  ret_from_fork+0x10/0x20
[   63.557411] 
[   63.630558] Allocated by task 351:
[   63.634014]  kasan_save_stack+0x3c/0x68
[   63.637914]  kasan_save_track+0x20/0x40
[   63.641811]  kasan_save_alloc_info+0x40/0x58
[   63.646148]  __kasan_kmalloc+0xd4/0xd8
[   63.649957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.654559]  kasan_atomics+0xb8/0x2e0
[   63.658281]  kunit_try_run_case+0x170/0x3f0
[   63.662535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.668094]  kthread+0x328/0x630
[   63.671380]  ret_from_fork+0x10/0x20
[   63.675014] 
[   63.676537] The buggy address belongs to the object at ffff0000934cf200
[   63.676537]  which belongs to the cache kmalloc-64 of size 64
[   63.689019] The buggy address is located 0 bytes to the right of
[   63.689019]  allocated 48-byte region [ffff0000934cf200, ffff0000934cf230)
[   63.702024] 
[   63.703548] The buggy address belongs to the physical page:
[   63.709195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134cf
[   63.717292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.723901] page_type: f5(slab)
[   63.727102] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   63.734939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.742773] page dumped because: kasan: bad access detected
[   63.748421] 
[   63.749943] Memory state around the buggy address:
[   63.754798]  ffff0000934cf100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.762111]  ffff0000934cf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.769425] >ffff0000934cf200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.776735]                                      ^
[   63.781592]  ffff0000934cf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.788905]  ffff0000934cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.796215] ==================================================================

[ 1525.426849] ==================================================================
[ 1525.426859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[ 1525.426874] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.426888] 
[ 1525.426894] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.426919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.426927] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.426937] Call trace:
[ 1525.426942]  show_stack+0x20/0x38 (C)
[ 1525.426957]  dump_stack_lvl+0x8c/0xd0
[ 1525.426973]  print_report+0x118/0x608
[ 1525.426991]  kasan_report+0xdc/0x128
[ 1525.427008]  kasan_check_range+0x100/0x1a8
[ 1525.427027]  __kasan_check_write+0x20/0x30
[ 1525.427041]  kasan_atomics_helper+0xff0/0x4858
[ 1525.427057]  kasan_atomics+0x198/0x2e0
[ 1525.427073]  kunit_try_run_case+0x170/0x3f0
[ 1525.427089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.427108]  kthread+0x328/0x630
[ 1525.427120]  ret_from_fork+0x10/0x20
[ 1525.427136] 
[ 1525.427140] Allocated by task 336:
[ 1525.427147]  kasan_save_stack+0x3c/0x68
[ 1525.427162]  kasan_save_track+0x20/0x40
[ 1525.427176]  kasan_save_alloc_info+0x40/0x58
[ 1525.427188]  __kasan_kmalloc+0xd4/0xd8
[ 1525.427202]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.427215]  kasan_atomics+0xb8/0x2e0
[ 1525.427228]  kunit_try_run_case+0x170/0x3f0
[ 1525.427241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.427257]  kthread+0x328/0x630
[ 1525.427267]  ret_from_fork+0x10/0x20
[ 1525.427279] 
[ 1525.427283] The buggy address belongs to the object at ffff000826289e00
[ 1525.427283]  which belongs to the cache kmalloc-64 of size 64
[ 1525.427299] The buggy address is located 0 bytes to the right of
[ 1525.427299]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.427318] 
[ 1525.427322] The buggy address belongs to the physical page:
[ 1525.427330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.427344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.427357] page_type: f5(slab)
[ 1525.427368] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.427382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.427393] page dumped because: kasan: bad access detected
[ 1525.427402] 
[ 1525.427406] Memory state around the buggy address:
[ 1525.427414]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.427426]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.427438] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.427449]                                      ^
[ 1525.427458]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.427471]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.427481] ==================================================================
[ 1525.437243] ==================================================================
[ 1525.437253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[ 1525.437268] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.437282] 
[ 1525.437288] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.437314] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.437322] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.437332] Call trace:
[ 1525.437337]  show_stack+0x20/0x38 (C)
[ 1525.437352]  dump_stack_lvl+0x8c/0xd0
[ 1525.437368]  print_report+0x118/0x608
[ 1525.437386]  kasan_report+0xdc/0x128
[ 1525.437403]  kasan_check_range+0x100/0x1a8
[ 1525.437421]  __kasan_check_write+0x20/0x30
[ 1525.437436]  kasan_atomics_helper+0x1644/0x4858
[ 1525.437453]  kasan_atomics+0x198/0x2e0
[ 1525.437469]  kunit_try_run_case+0x170/0x3f0
[ 1525.437485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.437504]  kthread+0x328/0x630
[ 1525.437516]  ret_from_fork+0x10/0x20
[ 1525.437531] 
[ 1525.437535] Allocated by task 336:
[ 1525.437543]  kasan_save_stack+0x3c/0x68
[ 1525.437557]  kasan_save_track+0x20/0x40
[ 1525.437572]  kasan_save_alloc_info+0x40/0x58
[ 1525.437583]  __kasan_kmalloc+0xd4/0xd8
[ 1525.437597]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.437610]  kasan_atomics+0xb8/0x2e0
[ 1525.437623]  kunit_try_run_case+0x170/0x3f0
[ 1525.437636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.437652]  kthread+0x328/0x630
[ 1525.437662]  ret_from_fork+0x10/0x20
[ 1525.437674] 
[ 1525.437678] The buggy address belongs to the object at ffff000826289e00
[ 1525.437678]  which belongs to the cache kmalloc-64 of size 64
[ 1525.437695] The buggy address is located 0 bytes to the right of
[ 1525.437695]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.437714] 
[ 1525.437718] The buggy address belongs to the physical page:
[ 1525.437726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.437740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.437753] page_type: f5(slab)
[ 1525.437764] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.437778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.437789] page dumped because: kasan: bad access detected
[ 1525.437798] 
[ 1525.437802] Memory state around the buggy address:
[ 1525.437810]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.437822]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.437835] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.437845]                                      ^
[ 1525.437854]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.437866]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.437877] ==================================================================
[ 1525.439167] ==================================================================
[ 1525.439176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[ 1525.439191] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.439206] 
[ 1525.439212] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.439237] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.439245] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.439255] Call trace:
[ 1525.439260]  show_stack+0x20/0x38 (C)
[ 1525.439276]  dump_stack_lvl+0x8c/0xd0
[ 1525.439292]  print_report+0x118/0x608
[ 1525.439310]  kasan_report+0xdc/0x128
[ 1525.439327]  __asan_report_load8_noabort+0x20/0x30
[ 1525.439342]  kasan_atomics_helper+0x3e10/0x4858
[ 1525.439359]  kasan_atomics+0x198/0x2e0
[ 1525.439375]  kunit_try_run_case+0x170/0x3f0
[ 1525.439391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.439410]  kthread+0x328/0x630
[ 1525.439423]  ret_from_fork+0x10/0x20
[ 1525.439438] 
[ 1525.439442] Allocated by task 336:
[ 1525.439449]  kasan_save_stack+0x3c/0x68
[ 1525.439464]  kasan_save_track+0x20/0x40
[ 1525.439478]  kasan_save_alloc_info+0x40/0x58
[ 1525.439489]  __kasan_kmalloc+0xd4/0xd8
[ 1525.439503]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.439517]  kasan_atomics+0xb8/0x2e0
[ 1525.439530]  kunit_try_run_case+0x170/0x3f0
[ 1525.439543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.439558]  kthread+0x328/0x630
[ 1525.439568]  ret_from_fork+0x10/0x20
[ 1525.439581] 
[ 1525.439585] The buggy address belongs to the object at ffff000826289e00
[ 1525.439585]  which belongs to the cache kmalloc-64 of size 64
[ 1525.439601] The buggy address is located 0 bytes to the right of
[ 1525.439601]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.439620] 
[ 1525.439625] The buggy address belongs to the physical page:
[ 1525.439632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.439647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.439660] page_type: f5(slab)
[ 1525.439670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.439685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.439696] page dumped because: kasan: bad access detected
[ 1525.439704] 
[ 1525.439708] Memory state around the buggy address:
[ 1525.439717]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.439729]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.439741] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.439752]                                      ^
[ 1525.439761]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.439773]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.439784] ==================================================================
[ 1525.422952] ==================================================================
[ 1525.422961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[ 1525.422976] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.422990] 
[ 1525.422996] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.423022] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.423030] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.423039] Call trace:
[ 1525.423044]  show_stack+0x20/0x38 (C)
[ 1525.423059]  dump_stack_lvl+0x8c/0xd0
[ 1525.423076]  print_report+0x118/0x608
[ 1525.423093]  kasan_report+0xdc/0x128
[ 1525.423110]  __asan_report_load8_noabort+0x20/0x30
[ 1525.423126]  kasan_atomics_helper+0x3f58/0x4858
[ 1525.423143]  kasan_atomics+0x198/0x2e0
[ 1525.423158]  kunit_try_run_case+0x170/0x3f0
[ 1525.423175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.423194]  kthread+0x328/0x630
[ 1525.423206]  ret_from_fork+0x10/0x20
[ 1525.423222] 
[ 1525.423226] Allocated by task 336:
[ 1525.423233]  kasan_save_stack+0x3c/0x68
[ 1525.423249]  kasan_save_track+0x20/0x40
[ 1525.423263]  kasan_save_alloc_info+0x40/0x58
[ 1525.423274]  __kasan_kmalloc+0xd4/0xd8
[ 1525.423289]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.423302]  kasan_atomics+0xb8/0x2e0
[ 1525.423315]  kunit_try_run_case+0x170/0x3f0
[ 1525.423329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.423345]  kthread+0x328/0x630
[ 1525.423355]  ret_from_fork+0x10/0x20
[ 1525.423367] 
[ 1525.423371] The buggy address belongs to the object at ffff000826289e00
[ 1525.423371]  which belongs to the cache kmalloc-64 of size 64
[ 1525.423389] The buggy address is located 0 bytes to the right of
[ 1525.423389]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.423407] 
[ 1525.423412] The buggy address belongs to the physical page:
[ 1525.423420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.423434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.423448] page_type: f5(slab)
[ 1525.423458] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.423473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.423484] page dumped because: kasan: bad access detected
[ 1525.423493] 
[ 1525.423497] Memory state around the buggy address:
[ 1525.423506]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.423519]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.423531] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.423542]                                      ^
[ 1525.423551]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.423564]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.423575] ==================================================================
[ 1525.422304] ==================================================================
[ 1525.422314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[ 1525.422329] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.422343] 
[ 1525.422350] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.422375] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.422383] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.422392] Call trace:
[ 1525.422398]  show_stack+0x20/0x38 (C)
[ 1525.422413]  dump_stack_lvl+0x8c/0xd0
[ 1525.422429]  print_report+0x118/0x608
[ 1525.422447]  kasan_report+0xdc/0x128
[ 1525.422464]  kasan_check_range+0x100/0x1a8
[ 1525.422482]  __kasan_check_read+0x20/0x30
[ 1525.422496]  kasan_atomics_helper+0xdd4/0x4858
[ 1525.422513]  kasan_atomics+0x198/0x2e0
[ 1525.422528]  kunit_try_run_case+0x170/0x3f0
[ 1525.422545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.422563]  kthread+0x328/0x630
[ 1525.422575]  ret_from_fork+0x10/0x20
[ 1525.422591] 
[ 1525.422595] Allocated by task 336:
[ 1525.422602]  kasan_save_stack+0x3c/0x68
[ 1525.422617]  kasan_save_track+0x20/0x40
[ 1525.422631]  kasan_save_alloc_info+0x40/0x58
[ 1525.422643]  __kasan_kmalloc+0xd4/0xd8
[ 1525.422657]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.422670]  kasan_atomics+0xb8/0x2e0
[ 1525.422683]  kunit_try_run_case+0x170/0x3f0
[ 1525.422696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.422712]  kthread+0x328/0x630
[ 1525.422721]  ret_from_fork+0x10/0x20
[ 1525.422734] 
[ 1525.422738] The buggy address belongs to the object at ffff000826289e00
[ 1525.422738]  which belongs to the cache kmalloc-64 of size 64
[ 1525.422754] The buggy address is located 0 bytes to the right of
[ 1525.422754]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.422773] 
[ 1525.422778] The buggy address belongs to the physical page:
[ 1525.422785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.422800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.422813] page_type: f5(slab)
[ 1525.422823] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.422839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.422850] page dumped because: kasan: bad access detected
[ 1525.422859] 
[ 1525.422863] Memory state around the buggy address:
[ 1525.422871]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.422884]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.422896] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.422907]                                      ^
[ 1525.422916]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.422929]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.422940] ==================================================================
[ 1525.424264] ==================================================================
[ 1525.424275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[ 1525.424292] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.424306] 
[ 1525.424312] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.424338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.424346] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.424356] Call trace:
[ 1525.424361]  show_stack+0x20/0x38 (C)
[ 1525.424377]  dump_stack_lvl+0x8c/0xd0
[ 1525.424393]  print_report+0x118/0x608
[ 1525.424411]  kasan_report+0xdc/0x128
[ 1525.424427]  __asan_report_store8_noabort+0x20/0x30
[ 1525.424443]  kasan_atomics_helper+0x3e5c/0x4858
[ 1525.424460]  kasan_atomics+0x198/0x2e0
[ 1525.424476]  kunit_try_run_case+0x170/0x3f0
[ 1525.424492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.424511]  kthread+0x328/0x630
[ 1525.424523]  ret_from_fork+0x10/0x20
[ 1525.424539] 
[ 1525.424543] Allocated by task 336:
[ 1525.424550]  kasan_save_stack+0x3c/0x68
[ 1525.424565]  kasan_save_track+0x20/0x40
[ 1525.424579]  kasan_save_alloc_info+0x40/0x58
[ 1525.424590]  __kasan_kmalloc+0xd4/0xd8
[ 1525.424604]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.424618]  kasan_atomics+0xb8/0x2e0
[ 1525.424631]  kunit_try_run_case+0x170/0x3f0
[ 1525.424644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.424660]  kthread+0x328/0x630
[ 1525.424670]  ret_from_fork+0x10/0x20
[ 1525.424682] 
[ 1525.424686] The buggy address belongs to the object at ffff000826289e00
[ 1525.424686]  which belongs to the cache kmalloc-64 of size 64
[ 1525.424702] The buggy address is located 0 bytes to the right of
[ 1525.424702]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.424721] 
[ 1525.424725] The buggy address belongs to the physical page:
[ 1525.424734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.424748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.424761] page_type: f5(slab)
[ 1525.424772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.424787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.424798] page dumped because: kasan: bad access detected
[ 1525.424806] 
[ 1525.424810] Memory state around the buggy address:
[ 1525.424819]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.424831]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.424844] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.424855]                                      ^
[ 1525.424864]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.424876]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.424887] ==================================================================
[ 1525.421674] ==================================================================
[ 1525.421684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[ 1525.421699] Read of size 4 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.421713] 
[ 1525.421719] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.421744] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.421752] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.421762] Call trace:
[ 1525.421767]  show_stack+0x20/0x38 (C)
[ 1525.421782]  dump_stack_lvl+0x8c/0xd0
[ 1525.421799]  print_report+0x118/0x608
[ 1525.421816]  kasan_report+0xdc/0x128
[ 1525.421833]  __asan_report_load4_noabort+0x20/0x30
[ 1525.421848]  kasan_atomics_helper+0x3e04/0x4858
[ 1525.421865]  kasan_atomics+0x198/0x2e0
[ 1525.421881]  kunit_try_run_case+0x170/0x3f0
[ 1525.421897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.421916]  kthread+0x328/0x630
[ 1525.421928]  ret_from_fork+0x10/0x20
[ 1525.421944] 
[ 1525.421948] Allocated by task 336:
[ 1525.421955]  kasan_save_stack+0x3c/0x68
[ 1525.421969]  kasan_save_track+0x20/0x40
[ 1525.421984]  kasan_save_alloc_info+0x40/0x58
[ 1525.421994]  __kasan_kmalloc+0xd4/0xd8
[ 1525.422009]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.422022]  kasan_atomics+0xb8/0x2e0
[ 1525.422035]  kunit_try_run_case+0x170/0x3f0
[ 1525.422048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.422064]  kthread+0x328/0x630
[ 1525.422074]  ret_from_fork+0x10/0x20
[ 1525.422086] 
[ 1525.422090] The buggy address belongs to the object at ffff000826289e00
[ 1525.422090]  which belongs to the cache kmalloc-64 of size 64
[ 1525.422106] The buggy address is located 0 bytes to the right of
[ 1525.422106]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.422125] 
[ 1525.422130] The buggy address belongs to the physical page:
[ 1525.422137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.422152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.422165] page_type: f5(slab)
[ 1525.422176] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.422191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.422202] page dumped because: kasan: bad access detected
[ 1525.422211] 
[ 1525.422215] Memory state around the buggy address:
[ 1525.422223]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.422236]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.422249] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.422259]                                      ^
[ 1525.422269]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.422281]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.422292] ==================================================================
[ 1525.428154] ==================================================================
[ 1525.428165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[ 1525.428181] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.428195] 
[ 1525.428201] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.428227] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.428235] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.428245] Call trace:
[ 1525.428250]  show_stack+0x20/0x38 (C)
[ 1525.428266]  dump_stack_lvl+0x8c/0xd0
[ 1525.428282]  print_report+0x118/0x608
[ 1525.428300]  kasan_report+0xdc/0x128
[ 1525.428317]  kasan_check_range+0x100/0x1a8
[ 1525.428336]  __kasan_check_write+0x20/0x30
[ 1525.428350]  kasan_atomics_helper+0x10c0/0x4858
[ 1525.428367]  kasan_atomics+0x198/0x2e0
[ 1525.428382]  kunit_try_run_case+0x170/0x3f0
[ 1525.428398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.428417]  kthread+0x328/0x630
[ 1525.428429]  ret_from_fork+0x10/0x20
[ 1525.428445] 
[ 1525.428449] Allocated by task 336:
[ 1525.428456]  kasan_save_stack+0x3c/0x68
[ 1525.428471]  kasan_save_track+0x20/0x40
[ 1525.428485]  kasan_save_alloc_info+0x40/0x58
[ 1525.428496]  __kasan_kmalloc+0xd4/0xd8
[ 1525.428510]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.428524]  kasan_atomics+0xb8/0x2e0
[ 1525.428536]  kunit_try_run_case+0x170/0x3f0
[ 1525.428550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.428565]  kthread+0x328/0x630
[ 1525.428575]  ret_from_fork+0x10/0x20
[ 1525.428588] 
[ 1525.428592] The buggy address belongs to the object at ffff000826289e00
[ 1525.428592]  which belongs to the cache kmalloc-64 of size 64
[ 1525.428608] The buggy address is located 0 bytes to the right of
[ 1525.428608]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.428627] 
[ 1525.428631] The buggy address belongs to the physical page:
[ 1525.428639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.428653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.428667] page_type: f5(slab)
[ 1525.428678] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.428692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.428704] page dumped because: kasan: bad access detected
[ 1525.428712] 
[ 1525.428716] Memory state around the buggy address:
[ 1525.428724]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.428737]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.428749] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.428760]                                      ^
[ 1525.428769]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.428781]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.428792] ==================================================================
[ 1525.426201] ==================================================================
[ 1525.426211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[ 1525.426226] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.426241] 
[ 1525.426247] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.426273] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.426281] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.426291] Call trace:
[ 1525.426296]  show_stack+0x20/0x38 (C)
[ 1525.426311]  dump_stack_lvl+0x8c/0xd0
[ 1525.426328]  print_report+0x118/0x608
[ 1525.426346]  kasan_report+0xdc/0x128
[ 1525.426362]  kasan_check_range+0x100/0x1a8
[ 1525.426381]  __kasan_check_write+0x20/0x30
[ 1525.426395]  kasan_atomics_helper+0xf88/0x4858
[ 1525.426412]  kasan_atomics+0x198/0x2e0
[ 1525.426427]  kunit_try_run_case+0x170/0x3f0
[ 1525.426444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.426463]  kthread+0x328/0x630
[ 1525.426475]  ret_from_fork+0x10/0x20
[ 1525.426490] 
[ 1525.426495] Allocated by task 336:
[ 1525.426502]  kasan_save_stack+0x3c/0x68
[ 1525.426516]  kasan_save_track+0x20/0x40
[ 1525.426531]  kasan_save_alloc_info+0x40/0x58
[ 1525.426542]  __kasan_kmalloc+0xd4/0xd8
[ 1525.426556]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.426569]  kasan_atomics+0xb8/0x2e0
[ 1525.426582]  kunit_try_run_case+0x170/0x3f0
[ 1525.426596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.426612]  kthread+0x328/0x630
[ 1525.426622]  ret_from_fork+0x10/0x20
[ 1525.426634] 
[ 1525.426638] The buggy address belongs to the object at ffff000826289e00
[ 1525.426638]  which belongs to the cache kmalloc-64 of size 64
[ 1525.426655] The buggy address is located 0 bytes to the right of
[ 1525.426655]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.426673] 
[ 1525.426678] The buggy address belongs to the physical page:
[ 1525.426686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.426700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.426713] page_type: f5(slab)
[ 1525.426723] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.426738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.426749] page dumped because: kasan: bad access detected
[ 1525.426757] 
[ 1525.426761] Memory state around the buggy address:
[ 1525.426769]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.426782]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.426794] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.426805]                                      ^
[ 1525.426814]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.426827]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.426837] ==================================================================
[ 1525.432055] ==================================================================
[ 1525.432066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[ 1525.432082] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.432096] 
[ 1525.432102] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.432128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.432136] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.432146] Call trace:
[ 1525.432151]  show_stack+0x20/0x38 (C)
[ 1525.432166]  dump_stack_lvl+0x8c/0xd0
[ 1525.432183]  print_report+0x118/0x608
[ 1525.432200]  kasan_report+0xdc/0x128
[ 1525.432217]  kasan_check_range+0x100/0x1a8
[ 1525.432236]  __kasan_check_write+0x20/0x30
[ 1525.432250]  kasan_atomics_helper+0x1384/0x4858
[ 1525.432267]  kasan_atomics+0x198/0x2e0
[ 1525.432282]  kunit_try_run_case+0x170/0x3f0
[ 1525.432298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.432317]  kthread+0x328/0x630
[ 1525.432329]  ret_from_fork+0x10/0x20
[ 1525.432344] 
[ 1525.432349] Allocated by task 336:
[ 1525.432356]  kasan_save_stack+0x3c/0x68
[ 1525.432371]  kasan_save_track+0x20/0x40
[ 1525.432385]  kasan_save_alloc_info+0x40/0x58
[ 1525.432396]  __kasan_kmalloc+0xd4/0xd8
[ 1525.432410]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.432424]  kasan_atomics+0xb8/0x2e0
[ 1525.432437]  kunit_try_run_case+0x170/0x3f0
[ 1525.432450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.432466]  kthread+0x328/0x630
[ 1525.432475]  ret_from_fork+0x10/0x20
[ 1525.432488] 
[ 1525.432492] The buggy address belongs to the object at ffff000826289e00
[ 1525.432492]  which belongs to the cache kmalloc-64 of size 64
[ 1525.432508] The buggy address is located 0 bytes to the right of
[ 1525.432508]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.432527] 
[ 1525.432532] The buggy address belongs to the physical page:
[ 1525.432539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.432554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.432567] page_type: f5(slab)
[ 1525.432578] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.432592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.432603] page dumped because: kasan: bad access detected
[ 1525.432611] 
[ 1525.432616] Memory state around the buggy address:
[ 1525.432624]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.432636]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.432648] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.432659]                                      ^
[ 1525.432668]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.432680]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.432691] ==================================================================
[ 1525.431395] ==================================================================
[ 1525.431405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[ 1525.431420] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.431434] 
[ 1525.431440] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.431465] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.431473] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.431483] Call trace:
[ 1525.431488]  show_stack+0x20/0x38 (C)
[ 1525.431503]  dump_stack_lvl+0x8c/0xd0
[ 1525.431520]  print_report+0x118/0x608
[ 1525.431537]  kasan_report+0xdc/0x128
[ 1525.431554]  kasan_check_range+0x100/0x1a8
[ 1525.431573]  __kasan_check_write+0x20/0x30
[ 1525.431587]  kasan_atomics_helper+0x12d8/0x4858
[ 1525.431604]  kasan_atomics+0x198/0x2e0
[ 1525.431620]  kunit_try_run_case+0x170/0x3f0
[ 1525.431636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.431654]  kthread+0x328/0x630
[ 1525.431667]  ret_from_fork+0x10/0x20
[ 1525.431682] 
[ 1525.431686] Allocated by task 336:
[ 1525.431693]  kasan_save_stack+0x3c/0x68
[ 1525.431708]  kasan_save_track+0x20/0x40
[ 1525.431722]  kasan_save_alloc_info+0x40/0x58
[ 1525.431733]  __kasan_kmalloc+0xd4/0xd8
[ 1525.431748]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.431761]  kasan_atomics+0xb8/0x2e0
[ 1525.431774]  kunit_try_run_case+0x170/0x3f0
[ 1525.431787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.431803]  kthread+0x328/0x630
[ 1525.431813]  ret_from_fork+0x10/0x20
[ 1525.431825] 
[ 1525.431829] The buggy address belongs to the object at ffff000826289e00
[ 1525.431829]  which belongs to the cache kmalloc-64 of size 64
[ 1525.431846] The buggy address is located 0 bytes to the right of
[ 1525.431846]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.431865] 
[ 1525.431869] The buggy address belongs to the physical page:
[ 1525.431877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.431892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.431904] page_type: f5(slab)
[ 1525.431915] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.431929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.431941] page dumped because: kasan: bad access detected
[ 1525.431949] 
[ 1525.431953] Memory state around the buggy address:
[ 1525.431961]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.431974]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.431986] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.431996]                                      ^
[ 1525.432005]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.432018]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.432029] ==================================================================
[ 1525.432703] ==================================================================
[ 1525.432713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[ 1525.432728] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.432742] 
[ 1525.432748] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.432774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.432782] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.432792] Call trace:
[ 1525.432797]  show_stack+0x20/0x38 (C)
[ 1525.432812]  dump_stack_lvl+0x8c/0xd0
[ 1525.432829]  print_report+0x118/0x608
[ 1525.432847]  kasan_report+0xdc/0x128
[ 1525.432864]  __asan_report_load8_noabort+0x20/0x30
[ 1525.432880]  kasan_atomics_helper+0x3f04/0x4858
[ 1525.432897]  kasan_atomics+0x198/0x2e0
[ 1525.432913]  kunit_try_run_case+0x170/0x3f0
[ 1525.432929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.432948]  kthread+0x328/0x630
[ 1525.432960]  ret_from_fork+0x10/0x20
[ 1525.432976] 
[ 1525.432980] Allocated by task 336:
[ 1525.432987]  kasan_save_stack+0x3c/0x68
[ 1525.433002]  kasan_save_track+0x20/0x40
[ 1525.433016]  kasan_save_alloc_info+0x40/0x58
[ 1525.433027]  __kasan_kmalloc+0xd4/0xd8
[ 1525.433041]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.433054]  kasan_atomics+0xb8/0x2e0
[ 1525.433067]  kunit_try_run_case+0x170/0x3f0
[ 1525.433081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.433096]  kthread+0x328/0x630
[ 1525.433106]  ret_from_fork+0x10/0x20
[ 1525.433118] 
[ 1525.433123] The buggy address belongs to the object at ffff000826289e00
[ 1525.433123]  which belongs to the cache kmalloc-64 of size 64
[ 1525.433139] The buggy address is located 0 bytes to the right of
[ 1525.433139]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.433158] 
[ 1525.433162] The buggy address belongs to the physical page:
[ 1525.433170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.433185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.433198] page_type: f5(slab)
[ 1525.433208] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.433222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.433234] page dumped because: kasan: bad access detected
[ 1525.433242] 
[ 1525.433246] Memory state around the buggy address:
[ 1525.433255]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.433267]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.433279] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.433290]                                      ^
[ 1525.433299]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.433311]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.433322] ==================================================================
[ 1525.425550] ==================================================================
[ 1525.425560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[ 1525.425576] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.425590] 
[ 1525.425596] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.425622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.425630] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.425639] Call trace:
[ 1525.425645]  show_stack+0x20/0x38 (C)
[ 1525.425660]  dump_stack_lvl+0x8c/0xd0
[ 1525.425677]  print_report+0x118/0x608
[ 1525.425695]  kasan_report+0xdc/0x128
[ 1525.425712]  kasan_check_range+0x100/0x1a8
[ 1525.425730]  __kasan_check_write+0x20/0x30
[ 1525.425745]  kasan_atomics_helper+0xf20/0x4858
[ 1525.425761]  kasan_atomics+0x198/0x2e0
[ 1525.425777]  kunit_try_run_case+0x170/0x3f0
[ 1525.425793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.425812]  kthread+0x328/0x630
[ 1525.425824]  ret_from_fork+0x10/0x20
[ 1525.425840] 
[ 1525.425844] Allocated by task 336:
[ 1525.425852]  kasan_save_stack+0x3c/0x68
[ 1525.425866]  kasan_save_track+0x20/0x40
[ 1525.425880]  kasan_save_alloc_info+0x40/0x58
[ 1525.425892]  __kasan_kmalloc+0xd4/0xd8
[ 1525.425905]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.425919]  kasan_atomics+0xb8/0x2e0
[ 1525.425932]  kunit_try_run_case+0x170/0x3f0
[ 1525.425945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.425962]  kthread+0x328/0x630
[ 1525.425971]  ret_from_fork+0x10/0x20
[ 1525.425984] 
[ 1525.425988] The buggy address belongs to the object at ffff000826289e00
[ 1525.425988]  which belongs to the cache kmalloc-64 of size 64
[ 1525.426005] The buggy address is located 0 bytes to the right of
[ 1525.426005]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.426023] 
[ 1525.426028] The buggy address belongs to the physical page:
[ 1525.426036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.426050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.426063] page_type: f5(slab)
[ 1525.426074] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.426088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.426100] page dumped because: kasan: bad access detected
[ 1525.426108] 
[ 1525.426112] Memory state around the buggy address:
[ 1525.426120]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.426133]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.426146] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.426157]                                      ^
[ 1525.426166]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.426178]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.426189] ==================================================================
[ 1525.421025] ==================================================================
[ 1525.421035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[ 1525.421050] Write of size 4 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.421064] 
[ 1525.421070] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.421096] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.421104] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.421114] Call trace:
[ 1525.421119]  show_stack+0x20/0x38 (C)
[ 1525.421134]  dump_stack_lvl+0x8c/0xd0
[ 1525.421151]  print_report+0x118/0x608
[ 1525.421168]  kasan_report+0xdc/0x128
[ 1525.421185]  kasan_check_range+0x100/0x1a8
[ 1525.421203]  __kasan_check_write+0x20/0x30
[ 1525.421218]  kasan_atomics_helper+0xd3c/0x4858
[ 1525.421234]  kasan_atomics+0x198/0x2e0
[ 1525.421250]  kunit_try_run_case+0x170/0x3f0
[ 1525.421266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.421285]  kthread+0x328/0x630
[ 1525.421297]  ret_from_fork+0x10/0x20
[ 1525.421313] 
[ 1525.421317] Allocated by task 336:
[ 1525.421325]  kasan_save_stack+0x3c/0x68
[ 1525.421339]  kasan_save_track+0x20/0x40
[ 1525.421353]  kasan_save_alloc_info+0x40/0x58
[ 1525.421365]  __kasan_kmalloc+0xd4/0xd8
[ 1525.421378]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.421392]  kasan_atomics+0xb8/0x2e0
[ 1525.421405]  kunit_try_run_case+0x170/0x3f0
[ 1525.421418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.421434]  kthread+0x328/0x630
[ 1525.421444]  ret_from_fork+0x10/0x20
[ 1525.421456] 
[ 1525.421460] The buggy address belongs to the object at ffff000826289e00
[ 1525.421460]  which belongs to the cache kmalloc-64 of size 64
[ 1525.421477] The buggy address is located 0 bytes to the right of
[ 1525.421477]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.421496] 
[ 1525.421500] The buggy address belongs to the physical page:
[ 1525.421508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.421523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.421536] page_type: f5(slab)
[ 1525.421547] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.421562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.421573] page dumped because: kasan: bad access detected
[ 1525.421582] 
[ 1525.421586] Memory state around the buggy address:
[ 1525.421594]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.421607]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.421619] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.421630]                                      ^
[ 1525.421639]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.421651]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.421662] ==================================================================
[ 1525.424900] ==================================================================
[ 1525.424909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[ 1525.424925] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.424939] 
[ 1525.424945] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.424971] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.424980] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.424990] Call trace:
[ 1525.424995]  show_stack+0x20/0x38 (C)
[ 1525.425010]  dump_stack_lvl+0x8c/0xd0
[ 1525.425027]  print_report+0x118/0x608
[ 1525.425044]  kasan_report+0xdc/0x128
[ 1525.425061]  kasan_check_range+0x100/0x1a8
[ 1525.425079]  __kasan_check_write+0x20/0x30
[ 1525.425093]  kasan_atomics_helper+0xeb8/0x4858
[ 1525.425110]  kasan_atomics+0x198/0x2e0
[ 1525.425126]  kunit_try_run_case+0x170/0x3f0
[ 1525.425142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.425161]  kthread+0x328/0x630
[ 1525.425173]  ret_from_fork+0x10/0x20
[ 1525.425189] 
[ 1525.425194] Allocated by task 336:
[ 1525.425200]  kasan_save_stack+0x3c/0x68
[ 1525.425215]  kasan_save_track+0x20/0x40
[ 1525.425229]  kasan_save_alloc_info+0x40/0x58
[ 1525.425241]  __kasan_kmalloc+0xd4/0xd8
[ 1525.425255]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.425269]  kasan_atomics+0xb8/0x2e0
[ 1525.425282]  kunit_try_run_case+0x170/0x3f0
[ 1525.425295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.425311]  kthread+0x328/0x630
[ 1525.425321]  ret_from_fork+0x10/0x20
[ 1525.425333] 
[ 1525.425338] The buggy address belongs to the object at ffff000826289e00
[ 1525.425338]  which belongs to the cache kmalloc-64 of size 64
[ 1525.425354] The buggy address is located 0 bytes to the right of
[ 1525.425354]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.425373] 
[ 1525.425378] The buggy address belongs to the physical page:
[ 1525.425385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.425400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.425413] page_type: f5(slab)
[ 1525.425423] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.425438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.425449] page dumped because: kasan: bad access detected
[ 1525.425458] 
[ 1525.425462] Memory state around the buggy address:
[ 1525.425470]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.425483]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.425495] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.425506]                                      ^
[ 1525.425515]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.425528]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.425538] ==================================================================
[ 1525.430101] ==================================================================
[ 1525.430110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[ 1525.430125] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.430140] 
[ 1525.430145] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.430171] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.430179] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.430189] Call trace:
[ 1525.430194]  show_stack+0x20/0x38 (C)
[ 1525.430210]  dump_stack_lvl+0x8c/0xd0
[ 1525.430226]  print_report+0x118/0x608
[ 1525.430243]  kasan_report+0xdc/0x128
[ 1525.430260]  kasan_check_range+0x100/0x1a8
[ 1525.430279]  __kasan_check_write+0x20/0x30
[ 1525.430293]  kasan_atomics_helper+0x11f8/0x4858
[ 1525.430310]  kasan_atomics+0x198/0x2e0
[ 1525.430326]  kunit_try_run_case+0x170/0x3f0
[ 1525.430341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.430360]  kthread+0x328/0x630
[ 1525.430373]  ret_from_fork+0x10/0x20
[ 1525.430388] 
[ 1525.430392] Allocated by task 336:
[ 1525.430399]  kasan_save_stack+0x3c/0x68
[ 1525.430414]  kasan_save_track+0x20/0x40
[ 1525.430428]  kasan_save_alloc_info+0x40/0x58
[ 1525.430439]  __kasan_kmalloc+0xd4/0xd8
[ 1525.430453]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.430467]  kasan_atomics+0xb8/0x2e0
[ 1525.430480]  kunit_try_run_case+0x170/0x3f0
[ 1525.430493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.430509]  kthread+0x328/0x630
[ 1525.430519]  ret_from_fork+0x10/0x20
[ 1525.430531] 
[ 1525.430535] The buggy address belongs to the object at ffff000826289e00
[ 1525.430535]  which belongs to the cache kmalloc-64 of size 64
[ 1525.430552] The buggy address is located 0 bytes to the right of
[ 1525.430552]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.430571] 
[ 1525.430575] The buggy address belongs to the physical page:
[ 1525.430583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.430597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.430610] page_type: f5(slab)
[ 1525.430621] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.430635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.430647] page dumped because: kasan: bad access detected
[ 1525.430655] 
[ 1525.430659] Memory state around the buggy address:
[ 1525.430667]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.430680]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.430692] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.430702]                                      ^
[ 1525.430712]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.430725]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.430736] ==================================================================
[ 1525.437889] ==================================================================
[ 1525.437899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[ 1525.437914] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.437928] 
[ 1525.437934] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.437959] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.437968] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.437978] Call trace:
[ 1525.437983]  show_stack+0x20/0x38 (C)
[ 1525.437998]  dump_stack_lvl+0x8c/0xd0
[ 1525.438015]  print_report+0x118/0x608
[ 1525.438032]  kasan_report+0xdc/0x128
[ 1525.438050]  __asan_report_load8_noabort+0x20/0x30
[ 1525.438065]  kasan_atomics_helper+0x3df4/0x4858
[ 1525.438082]  kasan_atomics+0x198/0x2e0
[ 1525.438098]  kunit_try_run_case+0x170/0x3f0
[ 1525.438115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.438134]  kthread+0x328/0x630
[ 1525.438146]  ret_from_fork+0x10/0x20
[ 1525.438161] 
[ 1525.438165] Allocated by task 336:
[ 1525.438173]  kasan_save_stack+0x3c/0x68
[ 1525.438187]  kasan_save_track+0x20/0x40
[ 1525.438201]  kasan_save_alloc_info+0x40/0x58
[ 1525.438213]  __kasan_kmalloc+0xd4/0xd8
[ 1525.438226]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.438240]  kasan_atomics+0xb8/0x2e0
[ 1525.438253]  kunit_try_run_case+0x170/0x3f0
[ 1525.438266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.438282]  kthread+0x328/0x630
[ 1525.438291]  ret_from_fork+0x10/0x20
[ 1525.438304] 
[ 1525.438308] The buggy address belongs to the object at ffff000826289e00
[ 1525.438308]  which belongs to the cache kmalloc-64 of size 64
[ 1525.438324] The buggy address is located 0 bytes to the right of
[ 1525.438324]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.438343] 
[ 1525.438347] The buggy address belongs to the physical page:
[ 1525.438355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.438370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.438383] page_type: f5(slab)
[ 1525.438393] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.438408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.438419] page dumped because: kasan: bad access detected
[ 1525.438428] 
[ 1525.438432] Memory state around the buggy address:
[ 1525.438439]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.438452]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.438464] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.438475]                                      ^
[ 1525.438483]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.438496]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.438507] ==================================================================
[ 1525.433981] ==================================================================
[ 1525.433990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[ 1525.434006] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.434020] 
[ 1525.434026] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.434051] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.434059] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.434069] Call trace:
[ 1525.434074]  show_stack+0x20/0x38 (C)
[ 1525.434089]  dump_stack_lvl+0x8c/0xd0
[ 1525.434106]  print_report+0x118/0x608
[ 1525.434123]  kasan_report+0xdc/0x128
[ 1525.434140]  kasan_check_range+0x100/0x1a8
[ 1525.434159]  __kasan_check_write+0x20/0x30
[ 1525.434173]  kasan_atomics_helper+0x147c/0x4858
[ 1525.434190]  kasan_atomics+0x198/0x2e0
[ 1525.434206]  kunit_try_run_case+0x170/0x3f0
[ 1525.434221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.434240]  kthread+0x328/0x630
[ 1525.434252]  ret_from_fork+0x10/0x20
[ 1525.434268] 
[ 1525.434272] Allocated by task 336:
[ 1525.434280]  kasan_save_stack+0x3c/0x68
[ 1525.434294]  kasan_save_track+0x20/0x40
[ 1525.434308]  kasan_save_alloc_info+0x40/0x58
[ 1525.434320]  __kasan_kmalloc+0xd4/0xd8
[ 1525.434333]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.434347]  kasan_atomics+0xb8/0x2e0
[ 1525.434360]  kunit_try_run_case+0x170/0x3f0
[ 1525.434373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.434389]  kthread+0x328/0x630
[ 1525.434398]  ret_from_fork+0x10/0x20
[ 1525.434411] 
[ 1525.434415] The buggy address belongs to the object at ffff000826289e00
[ 1525.434415]  which belongs to the cache kmalloc-64 of size 64
[ 1525.434431] The buggy address is located 0 bytes to the right of
[ 1525.434431]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.434450] 
[ 1525.434455] The buggy address belongs to the physical page:
[ 1525.434463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.434477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.434490] page_type: f5(slab)
[ 1525.434500] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.434515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.434526] page dumped because: kasan: bad access detected
[ 1525.434534] 
[ 1525.434539] Memory state around the buggy address:
[ 1525.434547]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.434559]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.434571] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.434582]                                      ^
[ 1525.434591]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.434603]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.434614] ==================================================================
[ 1525.427493] ==================================================================
[ 1525.427502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[ 1525.427518] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.427532] 
[ 1525.427538] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.427563] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.427571] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.427581] Call trace:
[ 1525.427586]  show_stack+0x20/0x38 (C)
[ 1525.427601]  dump_stack_lvl+0x8c/0xd0
[ 1525.427618]  print_report+0x118/0x608
[ 1525.427635]  kasan_report+0xdc/0x128
[ 1525.427652]  kasan_check_range+0x100/0x1a8
[ 1525.427671]  __kasan_check_write+0x20/0x30
[ 1525.427685]  kasan_atomics_helper+0x1058/0x4858
[ 1525.427702]  kasan_atomics+0x198/0x2e0
[ 1525.427717]  kunit_try_run_case+0x170/0x3f0
[ 1525.427734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.427752]  kthread+0x328/0x630
[ 1525.427765]  ret_from_fork+0x10/0x20
[ 1525.427781] 
[ 1525.427785] Allocated by task 336:
[ 1525.427792]  kasan_save_stack+0x3c/0x68
[ 1525.427807]  kasan_save_track+0x20/0x40
[ 1525.427821]  kasan_save_alloc_info+0x40/0x58
[ 1525.427832]  __kasan_kmalloc+0xd4/0xd8
[ 1525.427846]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.427860]  kasan_atomics+0xb8/0x2e0
[ 1525.427873]  kunit_try_run_case+0x170/0x3f0
[ 1525.427886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.427902]  kthread+0x328/0x630
[ 1525.427911]  ret_from_fork+0x10/0x20
[ 1525.427924] 
[ 1525.427928] The buggy address belongs to the object at ffff000826289e00
[ 1525.427928]  which belongs to the cache kmalloc-64 of size 64
[ 1525.427945] The buggy address is located 0 bytes to the right of
[ 1525.427945]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.427963] 
[ 1525.427968] The buggy address belongs to the physical page:
[ 1525.427976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.427990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.428003] page_type: f5(slab)
[ 1525.428014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.428028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.428039] page dumped because: kasan: bad access detected
[ 1525.428048] 
[ 1525.428052] Memory state around the buggy address:
[ 1525.428060]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.428072]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.428085] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.428095]                                      ^
[ 1525.428104]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.428116]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.428127] ==================================================================
[ 1525.423587] ==================================================================
[ 1525.423597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[ 1525.423612] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.423626] 
[ 1525.423632] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.423658] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.423666] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.423675] Call trace:
[ 1525.423680]  show_stack+0x20/0x38 (C)
[ 1525.423695]  dump_stack_lvl+0x8c/0xd0
[ 1525.423712]  print_report+0x118/0x608
[ 1525.423729]  kasan_report+0xdc/0x128
[ 1525.423746]  kasan_check_range+0x100/0x1a8
[ 1525.423765]  __kasan_check_write+0x20/0x30
[ 1525.423779]  kasan_atomics_helper+0xe44/0x4858
[ 1525.423795]  kasan_atomics+0x198/0x2e0
[ 1525.423811]  kunit_try_run_case+0x170/0x3f0
[ 1525.423827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.423846]  kthread+0x328/0x630
[ 1525.423859]  ret_from_fork+0x10/0x20
[ 1525.423874] 
[ 1525.423878] Allocated by task 336:
[ 1525.423885]  kasan_save_stack+0x3c/0x68
[ 1525.423900]  kasan_save_track+0x20/0x40
[ 1525.423914]  kasan_save_alloc_info+0x40/0x58
[ 1525.423925]  __kasan_kmalloc+0xd4/0xd8
[ 1525.423939]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.423953]  kasan_atomics+0xb8/0x2e0
[ 1525.423965]  kunit_try_run_case+0x170/0x3f0
[ 1525.423979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.423995]  kthread+0x328/0x630
[ 1525.424004]  ret_from_fork+0x10/0x20
[ 1525.424017] 
[ 1525.424021] The buggy address belongs to the object at ffff000826289e00
[ 1525.424021]  which belongs to the cache kmalloc-64 of size 64
[ 1525.424037] The buggy address is located 0 bytes to the right of
[ 1525.424037]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.424056] 
[ 1525.424060] The buggy address belongs to the physical page:
[ 1525.424068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.424083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.424096] page_type: f5(slab)
[ 1525.424107] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.424121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.424133] page dumped because: kasan: bad access detected
[ 1525.424141] 
[ 1525.424145] Memory state around the buggy address:
[ 1525.424154]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.424166]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.424179] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.424189]                                      ^
[ 1525.424198]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.424211]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.424222] ==================================================================
[ 1525.428804] ==================================================================
[ 1525.428814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[ 1525.428829] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.428843] 
[ 1525.428849] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.428875] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.428883] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.428893] Call trace:
[ 1525.428898]  show_stack+0x20/0x38 (C)
[ 1525.428914]  dump_stack_lvl+0x8c/0xd0
[ 1525.428930]  print_report+0x118/0x608
[ 1525.428947]  kasan_report+0xdc/0x128
[ 1525.428965]  kasan_check_range+0x100/0x1a8
[ 1525.428983]  __kasan_check_write+0x20/0x30
[ 1525.428997]  kasan_atomics_helper+0x1128/0x4858
[ 1525.429014]  kasan_atomics+0x198/0x2e0
[ 1525.429030]  kunit_try_run_case+0x170/0x3f0
[ 1525.429047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.429065]  kthread+0x328/0x630
[ 1525.429078]  ret_from_fork+0x10/0x20
[ 1525.429093] 
[ 1525.429097] Allocated by task 336:
[ 1525.429104]  kasan_save_stack+0x3c/0x68
[ 1525.429119]  kasan_save_track+0x20/0x40
[ 1525.429133]  kasan_save_alloc_info+0x40/0x58
[ 1525.429144]  __kasan_kmalloc+0xd4/0xd8
[ 1525.429158]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.429172]  kasan_atomics+0xb8/0x2e0
[ 1525.429184]  kunit_try_run_case+0x170/0x3f0
[ 1525.429198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.429214]  kthread+0x328/0x630
[ 1525.429223]  ret_from_fork+0x10/0x20
[ 1525.429235] 
[ 1525.429240] The buggy address belongs to the object at ffff000826289e00
[ 1525.429240]  which belongs to the cache kmalloc-64 of size 64
[ 1525.429256] The buggy address is located 0 bytes to the right of
[ 1525.429256]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.429275] 
[ 1525.429279] The buggy address belongs to the physical page:
[ 1525.429287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.429302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.429315] page_type: f5(slab)
[ 1525.429325] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.429340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.429351] page dumped because: kasan: bad access detected
[ 1525.429360] 
[ 1525.429364] Memory state around the buggy address:
[ 1525.429372]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.429385]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.429397] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.429408]                                      ^
[ 1525.429416]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.429429]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.429440] ==================================================================
[ 1525.438519] ==================================================================
[ 1525.438528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[ 1525.438543] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.438557] 
[ 1525.438563] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.438589] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.438597] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.438607] Call trace:
[ 1525.438612]  show_stack+0x20/0x38 (C)
[ 1525.438628]  dump_stack_lvl+0x8c/0xd0
[ 1525.438644]  print_report+0x118/0x608
[ 1525.438662]  kasan_report+0xdc/0x128
[ 1525.438679]  kasan_check_range+0x100/0x1a8
[ 1525.438699]  __kasan_check_write+0x20/0x30
[ 1525.438713]  kasan_atomics_helper+0x16d0/0x4858
[ 1525.438730]  kasan_atomics+0x198/0x2e0
[ 1525.438746]  kunit_try_run_case+0x170/0x3f0
[ 1525.438762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.438781]  kthread+0x328/0x630
[ 1525.438794]  ret_from_fork+0x10/0x20
[ 1525.438809] 
[ 1525.438813] Allocated by task 336:
[ 1525.438821]  kasan_save_stack+0x3c/0x68
[ 1525.438835]  kasan_save_track+0x20/0x40
[ 1525.438849]  kasan_save_alloc_info+0x40/0x58
[ 1525.438861]  __kasan_kmalloc+0xd4/0xd8
[ 1525.438875]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.438889]  kasan_atomics+0xb8/0x2e0
[ 1525.438901]  kunit_try_run_case+0x170/0x3f0
[ 1525.438915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.438930]  kthread+0x328/0x630
[ 1525.438940]  ret_from_fork+0x10/0x20
[ 1525.438952] 
[ 1525.438956] The buggy address belongs to the object at ffff000826289e00
[ 1525.438956]  which belongs to the cache kmalloc-64 of size 64
[ 1525.438973] The buggy address is located 0 bytes to the right of
[ 1525.438973]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.438992] 
[ 1525.438996] The buggy address belongs to the physical page:
[ 1525.439004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.439018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.439031] page_type: f5(slab)
[ 1525.439041] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.439056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.439068] page dumped because: kasan: bad access detected
[ 1525.439076] 
[ 1525.439080] Memory state around the buggy address:
[ 1525.439088]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.439100]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.439112] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.439123]                                      ^
[ 1525.439131]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.439144]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.439155] ==================================================================
[ 1525.429452] ==================================================================
[ 1525.429462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[ 1525.429477] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.429491] 
[ 1525.429497] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.429523] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.429531] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.429541] Call trace:
[ 1525.429546]  show_stack+0x20/0x38 (C)
[ 1525.429562]  dump_stack_lvl+0x8c/0xd0
[ 1525.429578]  print_report+0x118/0x608
[ 1525.429595]  kasan_report+0xdc/0x128
[ 1525.429612]  kasan_check_range+0x100/0x1a8
[ 1525.429631]  __kasan_check_write+0x20/0x30
[ 1525.429645]  kasan_atomics_helper+0x1190/0x4858
[ 1525.429663]  kasan_atomics+0x198/0x2e0
[ 1525.429678]  kunit_try_run_case+0x170/0x3f0
[ 1525.429694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.429713]  kthread+0x328/0x630
[ 1525.429725]  ret_from_fork+0x10/0x20
[ 1525.429741] 
[ 1525.429745] Allocated by task 336:
[ 1525.429752]  kasan_save_stack+0x3c/0x68
[ 1525.429767]  kasan_save_track+0x20/0x40
[ 1525.429781]  kasan_save_alloc_info+0x40/0x58
[ 1525.429792]  __kasan_kmalloc+0xd4/0xd8
[ 1525.429806]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.429819]  kasan_atomics+0xb8/0x2e0
[ 1525.429832]  kunit_try_run_case+0x170/0x3f0
[ 1525.429846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.429862]  kthread+0x328/0x630
[ 1525.429871]  ret_from_fork+0x10/0x20
[ 1525.429884] 
[ 1525.429888] The buggy address belongs to the object at ffff000826289e00
[ 1525.429888]  which belongs to the cache kmalloc-64 of size 64
[ 1525.429905] The buggy address is located 0 bytes to the right of
[ 1525.429905]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.429924] 
[ 1525.429928] The buggy address belongs to the physical page:
[ 1525.429936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.429951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.429964] page_type: f5(slab)
[ 1525.429974] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.429989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.430000] page dumped because: kasan: bad access detected
[ 1525.430009] 
[ 1525.430013] Memory state around the buggy address:
[ 1525.430021]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.430034]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.430046] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.430056]                                      ^
[ 1525.430065]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.430078]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.430088] ==================================================================
[ 1525.430748] ==================================================================
[ 1525.430758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[ 1525.430773] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.430787] 
[ 1525.430793] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.430819] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.430827] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.430837] Call trace:
[ 1525.430842]  show_stack+0x20/0x38 (C)
[ 1525.430858]  dump_stack_lvl+0x8c/0xd0
[ 1525.430874]  print_report+0x118/0x608
[ 1525.430891]  kasan_report+0xdc/0x128
[ 1525.430908]  kasan_check_range+0x100/0x1a8
[ 1525.430927]  __kasan_check_write+0x20/0x30
[ 1525.430941]  kasan_atomics_helper+0x126c/0x4858
[ 1525.430958]  kasan_atomics+0x198/0x2e0
[ 1525.430974]  kunit_try_run_case+0x170/0x3f0
[ 1525.430990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.431009]  kthread+0x328/0x630
[ 1525.431021]  ret_from_fork+0x10/0x20
[ 1525.431036] 
[ 1525.431040] Allocated by task 336:
[ 1525.431048]  kasan_save_stack+0x3c/0x68
[ 1525.431063]  kasan_save_track+0x20/0x40
[ 1525.431077]  kasan_save_alloc_info+0x40/0x58
[ 1525.431088]  __kasan_kmalloc+0xd4/0xd8
[ 1525.431102]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.431115]  kasan_atomics+0xb8/0x2e0
[ 1525.431128]  kunit_try_run_case+0x170/0x3f0
[ 1525.431141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.431157]  kthread+0x328/0x630
[ 1525.431166]  ret_from_fork+0x10/0x20
[ 1525.431179] 
[ 1525.431183] The buggy address belongs to the object at ffff000826289e00
[ 1525.431183]  which belongs to the cache kmalloc-64 of size 64
[ 1525.431200] The buggy address is located 0 bytes to the right of
[ 1525.431200]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.431219] 
[ 1525.431223] The buggy address belongs to the physical page:
[ 1525.431231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.431245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.431258] page_type: f5(slab)
[ 1525.431269] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.431283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.431295] page dumped because: kasan: bad access detected
[ 1525.431303] 
[ 1525.431307] Memory state around the buggy address:
[ 1525.431315]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.431328]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.431340] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.431351]                                      ^
[ 1525.431360]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.431372]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.431383] ==================================================================
[ 1525.434626] ==================================================================
[ 1525.434635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[ 1525.434650] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.434664] 
[ 1525.434670] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.434696] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.434705] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.434714] Call trace:
[ 1525.434720]  show_stack+0x20/0x38 (C)
[ 1525.434735]  dump_stack_lvl+0x8c/0xd0
[ 1525.434751]  print_report+0x118/0x608
[ 1525.434769]  kasan_report+0xdc/0x128
[ 1525.434786]  kasan_check_range+0x100/0x1a8
[ 1525.434805]  __kasan_check_write+0x20/0x30
[ 1525.434819]  kasan_atomics_helper+0x14e4/0x4858
[ 1525.434837]  kasan_atomics+0x198/0x2e0
[ 1525.434852]  kunit_try_run_case+0x170/0x3f0
[ 1525.434868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.434887]  kthread+0x328/0x630
[ 1525.434900]  ret_from_fork+0x10/0x20
[ 1525.434915] 
[ 1525.434919] Allocated by task 336:
[ 1525.434927]  kasan_save_stack+0x3c/0x68
[ 1525.434941]  kasan_save_track+0x20/0x40
[ 1525.434955]  kasan_save_alloc_info+0x40/0x58
[ 1525.434967]  __kasan_kmalloc+0xd4/0xd8
[ 1525.434980]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.434994]  kasan_atomics+0xb8/0x2e0
[ 1525.435007]  kunit_try_run_case+0x170/0x3f0
[ 1525.435020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.435036]  kthread+0x328/0x630
[ 1525.435045]  ret_from_fork+0x10/0x20
[ 1525.435058] 
[ 1525.435062] The buggy address belongs to the object at ffff000826289e00
[ 1525.435062]  which belongs to the cache kmalloc-64 of size 64
[ 1525.435078] The buggy address is located 0 bytes to the right of
[ 1525.435078]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.435097] 
[ 1525.435102] The buggy address belongs to the physical page:
[ 1525.435109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.435124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.435137] page_type: f5(slab)
[ 1525.435147] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.435161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.435173] page dumped because: kasan: bad access detected
[ 1525.435181] 
[ 1525.435185] Memory state around the buggy address:
[ 1525.435193]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.435206]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.435218] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.435229]                                      ^
[ 1525.435238]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.435250]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.435262] ==================================================================
[ 1525.435274] ==================================================================
[ 1525.435284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[ 1525.435299] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.435313] 
[ 1525.435319] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.435345] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.435353] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.435362] Call trace:
[ 1525.435368]  show_stack+0x20/0x38 (C)
[ 1525.435383]  dump_stack_lvl+0x8c/0xd0
[ 1525.435400]  print_report+0x118/0x608
[ 1525.435417]  kasan_report+0xdc/0x128
[ 1525.435435]  kasan_check_range+0x100/0x1a8
[ 1525.435453]  __kasan_check_write+0x20/0x30
[ 1525.435467]  kasan_atomics_helper+0x154c/0x4858
[ 1525.435485]  kasan_atomics+0x198/0x2e0
[ 1525.435501]  kunit_try_run_case+0x170/0x3f0
[ 1525.435517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.435535]  kthread+0x328/0x630
[ 1525.435548]  ret_from_fork+0x10/0x20
[ 1525.435564] 
[ 1525.435568] Allocated by task 336:
[ 1525.435576]  kasan_save_stack+0x3c/0x68
[ 1525.435591]  kasan_save_track+0x20/0x40
[ 1525.435605]  kasan_save_alloc_info+0x40/0x58
[ 1525.435617]  __kasan_kmalloc+0xd4/0xd8
[ 1525.435630]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.435644]  kasan_atomics+0xb8/0x2e0
[ 1525.435658]  kunit_try_run_case+0x170/0x3f0
[ 1525.435671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.435687]  kthread+0x328/0x630
[ 1525.435697]  ret_from_fork+0x10/0x20
[ 1525.435710] 
[ 1525.435714] The buggy address belongs to the object at ffff000826289e00
[ 1525.435714]  which belongs to the cache kmalloc-64 of size 64
[ 1525.435731] The buggy address is located 0 bytes to the right of
[ 1525.435731]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.435750] 
[ 1525.435755] The buggy address belongs to the physical page:
[ 1525.435763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.435777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.435791] page_type: f5(slab)
[ 1525.435801] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.435816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.435827] page dumped because: kasan: bad access detected
[ 1525.435835] 
[ 1525.435840] Memory state around the buggy address:
[ 1525.435847]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.435860]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.435872] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.435883]                                      ^
[ 1525.435892]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.435904]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.435915] ==================================================================
[ 1525.435928] ==================================================================
[ 1525.435938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[ 1525.435953] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.435967] 
[ 1525.435973] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.435998] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.436007] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.436016] Call trace:
[ 1525.436022]  show_stack+0x20/0x38 (C)
[ 1525.436037]  dump_stack_lvl+0x8c/0xd0
[ 1525.436053]  print_report+0x118/0x608
[ 1525.436071]  kasan_report+0xdc/0x128
[ 1525.436088]  kasan_check_range+0x100/0x1a8
[ 1525.436107]  __kasan_check_write+0x20/0x30
[ 1525.436121]  kasan_atomics_helper+0x15b4/0x4858
[ 1525.436139]  kasan_atomics+0x198/0x2e0
[ 1525.436154]  kunit_try_run_case+0x170/0x3f0
[ 1525.436170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.436189]  kthread+0x328/0x630
[ 1525.436201]  ret_from_fork+0x10/0x20
[ 1525.436217] 
[ 1525.436221] Allocated by task 336:
[ 1525.436228]  kasan_save_stack+0x3c/0x68
[ 1525.436243]  kasan_save_track+0x20/0x40
[ 1525.436257]  kasan_save_alloc_info+0x40/0x58
[ 1525.436269]  __kasan_kmalloc+0xd4/0xd8
[ 1525.436282]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.436296]  kasan_atomics+0xb8/0x2e0
[ 1525.436309]  kunit_try_run_case+0x170/0x3f0
[ 1525.436322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.436338]  kthread+0x328/0x630
[ 1525.436348]  ret_from_fork+0x10/0x20
[ 1525.436360] 
[ 1525.436364] The buggy address belongs to the object at ffff000826289e00
[ 1525.436364]  which belongs to the cache kmalloc-64 of size 64
[ 1525.436381] The buggy address is located 0 bytes to the right of
[ 1525.436381]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.436400] 
[ 1525.436404] The buggy address belongs to the physical page:
[ 1525.436412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.436426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.436440] page_type: f5(slab)
[ 1525.436450] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.436465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.436476] page dumped because: kasan: bad access detected
[ 1525.436484] 
[ 1525.436488] Memory state around the buggy address:
[ 1525.436496]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.436509]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.436521] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.436532]                                      ^
[ 1525.436541]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.436554]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.436565] ==================================================================
[ 1525.439796] ==================================================================
[ 1525.439806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[ 1525.439821] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.439835] 
[ 1525.439841] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.439867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.439875] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.439885] Call trace:
[ 1525.439890]  show_stack+0x20/0x38 (C)
[ 1525.439906]  dump_stack_lvl+0x8c/0xd0
[ 1525.439923]  print_report+0x118/0x608
[ 1525.439940]  kasan_report+0xdc/0x128
[ 1525.439958]  kasan_check_range+0x100/0x1a8
[ 1525.439976]  __kasan_check_write+0x20/0x30
[ 1525.439990]  kasan_atomics_helper+0x175c/0x4858
[ 1525.440007]  kasan_atomics+0x198/0x2e0
[ 1525.440023]  kunit_try_run_case+0x170/0x3f0
[ 1525.440040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.440059]  kthread+0x328/0x630
[ 1525.440071]  ret_from_fork+0x10/0x20
[ 1525.440087] 
[ 1525.440091] Allocated by task 336:
[ 1525.440098]  kasan_save_stack+0x3c/0x68
[ 1525.440112]  kasan_save_track+0x20/0x40
[ 1525.440127]  kasan_save_alloc_info+0x40/0x58
[ 1525.440137]  __kasan_kmalloc+0xd4/0xd8
[ 1525.440152]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.440166]  kasan_atomics+0xb8/0x2e0
[ 1525.440178]  kunit_try_run_case+0x170/0x3f0
[ 1525.440192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.440208]  kthread+0x328/0x630
[ 1525.440217]  ret_from_fork+0x10/0x20
[ 1525.440230] 
[ 1525.440234] The buggy address belongs to the object at ffff000826289e00
[ 1525.440234]  which belongs to the cache kmalloc-64 of size 64
[ 1525.440250] The buggy address is located 0 bytes to the right of
[ 1525.440250]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.440269] 
[ 1525.440274] The buggy address belongs to the physical page:
[ 1525.440281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.440295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.440309] page_type: f5(slab)
[ 1525.440319] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.440334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.440345] page dumped because: kasan: bad access detected
[ 1525.440353] 
[ 1525.440358] Memory state around the buggy address:
[ 1525.440366]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.440378]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.440391] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.440402]                                      ^
[ 1525.440410]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.440422]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.440433] ==================================================================
[ 1525.440460] ==================================================================
[ 1525.440471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[ 1525.440487] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.440501] 
[ 1525.440507] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.440533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.440541] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.440550] Call trace:
[ 1525.440556]  show_stack+0x20/0x38 (C)
[ 1525.440571]  dump_stack_lvl+0x8c/0xd0
[ 1525.440588]  print_report+0x118/0x608
[ 1525.440605]  kasan_report+0xdc/0x128
[ 1525.440623]  __asan_report_load8_noabort+0x20/0x30
[ 1525.440638]  kasan_atomics_helper+0x3e20/0x4858
[ 1525.440655]  kasan_atomics+0x198/0x2e0
[ 1525.440671]  kunit_try_run_case+0x170/0x3f0
[ 1525.440687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.440706]  kthread+0x328/0x630
[ 1525.440719]  ret_from_fork+0x10/0x20
[ 1525.440735] 
[ 1525.440739] Allocated by task 336:
[ 1525.440746]  kasan_save_stack+0x3c/0x68
[ 1525.440761]  kasan_save_track+0x20/0x40
[ 1525.440775]  kasan_save_alloc_info+0x40/0x58
[ 1525.440786]  __kasan_kmalloc+0xd4/0xd8
[ 1525.440799]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.440813]  kasan_atomics+0xb8/0x2e0
[ 1525.440826]  kunit_try_run_case+0x170/0x3f0
[ 1525.440839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.440855]  kthread+0x328/0x630
[ 1525.440864]  ret_from_fork+0x10/0x20
[ 1525.440877] 
[ 1525.440881] The buggy address belongs to the object at ffff000826289e00
[ 1525.440881]  which belongs to the cache kmalloc-64 of size 64
[ 1525.440898] The buggy address is located 0 bytes to the right of
[ 1525.440898]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.440917] 
[ 1525.440921] The buggy address belongs to the physical page:
[ 1525.440929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.440944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.440957] page_type: f5(slab)
[ 1525.440967] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.440982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.440993] page dumped because: kasan: bad access detected
[ 1525.441002] 
[ 1525.441006] Memory state around the buggy address:
[ 1525.441014]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.441026]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.441038] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.441049]                                      ^
[ 1525.441058]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.441070]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.441080] ==================================================================
[ 1525.436607] ==================================================================
[ 1525.436619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[ 1525.436635] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.436649] 
[ 1525.436655] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.436682] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.436690] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.436700] Call trace:
[ 1525.436705]  show_stack+0x20/0x38 (C)
[ 1525.436721]  dump_stack_lvl+0x8c/0xd0
[ 1525.436738]  print_report+0x118/0x608
[ 1525.436755]  kasan_report+0xdc/0x128
[ 1525.436772]  __asan_report_load8_noabort+0x20/0x30
[ 1525.436787]  kasan_atomics_helper+0x3db0/0x4858
[ 1525.436805]  kasan_atomics+0x198/0x2e0
[ 1525.436821]  kunit_try_run_case+0x170/0x3f0
[ 1525.436837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.436855]  kthread+0x328/0x630
[ 1525.436867]  ret_from_fork+0x10/0x20
[ 1525.436883] 
[ 1525.436887] Allocated by task 336:
[ 1525.436894]  kasan_save_stack+0x3c/0x68
[ 1525.436909]  kasan_save_track+0x20/0x40
[ 1525.436923]  kasan_save_alloc_info+0x40/0x58
[ 1525.436934]  __kasan_kmalloc+0xd4/0xd8
[ 1525.436949]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.436962]  kasan_atomics+0xb8/0x2e0
[ 1525.436975]  kunit_try_run_case+0x170/0x3f0
[ 1525.436988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.437004]  kthread+0x328/0x630
[ 1525.437013]  ret_from_fork+0x10/0x20
[ 1525.437026] 
[ 1525.437030] The buggy address belongs to the object at ffff000826289e00
[ 1525.437030]  which belongs to the cache kmalloc-64 of size 64
[ 1525.437047] The buggy address is located 0 bytes to the right of
[ 1525.437047]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.437066] 
[ 1525.437070] The buggy address belongs to the physical page:
[ 1525.437078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.437093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.437106] page_type: f5(slab)
[ 1525.437117] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.437131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.437142] page dumped because: kasan: bad access detected
[ 1525.437151] 
[ 1525.437155] Memory state around the buggy address:
[ 1525.437163]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.437176]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.437188] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.437198]                                      ^
[ 1525.437207]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.437220]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.437231] ==================================================================
[ 1525.441093] ==================================================================
[ 1525.441103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[ 1525.441118] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.441132] 
[ 1525.441138] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.441164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.441172] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.441181] Call trace:
[ 1525.441187]  show_stack+0x20/0x38 (C)
[ 1525.441202]  dump_stack_lvl+0x8c/0xd0
[ 1525.441219]  print_report+0x118/0x608
[ 1525.441237]  kasan_report+0xdc/0x128
[ 1525.441254]  kasan_check_range+0x100/0x1a8
[ 1525.441273]  __kasan_check_write+0x20/0x30
[ 1525.441288]  kasan_atomics_helper+0x17ec/0x4858
[ 1525.441305]  kasan_atomics+0x198/0x2e0
[ 1525.441321]  kunit_try_run_case+0x170/0x3f0
[ 1525.441337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.441356]  kthread+0x328/0x630
[ 1525.441369]  ret_from_fork+0x10/0x20
[ 1525.441384] 
[ 1525.441389] Allocated by task 336:
[ 1525.441396]  kasan_save_stack+0x3c/0x68
[ 1525.441410]  kasan_save_track+0x20/0x40
[ 1525.441424]  kasan_save_alloc_info+0x40/0x58
[ 1525.441435]  __kasan_kmalloc+0xd4/0xd8
[ 1525.441449]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.441463]  kasan_atomics+0xb8/0x2e0
[ 1525.441476]  kunit_try_run_case+0x170/0x3f0
[ 1525.441489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.441505]  kthread+0x328/0x630
[ 1525.441514]  ret_from_fork+0x10/0x20
[ 1525.441527] 
[ 1525.441532] The buggy address belongs to the object at ffff000826289e00
[ 1525.441532]  which belongs to the cache kmalloc-64 of size 64
[ 1525.441548] The buggy address is located 0 bytes to the right of
[ 1525.441548]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.441567] 
[ 1525.441571] The buggy address belongs to the physical page:
[ 1525.441579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.441593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.441606] page_type: f5(slab)
[ 1525.441617] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.441632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.441643] page dumped because: kasan: bad access detected
[ 1525.441651] 
[ 1525.441655] Memory state around the buggy address:
[ 1525.441663]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.441676]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.441688] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.441699]                                      ^
[ 1525.441708]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.441720]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.441731] ==================================================================
[ 1525.433334] ==================================================================
[ 1525.433344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[ 1525.433359] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336
[ 1525.433373] 
[ 1525.433379] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.433405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.433413] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.433423] Call trace:
[ 1525.433428]  show_stack+0x20/0x38 (C)
[ 1525.433443]  dump_stack_lvl+0x8c/0xd0
[ 1525.433460]  print_report+0x118/0x608
[ 1525.433477]  kasan_report+0xdc/0x128
[ 1525.433494]  kasan_check_range+0x100/0x1a8
[ 1525.433513]  __kasan_check_write+0x20/0x30
[ 1525.433527]  kasan_atomics_helper+0x1414/0x4858
[ 1525.433544]  kasan_atomics+0x198/0x2e0
[ 1525.433560]  kunit_try_run_case+0x170/0x3f0
[ 1525.433576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.433594]  kthread+0x328/0x630
[ 1525.433606]  ret_from_fork+0x10/0x20
[ 1525.433622] 
[ 1525.433626] Allocated by task 336:
[ 1525.433633]  kasan_save_stack+0x3c/0x68
[ 1525.433648]  kasan_save_track+0x20/0x40
[ 1525.433662]  kasan_save_alloc_info+0x40/0x58
[ 1525.433673]  __kasan_kmalloc+0xd4/0xd8
[ 1525.433687]  __kmalloc_cache_noprof+0x16c/0x3c0
[ 1525.433701]  kasan_atomics+0xb8/0x2e0
[ 1525.433714]  kunit_try_run_case+0x170/0x3f0
[ 1525.433727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.433742]  kthread+0x328/0x630
[ 1525.433752]  ret_from_fork+0x10/0x20
[ 1525.433764] 
[ 1525.433769] The buggy address belongs to the object at ffff000826289e00
[ 1525.433769]  which belongs to the cache kmalloc-64 of size 64
[ 1525.433785] The buggy address is located 0 bytes to the right of
[ 1525.433785]  allocated 48-byte region [ffff000826289e00, ffff000826289e30)
[ 1525.433804] 
[ 1525.433809] The buggy address belongs to the physical page:
[ 1525.433816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289
[ 1525.433831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.433844] page_type: f5(slab)
[ 1525.433855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[ 1525.433869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 1525.433880] page dumped because: kasan: bad access detected
[ 1525.433888] 
[ 1525.433893] Memory state around the buggy address:
[ 1525.433901]  ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 1525.433913]  ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 1525.433925] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 1525.433936]                                      ^
[ 1525.433945]  ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.433958]  ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.433968] ==================================================================

[   29.816823] ==================================================================
[   29.816870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   29.816919] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.816981] 
[   29.817012] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.817114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.817142] Hardware name: linux,dummy-virt (DT)
[   29.817283] Call trace:
[   29.817317]  show_stack+0x20/0x38 (C)
[   29.817371]  dump_stack_lvl+0x8c/0xd0
[   29.818073]  print_report+0x118/0x608
[   29.818163]  kasan_report+0xdc/0x128
[   29.818672]  kasan_check_range+0x100/0x1a8
[   29.818733]  __kasan_check_write+0x20/0x30
[   29.818807]  kasan_atomics_helper+0x15b4/0x4858
[   29.818873]  kasan_atomics+0x198/0x2e0
[   29.818930]  kunit_try_run_case+0x170/0x3f0
[   29.819136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.819224]  kthread+0x328/0x630
[   29.819270]  ret_from_fork+0x10/0x20
[   29.819346] 
[   29.819377] Allocated by task 277:
[   29.819750]  kasan_save_stack+0x3c/0x68
[   29.820030]  kasan_save_track+0x20/0x40
[   29.820229]  kasan_save_alloc_info+0x40/0x58
[   29.820288]  __kasan_kmalloc+0xd4/0xd8
[   29.820328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.820375]  kasan_atomics+0xb8/0x2e0
[   29.820415]  kunit_try_run_case+0x170/0x3f0
[   29.820627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.820984]  kthread+0x328/0x630
[   29.821241]  ret_from_fork+0x10/0x20
[   29.821479] 
[   29.821816] The buggy address belongs to the object at fff00000c451ca00
[   29.821816]  which belongs to the cache kmalloc-64 of size 64
[   29.821890] The buggy address is located 0 bytes to the right of
[   29.821890]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.822310] 
[   29.822463] The buggy address belongs to the physical page:
[   29.822709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.822820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.823073] page_type: f5(slab)
[   29.823173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.823433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.823478] page dumped because: kasan: bad access detected
[   29.823557] 
[   29.823968] Memory state around the buggy address:
[   29.824031]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.824357]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.824671] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.824725]                                      ^
[   29.825065]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.825500]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.825736] ==================================================================
[   29.843464] ==================================================================
[   29.843604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   29.843841] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.843976] 
[   29.844026] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.844298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.844497] Hardware name: linux,dummy-virt (DT)
[   29.844553] Call trace:
[   29.845143]  show_stack+0x20/0x38 (C)
[   29.845300]  dump_stack_lvl+0x8c/0xd0
[   29.845413]  print_report+0x118/0x608
[   29.845462]  kasan_report+0xdc/0x128
[   29.845698]  __asan_report_load8_noabort+0x20/0x30
[   29.845777]  kasan_atomics_helper+0x3df4/0x4858
[   29.846832]  kasan_atomics+0x198/0x2e0
[   29.846925]  kunit_try_run_case+0x170/0x3f0
[   29.846979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.847067]  kthread+0x328/0x630
[   29.847162]  ret_from_fork+0x10/0x20
[   29.847262] 
[   29.847438] Allocated by task 277:
[   29.847807]  kasan_save_stack+0x3c/0x68
[   29.848264]  kasan_save_track+0x20/0x40
[   29.848534]  kasan_save_alloc_info+0x40/0x58
[   29.848683]  __kasan_kmalloc+0xd4/0xd8
[   29.848729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.848771]  kasan_atomics+0xb8/0x2e0
[   29.849047]  kunit_try_run_case+0x170/0x3f0
[   29.849507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.849759]  kthread+0x328/0x630
[   29.849804]  ret_from_fork+0x10/0x20
[   29.849954] 
[   29.850178] The buggy address belongs to the object at fff00000c451ca00
[   29.850178]  which belongs to the cache kmalloc-64 of size 64
[   29.850345] The buggy address is located 0 bytes to the right of
[   29.850345]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.850561] 
[   29.850602] The buggy address belongs to the physical page:
[   29.850636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.850719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.850770] page_type: f5(slab)
[   29.850809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.850870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.850912] page dumped because: kasan: bad access detected
[   29.850955] 
[   29.850980] Memory state around the buggy address:
[   29.851011]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.851066]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.851111] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.851161]                                      ^
[   29.851197]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.851242]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.851292] ==================================================================
[   29.598943] ==================================================================
[   29.598996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.599253] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.599329] 
[   29.599362] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.599564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.599663] Hardware name: linux,dummy-virt (DT)
[   29.599729] Call trace:
[   29.599756]  show_stack+0x20/0x38 (C)
[   29.600119]  dump_stack_lvl+0x8c/0xd0
[   29.600180]  print_report+0x118/0x608
[   29.600230]  kasan_report+0xdc/0x128
[   29.600425]  __asan_report_load4_noabort+0x20/0x30
[   29.600531]  kasan_atomics_helper+0x3dd8/0x4858
[   29.600981]  kasan_atomics+0x198/0x2e0
[   29.601593]  kunit_try_run_case+0x170/0x3f0
[   29.601811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.601958]  kthread+0x328/0x630
[   29.602295]  ret_from_fork+0x10/0x20
[   29.602698] 
[   29.602784] Allocated by task 277:
[   29.602846]  kasan_save_stack+0x3c/0x68
[   29.602904]  kasan_save_track+0x20/0x40
[   29.602951]  kasan_save_alloc_info+0x40/0x58
[   29.603000]  __kasan_kmalloc+0xd4/0xd8
[   29.603040]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.603091]  kasan_atomics+0xb8/0x2e0
[   29.603139]  kunit_try_run_case+0x170/0x3f0
[   29.603184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.603233]  kthread+0x328/0x630
[   29.603287]  ret_from_fork+0x10/0x20
[   29.603323] 
[   29.603345] The buggy address belongs to the object at fff00000c451ca00
[   29.603345]  which belongs to the cache kmalloc-64 of size 64
[   29.603404] The buggy address is located 0 bytes to the right of
[   29.603404]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.603469] 
[   29.603500] The buggy address belongs to the physical page:
[   29.603553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.603608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.603658] page_type: f5(slab)
[   29.603718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.603799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.603841] page dumped because: kasan: bad access detected
[   29.603874] 
[   29.603909] Memory state around the buggy address:
[   29.603943]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.603997]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.604042] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.604120]                                      ^
[   29.604260]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605228]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605513] ==================================================================
[   29.792773] ==================================================================
[   29.792920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   29.793144] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.793270] 
[   29.793304] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.793394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.793604] Hardware name: linux,dummy-virt (DT)
[   29.793645] Call trace:
[   29.793668]  show_stack+0x20/0x38 (C)
[   29.793722]  dump_stack_lvl+0x8c/0xd0
[   29.793770]  print_report+0x118/0x608
[   29.793961]  kasan_report+0xdc/0x128
[   29.794026]  kasan_check_range+0x100/0x1a8
[   29.794098]  __kasan_check_write+0x20/0x30
[   29.794147]  kasan_atomics_helper+0x147c/0x4858
[   29.794202]  kasan_atomics+0x198/0x2e0
[   29.794260]  kunit_try_run_case+0x170/0x3f0
[   29.794311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.794365]  kthread+0x328/0x630
[   29.794409]  ret_from_fork+0x10/0x20
[   29.794468] 
[   29.794497] Allocated by task 277:
[   29.794528]  kasan_save_stack+0x3c/0x68
[   29.794571]  kasan_save_track+0x20/0x40
[   29.794618]  kasan_save_alloc_info+0x40/0x58
[   29.794659]  __kasan_kmalloc+0xd4/0xd8
[   29.794698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.794747]  kasan_atomics+0xb8/0x2e0
[   29.794799]  kunit_try_run_case+0x170/0x3f0
[   29.794840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.794896]  kthread+0x328/0x630
[   29.794934]  ret_from_fork+0x10/0x20
[   29.794972] 
[   29.794993] The buggy address belongs to the object at fff00000c451ca00
[   29.794993]  which belongs to the cache kmalloc-64 of size 64
[   29.795062] The buggy address is located 0 bytes to the right of
[   29.795062]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.795839] 
[   29.795887] The buggy address belongs to the physical page:
[   29.795922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.795977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.796027] page_type: f5(slab)
[   29.796418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.796670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.797205] page dumped because: kasan: bad access detected
[   29.797390] 
[   29.797415] Memory state around the buggy address:
[   29.797626]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.797878]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.797954] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.798219]                                      ^
[   29.798437]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.798775]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.798825] ==================================================================
[   29.711766] ==================================================================
[   29.711835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.711919] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.711990] 
[   29.712068] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.712158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.712199] Hardware name: linux,dummy-virt (DT)
[   29.712383] Call trace:
[   29.712444]  show_stack+0x20/0x38 (C)
[   29.712572]  dump_stack_lvl+0x8c/0xd0
[   29.712715]  print_report+0x118/0x608
[   29.713008]  kasan_report+0xdc/0x128
[   29.713125]  kasan_check_range+0x100/0x1a8
[   29.713308]  __kasan_check_write+0x20/0x30
[   29.713405]  kasan_atomics_helper+0x10c0/0x4858
[   29.713464]  kasan_atomics+0x198/0x2e0
[   29.714187]  kunit_try_run_case+0x170/0x3f0
[   29.714277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.714336]  kthread+0x328/0x630
[   29.714681]  ret_from_fork+0x10/0x20
[   29.715132] 
[   29.715212] Allocated by task 277:
[   29.715318]  kasan_save_stack+0x3c/0x68
[   29.715506]  kasan_save_track+0x20/0x40
[   29.715755]  kasan_save_alloc_info+0x40/0x58
[   29.716028]  __kasan_kmalloc+0xd4/0xd8
[   29.716194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.716395]  kasan_atomics+0xb8/0x2e0
[   29.716444]  kunit_try_run_case+0x170/0x3f0
[   29.716609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.716860]  kthread+0x328/0x630
[   29.717071]  ret_from_fork+0x10/0x20
[   29.717237] 
[   29.717267] The buggy address belongs to the object at fff00000c451ca00
[   29.717267]  which belongs to the cache kmalloc-64 of size 64
[   29.717481] The buggy address is located 0 bytes to the right of
[   29.717481]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.717724] 
[   29.717763] The buggy address belongs to the physical page:
[   29.717928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.718185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.718244] page_type: f5(slab)
[   29.718516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.718804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.718853] page dumped because: kasan: bad access detected
[   29.719080] 
[   29.719220] Memory state around the buggy address:
[   29.719608]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.719674]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.719866] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.720141]                                      ^
[   29.720188]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720375]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720469] ==================================================================
[   29.811518] ==================================================================
[   29.811753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   29.811817] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.811867] 
[   29.811909] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.812140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.812435] Hardware name: linux,dummy-virt (DT)
[   29.812647] Call trace:
[   29.812891]  show_stack+0x20/0x38 (C)
[   29.812976]  dump_stack_lvl+0x8c/0xd0
[   29.813114]  print_report+0x118/0x608
[   29.813404]  kasan_report+0xdc/0x128
[   29.813695]  kasan_check_range+0x100/0x1a8
[   29.813912]  __kasan_check_write+0x20/0x30
[   29.814330]  kasan_atomics_helper+0x154c/0x4858
[   29.814584]  kasan_atomics+0x198/0x2e0
[   29.814711]  kunit_try_run_case+0x170/0x3f0
[   29.814831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.814937]  kthread+0x328/0x630
[   29.815116]  ret_from_fork+0x10/0x20
[   29.815193] 
[   29.815220] Allocated by task 277:
[   29.815265]  kasan_save_stack+0x3c/0x68
[   29.815309]  kasan_save_track+0x20/0x40
[   29.815350]  kasan_save_alloc_info+0x40/0x58
[   29.815388]  __kasan_kmalloc+0xd4/0xd8
[   29.815428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.815477]  kasan_atomics+0xb8/0x2e0
[   29.815517]  kunit_try_run_case+0x170/0x3f0
[   29.815557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.815619]  kthread+0x328/0x630
[   29.815663]  ret_from_fork+0x10/0x20
[   29.815702] 
[   29.815722] The buggy address belongs to the object at fff00000c451ca00
[   29.815722]  which belongs to the cache kmalloc-64 of size 64
[   29.815781] The buggy address is located 0 bytes to the right of
[   29.815781]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.815847] 
[   29.815888] The buggy address belongs to the physical page:
[   29.815939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.815994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.816051] page_type: f5(slab)
[   29.816100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.816152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.816194] page dumped because: kasan: bad access detected
[   29.816226] 
[   29.816247] Memory state around the buggy address:
[   29.816284]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.816329]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.816379] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.816442]                                      ^
[   29.816499]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.816542]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.816590] ==================================================================
[   29.730174] ==================================================================
[   29.730230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.730283] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.730341] 
[   29.730517] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.730776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.730980] Hardware name: linux,dummy-virt (DT)
[   29.731025] Call trace:
[   29.731092]  show_stack+0x20/0x38 (C)
[   29.731302]  dump_stack_lvl+0x8c/0xd0
[   29.731440]  print_report+0x118/0x608
[   29.731494]  kasan_report+0xdc/0x128
[   29.731541]  kasan_check_range+0x100/0x1a8
[   29.731592]  __kasan_check_write+0x20/0x30
[   29.731638]  kasan_atomics_helper+0x1190/0x4858
[   29.731688]  kasan_atomics+0x198/0x2e0
[   29.732049]  kunit_try_run_case+0x170/0x3f0
[   29.732291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.732472]  kthread+0x328/0x630
[   29.732718]  ret_from_fork+0x10/0x20
[   29.733161] 
[   29.733186] Allocated by task 277:
[   29.733255]  kasan_save_stack+0x3c/0x68
[   29.733475]  kasan_save_track+0x20/0x40
[   29.733551]  kasan_save_alloc_info+0x40/0x58
[   29.733724]  __kasan_kmalloc+0xd4/0xd8
[   29.733948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.734000]  kasan_atomics+0xb8/0x2e0
[   29.734326]  kunit_try_run_case+0x170/0x3f0
[   29.734488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.734689]  kthread+0x328/0x630
[   29.734741]  ret_from_fork+0x10/0x20
[   29.734780] 
[   29.734801] The buggy address belongs to the object at fff00000c451ca00
[   29.734801]  which belongs to the cache kmalloc-64 of size 64
[   29.735030] The buggy address is located 0 bytes to the right of
[   29.735030]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.735156] 
[   29.735197] The buggy address belongs to the physical page:
[   29.735233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.735287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.735334] page_type: f5(slab)
[   29.735376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.735435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.735487] page dumped because: kasan: bad access detected
[   29.735530] 
[   29.735549] Memory state around the buggy address:
[   29.735582]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.735634]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.735677] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.735726]                                      ^
[   29.735793]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.736072]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.736156] ==================================================================
[   29.747747] ==================================================================
[   29.747871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.747981] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.748032] 
[   29.748073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.748400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.748462] Hardware name: linux,dummy-virt (DT)
[   29.748589] Call trace:
[   29.748648]  show_stack+0x20/0x38 (C)
[   29.748847]  dump_stack_lvl+0x8c/0xd0
[   29.749083]  print_report+0x118/0x608
[   29.749260]  kasan_report+0xdc/0x128
[   29.749403]  kasan_check_range+0x100/0x1a8
[   29.749510]  __kasan_check_write+0x20/0x30
[   29.749712]  kasan_atomics_helper+0x126c/0x4858
[   29.749906]  kasan_atomics+0x198/0x2e0
[   29.750221]  kunit_try_run_case+0x170/0x3f0
[   29.750296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.750352]  kthread+0x328/0x630
[   29.750516]  ret_from_fork+0x10/0x20
[   29.750589] 
[   29.750622] Allocated by task 277:
[   29.750660]  kasan_save_stack+0x3c/0x68
[   29.750712]  kasan_save_track+0x20/0x40
[   29.750760]  kasan_save_alloc_info+0x40/0x58
[   29.750800]  __kasan_kmalloc+0xd4/0xd8
[   29.750839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.750880]  kasan_atomics+0xb8/0x2e0
[   29.750916]  kunit_try_run_case+0x170/0x3f0
[   29.750967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.751014]  kthread+0x328/0x630
[   29.751333]  ret_from_fork+0x10/0x20
[   29.751653] 
[   29.751715] The buggy address belongs to the object at fff00000c451ca00
[   29.751715]  which belongs to the cache kmalloc-64 of size 64
[   29.752149] The buggy address is located 0 bytes to the right of
[   29.752149]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.752406] 
[   29.752432] The buggy address belongs to the physical page:
[   29.752467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.752522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.752571] page_type: f5(slab)
[   29.752610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.753241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.753580] page dumped because: kasan: bad access detected
[   29.753819] 
[   29.753867] Memory state around the buggy address:
[   29.754229]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.754491]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.754750] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.754801]                                      ^
[   29.754839]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.755071]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.755318] ==================================================================
[   29.774088] ==================================================================
[   29.774441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   29.774785] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.774964] 
[   29.775073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.775500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.775710] Hardware name: linux,dummy-virt (DT)
[   29.775803] Call trace:
[   29.775828]  show_stack+0x20/0x38 (C)
[   29.775884]  dump_stack_lvl+0x8c/0xd0
[   29.776003]  print_report+0x118/0x608
[   29.776070]  kasan_report+0xdc/0x128
[   29.776118]  __asan_report_load8_noabort+0x20/0x30
[   29.776167]  kasan_atomics_helper+0x3f04/0x4858
[   29.776219]  kasan_atomics+0x198/0x2e0
[   29.776266]  kunit_try_run_case+0x170/0x3f0
[   29.776318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.776384]  kthread+0x328/0x630
[   29.776430]  ret_from_fork+0x10/0x20
[   29.776482] 
[   29.776511] Allocated by task 277:
[   29.776551]  kasan_save_stack+0x3c/0x68
[   29.776605]  kasan_save_track+0x20/0x40
[   29.776650]  kasan_save_alloc_info+0x40/0x58
[   29.776689]  __kasan_kmalloc+0xd4/0xd8
[   29.776728]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.776769]  kasan_atomics+0xb8/0x2e0
[   29.776808]  kunit_try_run_case+0x170/0x3f0
[   29.776862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.776909]  kthread+0x328/0x630
[   29.776949]  ret_from_fork+0x10/0x20
[   29.776997] 
[   29.777017] The buggy address belongs to the object at fff00000c451ca00
[   29.777017]  which belongs to the cache kmalloc-64 of size 64
[   29.777398] The buggy address is located 0 bytes to the right of
[   29.777398]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.777807] 
[   29.777863] The buggy address belongs to the physical page:
[   29.777915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.777987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.778463] page_type: f5(slab)
[   29.778797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.778993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.779120] page dumped because: kasan: bad access detected
[   29.779201] 
[   29.779595] Memory state around the buggy address:
[   29.779711]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.779959]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.780035] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.780142]                                      ^
[   29.780447]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780503]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780940] ==================================================================
[   29.525954] ==================================================================
[   29.526038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.526114] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.526173] 
[   29.526204] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.526291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.526320] Hardware name: linux,dummy-virt (DT)
[   29.526468] Call trace:
[   29.526501]  show_stack+0x20/0x38 (C)
[   29.526554]  dump_stack_lvl+0x8c/0xd0
[   29.526603]  print_report+0x118/0x608
[   29.526653]  kasan_report+0xdc/0x128
[   29.526700]  kasan_check_range+0x100/0x1a8
[   29.526751]  __kasan_check_write+0x20/0x30
[   29.526823]  kasan_atomics_helper+0xa6c/0x4858
[   29.526874]  kasan_atomics+0x198/0x2e0
[   29.526930]  kunit_try_run_case+0x170/0x3f0
[   29.526978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.527032]  kthread+0x328/0x630
[   29.527661]  ret_from_fork+0x10/0x20
[   29.527722] 
[   29.527742] Allocated by task 277:
[   29.527806]  kasan_save_stack+0x3c/0x68
[   29.527930]  kasan_save_track+0x20/0x40
[   29.528120]  kasan_save_alloc_info+0x40/0x58
[   29.528239]  __kasan_kmalloc+0xd4/0xd8
[   29.528462]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.528776]  kasan_atomics+0xb8/0x2e0
[   29.528922]  kunit_try_run_case+0x170/0x3f0
[   29.529068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.529180]  kthread+0x328/0x630
[   29.529692]  ret_from_fork+0x10/0x20
[   29.529902] 
[   29.529946] The buggy address belongs to the object at fff00000c451ca00
[   29.529946]  which belongs to the cache kmalloc-64 of size 64
[   29.530041] The buggy address is located 0 bytes to the right of
[   29.530041]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.530151] 
[   29.530346] The buggy address belongs to the physical page:
[   29.530521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.530776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.531022] page_type: f5(slab)
[   29.531123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.531285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.531420] page dumped because: kasan: bad access detected
[   29.531460] 
[   29.531501] Memory state around the buggy address:
[   29.531999]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.532156]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.532325] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.532614]                                      ^
[   29.532763]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.532837]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.533031] ==================================================================
[   29.781485] ==================================================================
[   29.781746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   29.782076] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.782450] 
[   29.782525] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.782624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.782831] Hardware name: linux,dummy-virt (DT)
[   29.782877] Call trace:
[   29.782907]  show_stack+0x20/0x38 (C)
[   29.782960]  dump_stack_lvl+0x8c/0xd0
[   29.783435]  print_report+0x118/0x608
[   29.783520]  kasan_report+0xdc/0x128
[   29.783574]  kasan_check_range+0x100/0x1a8
[   29.783802]  __kasan_check_write+0x20/0x30
[   29.783871]  kasan_atomics_helper+0x1414/0x4858
[   29.783923]  kasan_atomics+0x198/0x2e0
[   29.783970]  kunit_try_run_case+0x170/0x3f0
[   29.784019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.784460]  kthread+0x328/0x630
[   29.784729]  ret_from_fork+0x10/0x20
[   29.784888] 
[   29.784996] Allocated by task 277:
[   29.785597]  kasan_save_stack+0x3c/0x68
[   29.785752]  kasan_save_track+0x20/0x40
[   29.786066]  kasan_save_alloc_info+0x40/0x58
[   29.786464]  __kasan_kmalloc+0xd4/0xd8
[   29.786645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.786986]  kasan_atomics+0xb8/0x2e0
[   29.787353]  kunit_try_run_case+0x170/0x3f0
[   29.787570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.787637]  kthread+0x328/0x630
[   29.787672]  ret_from_fork+0x10/0x20
[   29.788073] 
[   29.788117] The buggy address belongs to the object at fff00000c451ca00
[   29.788117]  which belongs to the cache kmalloc-64 of size 64
[   29.788343] The buggy address is located 0 bytes to the right of
[   29.788343]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.788461] 
[   29.788486] The buggy address belongs to the physical page:
[   29.788520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.788780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.789037] page_type: f5(slab)
[   29.789421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.789616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.789718] page dumped because: kasan: bad access detected
[   29.789783] 
[   29.789990] Memory state around the buggy address:
[   29.790191]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.790284]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.790540] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.790727]                                      ^
[   29.790933]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.790987]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.791205] ==================================================================
[   29.800997] ==================================================================
[   29.801050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   29.801589] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.801744] 
[   29.801778] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.802090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.802231] Hardware name: linux,dummy-virt (DT)
[   29.802474] Call trace:
[   29.802500]  show_stack+0x20/0x38 (C)
[   29.802662]  dump_stack_lvl+0x8c/0xd0
[   29.802876]  print_report+0x118/0x608
[   29.802937]  kasan_report+0xdc/0x128
[   29.802991]  kasan_check_range+0x100/0x1a8
[   29.803040]  __kasan_check_write+0x20/0x30
[   29.803098]  kasan_atomics_helper+0x14e4/0x4858
[   29.803448]  kasan_atomics+0x198/0x2e0
[   29.803826]  kunit_try_run_case+0x170/0x3f0
[   29.803954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.804161]  kthread+0x328/0x630
[   29.804355]  ret_from_fork+0x10/0x20
[   29.804578] 
[   29.804640] Allocated by task 277:
[   29.805027]  kasan_save_stack+0x3c/0x68
[   29.805601]  kasan_save_track+0x20/0x40
[   29.805668]  kasan_save_alloc_info+0x40/0x58
[   29.806022]  __kasan_kmalloc+0xd4/0xd8
[   29.806219]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.806375]  kasan_atomics+0xb8/0x2e0
[   29.806685]  kunit_try_run_case+0x170/0x3f0
[   29.806833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.807013]  kthread+0x328/0x630
[   29.807254]  ret_from_fork+0x10/0x20
[   29.807657] 
[   29.807687] The buggy address belongs to the object at fff00000c451ca00
[   29.807687]  which belongs to the cache kmalloc-64 of size 64
[   29.807763] The buggy address is located 0 bytes to the right of
[   29.807763]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.808010] 
[   29.808285] The buggy address belongs to the physical page:
[   29.808405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.808684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.808744] page_type: f5(slab)
[   29.809005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.809306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.809536] page dumped because: kasan: bad access detected
[   29.809731] 
[   29.809774] Memory state around the buggy address:
[   29.809925]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.809996]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.810047] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.810233]                                      ^
[   29.810441]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.810734]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.810848] ==================================================================
[   29.737786] ==================================================================
[   29.737846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.737900] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.738066] 
[   29.738101] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.738198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.738431] Hardware name: linux,dummy-virt (DT)
[   29.738797] Call trace:
[   29.738840]  show_stack+0x20/0x38 (C)
[   29.738893]  dump_stack_lvl+0x8c/0xd0
[   29.739095]  print_report+0x118/0x608
[   29.739169]  kasan_report+0xdc/0x128
[   29.739303]  kasan_check_range+0x100/0x1a8
[   29.739353]  __kasan_check_write+0x20/0x30
[   29.739415]  kasan_atomics_helper+0x11f8/0x4858
[   29.739604]  kasan_atomics+0x198/0x2e0
[   29.739668]  kunit_try_run_case+0x170/0x3f0
[   29.739719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.740433]  kthread+0x328/0x630
[   29.740762]  ret_from_fork+0x10/0x20
[   29.740859] 
[   29.740926] Allocated by task 277:
[   29.740990]  kasan_save_stack+0x3c/0x68
[   29.741088]  kasan_save_track+0x20/0x40
[   29.741163]  kasan_save_alloc_info+0x40/0x58
[   29.741217]  __kasan_kmalloc+0xd4/0xd8
[   29.741257]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.741467]  kasan_atomics+0xb8/0x2e0
[   29.741617]  kunit_try_run_case+0x170/0x3f0
[   29.742002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.742199]  kthread+0x328/0x630
[   29.742397]  ret_from_fork+0x10/0x20
[   29.742932] 
[   29.743116] The buggy address belongs to the object at fff00000c451ca00
[   29.743116]  which belongs to the cache kmalloc-64 of size 64
[   29.743365] The buggy address is located 0 bytes to the right of
[   29.743365]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.743589] 
[   29.743812] The buggy address belongs to the physical page:
[   29.744044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.744297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.744546] page_type: f5(slab)
[   29.744631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.744936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.745087] page dumped because: kasan: bad access detected
[   29.745193] 
[   29.745271] Memory state around the buggy address:
[   29.745358]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.745547]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.745755] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.745826]                                      ^
[   29.745923]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746081]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746183] ==================================================================
[   29.654434] ==================================================================
[   29.654488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.654541] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.654592] 
[   29.654623] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.654712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.655661] Hardware name: linux,dummy-virt (DT)
[   29.655751] Call trace:
[   29.655897]  show_stack+0x20/0x38 (C)
[   29.656109]  dump_stack_lvl+0x8c/0xd0
[   29.656398]  print_report+0x118/0x608
[   29.656544]  kasan_report+0xdc/0x128
[   29.656818]  __asan_report_store8_noabort+0x20/0x30
[   29.657222]  kasan_atomics_helper+0x3e5c/0x4858
[   29.657426]  kasan_atomics+0x198/0x2e0
[   29.657508]  kunit_try_run_case+0x170/0x3f0
[   29.657640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.657722]  kthread+0x328/0x630
[   29.657776]  ret_from_fork+0x10/0x20
[   29.657835] 
[   29.657862] Allocated by task 277:
[   29.657899]  kasan_save_stack+0x3c/0x68
[   29.657945]  kasan_save_track+0x20/0x40
[   29.657985]  kasan_save_alloc_info+0x40/0x58
[   29.658023]  __kasan_kmalloc+0xd4/0xd8
[   29.658073]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.658114]  kasan_atomics+0xb8/0x2e0
[   29.658166]  kunit_try_run_case+0x170/0x3f0
[   29.658215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.658261]  kthread+0x328/0x630
[   29.658304]  ret_from_fork+0x10/0x20
[   29.658352] 
[   29.658387] The buggy address belongs to the object at fff00000c451ca00
[   29.658387]  which belongs to the cache kmalloc-64 of size 64
[   29.658446] The buggy address is located 0 bytes to the right of
[   29.658446]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.658511] 
[   29.658534] The buggy address belongs to the physical page:
[   29.658589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.658657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.658706] page_type: f5(slab)
[   29.658746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.658797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.658839] page dumped because: kasan: bad access detected
[   29.658881] 
[   29.658904] Memory state around the buggy address:
[   29.658946]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.659001]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.659045] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.659771]                                      ^
[   29.659839]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.659887]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.660294] ==================================================================
[   29.835498] ==================================================================
[   29.835551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   29.835605] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.835803] 
[   29.835838] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.835927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.836369] Hardware name: linux,dummy-virt (DT)
[   29.836460] Call trace:
[   29.836597]  show_stack+0x20/0x38 (C)
[   29.836759]  dump_stack_lvl+0x8c/0xd0
[   29.836884]  print_report+0x118/0x608
[   29.836931]  kasan_report+0xdc/0x128
[   29.836988]  kasan_check_range+0x100/0x1a8
[   29.837203]  __kasan_check_write+0x20/0x30
[   29.837289]  kasan_atomics_helper+0x1644/0x4858
[   29.837467]  kasan_atomics+0x198/0x2e0
[   29.837703]  kunit_try_run_case+0x170/0x3f0
[   29.837873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.838171]  kthread+0x328/0x630
[   29.838373]  ret_from_fork+0x10/0x20
[   29.838449] 
[   29.838470] Allocated by task 277:
[   29.838511]  kasan_save_stack+0x3c/0x68
[   29.838555]  kasan_save_track+0x20/0x40
[   29.838595]  kasan_save_alloc_info+0x40/0x58
[   29.838652]  __kasan_kmalloc+0xd4/0xd8
[   29.838693]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.838735]  kasan_atomics+0xb8/0x2e0
[   29.838772]  kunit_try_run_case+0x170/0x3f0
[   29.838813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.838868]  kthread+0x328/0x630
[   29.838904]  ret_from_fork+0x10/0x20
[   29.838957] 
[   29.838987] The buggy address belongs to the object at fff00000c451ca00
[   29.838987]  which belongs to the cache kmalloc-64 of size 64
[   29.839047] The buggy address is located 0 bytes to the right of
[   29.839047]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.839423] 
[   29.839793] The buggy address belongs to the physical page:
[   29.839864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.840196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.840593] page_type: f5(slab)
[   29.840744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.841160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.841692] page dumped because: kasan: bad access detected
[   29.841752] 
[   29.841806] Memory state around the buggy address:
[   29.841868]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.842051]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.842439] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.842568]                                      ^
[   29.842614]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.842695]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.842738] ==================================================================
[   29.851560] ==================================================================
[   29.851609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   29.851657] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.851708] 
[   29.851738] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.852354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.852471] Hardware name: linux,dummy-virt (DT)
[   29.852514] Call trace:
[   29.852539]  show_stack+0x20/0x38 (C)
[   29.852592]  dump_stack_lvl+0x8c/0xd0
[   29.852944]  print_report+0x118/0x608
[   29.853226]  kasan_report+0xdc/0x128
[   29.853539]  kasan_check_range+0x100/0x1a8
[   29.853658]  __kasan_check_write+0x20/0x30
[   29.853835]  kasan_atomics_helper+0x16d0/0x4858
[   29.854224]  kasan_atomics+0x198/0x2e0
[   29.854315]  kunit_try_run_case+0x170/0x3f0
[   29.854498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.854714]  kthread+0x328/0x630
[   29.854767]  ret_from_fork+0x10/0x20
[   29.855066] 
[   29.855247] Allocated by task 277:
[   29.855585]  kasan_save_stack+0x3c/0x68
[   29.855844]  kasan_save_track+0x20/0x40
[   29.855953]  kasan_save_alloc_info+0x40/0x58
[   29.856446]  __kasan_kmalloc+0xd4/0xd8
[   29.856591]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.856660]  kasan_atomics+0xb8/0x2e0
[   29.856729]  kunit_try_run_case+0x170/0x3f0
[   29.856771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.857101]  kthread+0x328/0x630
[   29.857346]  ret_from_fork+0x10/0x20
[   29.857558] 
[   29.857616] The buggy address belongs to the object at fff00000c451ca00
[   29.857616]  which belongs to the cache kmalloc-64 of size 64
[   29.857914] The buggy address is located 0 bytes to the right of
[   29.857914]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.858377] 
[   29.858580] The buggy address belongs to the physical page:
[   29.858644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.858738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.858996] page_type: f5(slab)
[   29.859167] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.859579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.859712] page dumped because: kasan: bad access detected
[   29.859838] 
[   29.859905] Memory state around the buggy address:
[   29.859987]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.860364]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.860494] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.860700]                                      ^
[   29.860744]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.860915]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.861142] ==================================================================
[   29.662791] ==================================================================
[   29.662916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.663227] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.663281] 
[   29.663314] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.663536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.663787] Hardware name: linux,dummy-virt (DT)
[   29.663947] Call trace:
[   29.664203]  show_stack+0x20/0x38 (C)
[   29.664605]  dump_stack_lvl+0x8c/0xd0
[   29.664733]  print_report+0x118/0x608
[   29.664955]  kasan_report+0xdc/0x128
[   29.665395]  kasan_check_range+0x100/0x1a8
[   29.665589]  __kasan_check_write+0x20/0x30
[   29.666121]  kasan_atomics_helper+0xeb8/0x4858
[   29.666446]  kasan_atomics+0x198/0x2e0
[   29.666568]  kunit_try_run_case+0x170/0x3f0
[   29.666722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.666934]  kthread+0x328/0x630
[   29.667029]  ret_from_fork+0x10/0x20
[   29.667619] 
[   29.667730] Allocated by task 277:
[   29.667840]  kasan_save_stack+0x3c/0x68
[   29.667895]  kasan_save_track+0x20/0x40
[   29.667936]  kasan_save_alloc_info+0x40/0x58
[   29.667974]  __kasan_kmalloc+0xd4/0xd8
[   29.668271]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.668501]  kasan_atomics+0xb8/0x2e0
[   29.668971]  kunit_try_run_case+0x170/0x3f0
[   29.669156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.669398]  kthread+0x328/0x630
[   29.669486]  ret_from_fork+0x10/0x20
[   29.669666] 
[   29.669729] The buggy address belongs to the object at fff00000c451ca00
[   29.669729]  which belongs to the cache kmalloc-64 of size 64
[   29.669792] The buggy address is located 0 bytes to the right of
[   29.669792]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.670006] 
[   29.670127] The buggy address belongs to the physical page:
[   29.670545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.670646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.670826] page_type: f5(slab)
[   29.671024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.671407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.671534] page dumped because: kasan: bad access detected
[   29.671637] 
[   29.671686] Memory state around the buggy address:
[   29.671722]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.672041]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.672281] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.672516]                                      ^
[   29.672740]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.672826]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.672939] ==================================================================
[   29.764693] ==================================================================
[   29.764746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   29.764798] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.764866] 
[   29.764897] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.765356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.765548] Hardware name: linux,dummy-virt (DT)
[   29.765725] Call trace:
[   29.765766]  show_stack+0x20/0x38 (C)
[   29.765820]  dump_stack_lvl+0x8c/0xd0
[   29.765930]  print_report+0x118/0x608
[   29.766019]  kasan_report+0xdc/0x128
[   29.766085]  kasan_check_range+0x100/0x1a8
[   29.766304]  __kasan_check_write+0x20/0x30
[   29.766368]  kasan_atomics_helper+0x1384/0x4858
[   29.766698]  kasan_atomics+0x198/0x2e0
[   29.766812]  kunit_try_run_case+0x170/0x3f0
[   29.767338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.767417]  kthread+0x328/0x630
[   29.767465]  ret_from_fork+0x10/0x20
[   29.767801] 
[   29.767849] Allocated by task 277:
[   29.767883]  kasan_save_stack+0x3c/0x68
[   29.767929]  kasan_save_track+0x20/0x40
[   29.767970]  kasan_save_alloc_info+0x40/0x58
[   29.768009]  __kasan_kmalloc+0xd4/0xd8
[   29.768580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.769004]  kasan_atomics+0xb8/0x2e0
[   29.769240]  kunit_try_run_case+0x170/0x3f0
[   29.769327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.769685]  kthread+0x328/0x630
[   29.769747]  ret_from_fork+0x10/0x20
[   29.769908] 
[   29.770157] The buggy address belongs to the object at fff00000c451ca00
[   29.770157]  which belongs to the cache kmalloc-64 of size 64
[   29.770363] The buggy address is located 0 bytes to the right of
[   29.770363]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.770582] 
[   29.770752] The buggy address belongs to the physical page:
[   29.770985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.771204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.771412] page_type: f5(slab)
[   29.771494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.771548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.771780] page dumped because: kasan: bad access detected
[   29.772166] 
[   29.772345] Memory state around the buggy address:
[   29.772419]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.772569]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.772616] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.772670]                                      ^
[   29.772714]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.773287]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.773554] ==================================================================
[   29.674148] ==================================================================
[   29.674382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.674460] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.674663] 
[   29.674875] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.675012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.675069] Hardware name: linux,dummy-virt (DT)
[   29.675105] Call trace:
[   29.675588]  show_stack+0x20/0x38 (C)
[   29.675701]  dump_stack_lvl+0x8c/0xd0
[   29.675772]  print_report+0x118/0x608
[   29.676156]  kasan_report+0xdc/0x128
[   29.676278]  kasan_check_range+0x100/0x1a8
[   29.676532]  __kasan_check_write+0x20/0x30
[   29.676612]  kasan_atomics_helper+0xf20/0x4858
[   29.676667]  kasan_atomics+0x198/0x2e0
[   29.676995]  kunit_try_run_case+0x170/0x3f0
[   29.677160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.677535]  kthread+0x328/0x630
[   29.677800]  ret_from_fork+0x10/0x20
[   29.678018] 
[   29.678127] Allocated by task 277:
[   29.678326]  kasan_save_stack+0x3c/0x68
[   29.678629]  kasan_save_track+0x20/0x40
[   29.678865]  kasan_save_alloc_info+0x40/0x58
[   29.678917]  __kasan_kmalloc+0xd4/0xd8
[   29.678957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.679304]  kasan_atomics+0xb8/0x2e0
[   29.679771]  kunit_try_run_case+0x170/0x3f0
[   29.680076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.680259]  kthread+0x328/0x630
[   29.680301]  ret_from_fork+0x10/0x20
[   29.680340] 
[   29.680363] The buggy address belongs to the object at fff00000c451ca00
[   29.680363]  which belongs to the cache kmalloc-64 of size 64
[   29.680428] The buggy address is located 0 bytes to the right of
[   29.680428]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.680492] 
[   29.680523] The buggy address belongs to the physical page:
[   29.680553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.680626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.680683] page_type: f5(slab)
[   29.680732] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.680792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.680840] page dumped because: kasan: bad access detected
[   29.680873] 
[   29.680892] Memory state around the buggy address:
[   29.680933]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.680979]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.681028] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.681079]                                      ^
[   29.681127]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.681186]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.681235] ==================================================================
[   29.607019] ==================================================================
[   29.607389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.607488] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.607543] 
[   29.607574] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.607662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.607916] Hardware name: linux,dummy-virt (DT)
[   29.608307] Call trace:
[   29.608409]  show_stack+0x20/0x38 (C)
[   29.608494]  dump_stack_lvl+0x8c/0xd0
[   29.608626]  print_report+0x118/0x608
[   29.608681]  kasan_report+0xdc/0x128
[   29.608878]  kasan_check_range+0x100/0x1a8
[   29.609325]  __kasan_check_write+0x20/0x30
[   29.609546]  kasan_atomics_helper+0xd3c/0x4858
[   29.609787]  kasan_atomics+0x198/0x2e0
[   29.610011]  kunit_try_run_case+0x170/0x3f0
[   29.610274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.610493]  kthread+0x328/0x630
[   29.610556]  ret_from_fork+0x10/0x20
[   29.610672] 
[   29.610850] Allocated by task 277:
[   29.611000]  kasan_save_stack+0x3c/0x68
[   29.611230]  kasan_save_track+0x20/0x40
[   29.611463]  kasan_save_alloc_info+0x40/0x58
[   29.611597]  __kasan_kmalloc+0xd4/0xd8
[   29.611638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.611755]  kasan_atomics+0xb8/0x2e0
[   29.612208]  kunit_try_run_case+0x170/0x3f0
[   29.612439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.612544]  kthread+0x328/0x630
[   29.612595]  ret_from_fork+0x10/0x20
[   29.612838] 
[   29.612936] The buggy address belongs to the object at fff00000c451ca00
[   29.612936]  which belongs to the cache kmalloc-64 of size 64
[   29.613228] The buggy address is located 0 bytes to the right of
[   29.613228]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.613400] 
[   29.613479] The buggy address belongs to the physical page:
[   29.613529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.613847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.614205] page_type: f5(slab)
[   29.614396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.614650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.614790] page dumped because: kasan: bad access detected
[   29.614891] 
[   29.615000] Memory state around the buggy address:
[   29.615033]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.615246]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.615720] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.615936]                                      ^
[   29.616026]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.616207]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.616286] ==================================================================
[   29.826232] ==================================================================
[   29.826302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   29.826355] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.826595] 
[   29.826638] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.826729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.827026] Hardware name: linux,dummy-virt (DT)
[   29.827323] Call trace:
[   29.827416]  show_stack+0x20/0x38 (C)
[   29.827478]  dump_stack_lvl+0x8c/0xd0
[   29.827689]  print_report+0x118/0x608
[   29.827892]  kasan_report+0xdc/0x128
[   29.827963]  __asan_report_load8_noabort+0x20/0x30
[   29.828153]  kasan_atomics_helper+0x3db0/0x4858
[   29.828260]  kasan_atomics+0x198/0x2e0
[   29.828410]  kunit_try_run_case+0x170/0x3f0
[   29.828469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.828524]  kthread+0x328/0x630
[   29.828569]  ret_from_fork+0x10/0x20
[   29.828920] 
[   29.829257] Allocated by task 277:
[   29.829314]  kasan_save_stack+0x3c/0x68
[   29.829431]  kasan_save_track+0x20/0x40
[   29.829647]  kasan_save_alloc_info+0x40/0x58
[   29.830163]  __kasan_kmalloc+0xd4/0xd8
[   29.830329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.830520]  kasan_atomics+0xb8/0x2e0
[   29.830726]  kunit_try_run_case+0x170/0x3f0
[   29.830792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.831348]  kthread+0x328/0x630
[   29.831427]  ret_from_fork+0x10/0x20
[   29.831603] 
[   29.831641] The buggy address belongs to the object at fff00000c451ca00
[   29.831641]  which belongs to the cache kmalloc-64 of size 64
[   29.831839] The buggy address is located 0 bytes to the right of
[   29.831839]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.832076] 
[   29.832103] The buggy address belongs to the physical page:
[   29.832138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.832194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.832243] page_type: f5(slab)
[   29.832578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.832906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.833093] page dumped because: kasan: bad access detected
[   29.833222] 
[   29.833396] Memory state around the buggy address:
[   29.833565]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.833746]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.833848] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.833946]                                      ^
[   29.834121]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.834205]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.834253] ==================================================================
[   29.626710] ==================================================================
[   29.626773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.626826] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.626901] 
[   29.626938] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.627239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.627283] Hardware name: linux,dummy-virt (DT)
[   29.627607] Call trace:
[   29.627706]  show_stack+0x20/0x38 (C)
[   29.627768]  dump_stack_lvl+0x8c/0xd0
[   29.628145]  print_report+0x118/0x608
[   29.628262]  kasan_report+0xdc/0x128
[   29.628628]  kasan_check_range+0x100/0x1a8
[   29.628789]  __kasan_check_read+0x20/0x30
[   29.628845]  kasan_atomics_helper+0xdd4/0x4858
[   29.629156]  kasan_atomics+0x198/0x2e0
[   29.629724]  kunit_try_run_case+0x170/0x3f0
[   29.630205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.630402]  kthread+0x328/0x630
[   29.630496]  ret_from_fork+0x10/0x20
[   29.630655] 
[   29.630797] Allocated by task 277:
[   29.631107]  kasan_save_stack+0x3c/0x68
[   29.631328]  kasan_save_track+0x20/0x40
[   29.631497]  kasan_save_alloc_info+0x40/0x58
[   29.631545]  __kasan_kmalloc+0xd4/0xd8
[   29.631585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.631787]  kasan_atomics+0xb8/0x2e0
[   29.631964]  kunit_try_run_case+0x170/0x3f0
[   29.632259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.632317]  kthread+0x328/0x630
[   29.632473]  ret_from_fork+0x10/0x20
[   29.632546] 
[   29.632585] The buggy address belongs to the object at fff00000c451ca00
[   29.632585]  which belongs to the cache kmalloc-64 of size 64
[   29.632654] The buggy address is located 0 bytes to the right of
[   29.632654]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.632720] 
[   29.632758] The buggy address belongs to the physical page:
[   29.632797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.632852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.633264] page_type: f5(slab)
[   29.633389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.633792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.633870] page dumped because: kasan: bad access detected
[   29.634077] 
[   29.634303] Memory state around the buggy address:
[   29.634513]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.634585]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.634712] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.634813]                                      ^
[   29.634906]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.634950]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.635124] ==================================================================
[   29.887450] ==================================================================
[   29.887534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   29.887588] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.887784] 
[   29.887880] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.888097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.888243] Hardware name: linux,dummy-virt (DT)
[   29.888287] Call trace:
[   29.888311]  show_stack+0x20/0x38 (C)
[   29.888364]  dump_stack_lvl+0x8c/0xd0
[   29.888577]  print_report+0x118/0x608
[   29.889079]  kasan_report+0xdc/0x128
[   29.889238]  kasan_check_range+0x100/0x1a8
[   29.889363]  __kasan_check_write+0x20/0x30
[   29.889505]  kasan_atomics_helper+0x17ec/0x4858
[   29.889639]  kasan_atomics+0x198/0x2e0
[   29.889697]  kunit_try_run_case+0x170/0x3f0
[   29.889934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.890098]  kthread+0x328/0x630
[   29.890374]  ret_from_fork+0x10/0x20
[   29.890499] 
[   29.890696] Allocated by task 277:
[   29.890872]  kasan_save_stack+0x3c/0x68
[   29.891273]  kasan_save_track+0x20/0x40
[   29.891349]  kasan_save_alloc_info+0x40/0x58
[   29.891480]  __kasan_kmalloc+0xd4/0xd8
[   29.891690]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.891833]  kasan_atomics+0xb8/0x2e0
[   29.892216]  kunit_try_run_case+0x170/0x3f0
[   29.892270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.892317]  kthread+0x328/0x630
[   29.892353]  ret_from_fork+0x10/0x20
[   29.892391] 
[   29.892413] The buggy address belongs to the object at fff00000c451ca00
[   29.892413]  which belongs to the cache kmalloc-64 of size 64
[   29.892943] The buggy address is located 0 bytes to the right of
[   29.892943]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.893498] 
[   29.893879] The buggy address belongs to the physical page:
[   29.894169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.894254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.894307] page_type: f5(slab)
[   29.894359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.894410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.894453] page dumped because: kasan: bad access detected
[   29.894593] 
[   29.894621] Memory state around the buggy address:
[   29.894656]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.894702]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.894768] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.894809]                                      ^
[   29.894853]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.894904]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.894951] ==================================================================
[   29.862394] ==================================================================
[   29.862468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   29.862531] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.862673] 
[   29.862707] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.862803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.862957] Hardware name: linux,dummy-virt (DT)
[   29.863040] Call trace:
[   29.863095]  show_stack+0x20/0x38 (C)
[   29.863159]  dump_stack_lvl+0x8c/0xd0
[   29.863529]  print_report+0x118/0x608
[   29.863616]  kasan_report+0xdc/0x128
[   29.863726]  __asan_report_load8_noabort+0x20/0x30
[   29.863793]  kasan_atomics_helper+0x3e10/0x4858
[   29.863844]  kasan_atomics+0x198/0x2e0
[   29.864179]  kunit_try_run_case+0x170/0x3f0
[   29.864260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.864430]  kthread+0x328/0x630
[   29.864644]  ret_from_fork+0x10/0x20
[   29.864916] 
[   29.864940] Allocated by task 277:
[   29.864973]  kasan_save_stack+0x3c/0x68
[   29.865157]  kasan_save_track+0x20/0x40
[   29.865208]  kasan_save_alloc_info+0x40/0x58
[   29.865247]  __kasan_kmalloc+0xd4/0xd8
[   29.865470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.865524]  kasan_atomics+0xb8/0x2e0
[   29.865591]  kunit_try_run_case+0x170/0x3f0
[   29.865633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.865678]  kthread+0x328/0x630
[   29.865724]  ret_from_fork+0x10/0x20
[   29.865764] 
[   29.865785] The buggy address belongs to the object at fff00000c451ca00
[   29.865785]  which belongs to the cache kmalloc-64 of size 64
[   29.865855] The buggy address is located 0 bytes to the right of
[   29.865855]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.865922] 
[   29.865942] The buggy address belongs to the physical page:
[   29.865984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.866044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.866125] page_type: f5(slab)
[   29.866170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.866234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.866276] page dumped because: kasan: bad access detected
[   29.866318] 
[   29.866344] Memory state around the buggy address:
[   29.866383]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.866427]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.866471] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.866509]                                      ^
[   29.866555]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.866611]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.866662] ==================================================================
[   29.534338] ==================================================================
[   29.534391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.534446] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.534499] 
[   29.535112] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.535477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.535529] Hardware name: linux,dummy-virt (DT)
[   29.535619] Call trace:
[   29.535646]  show_stack+0x20/0x38 (C)
[   29.535919]  dump_stack_lvl+0x8c/0xd0
[   29.535994]  print_report+0x118/0x608
[   29.536503]  kasan_report+0xdc/0x128
[   29.536693]  kasan_check_range+0x100/0x1a8
[   29.536851]  __kasan_check_write+0x20/0x30
[   29.537498]  kunit_try_run_case+0x170/0x3f0
[   29.539178] 
[   29.539366] The buggy address belongs to the physical page:
[   29.539451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.539501] page_type: f5(slab)
[   29.539549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.539601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.539643] page dumped because: kasan: bad access detected
[   29.539675] 
[   29.539705] Memory state around the buggy address:
[   29.539738]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.540042]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.540340] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.540423]                                      ^
[   29.540740]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540896]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.541075] ==================================================================
[   29.695907] ==================================================================
[   29.695965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.696042] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.696107] 
[   29.696139] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.696226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.696253] Hardware name: linux,dummy-virt (DT)
[   29.696299] Call trace:
[   29.696323]  show_stack+0x20/0x38 (C)
[   29.696372]  dump_stack_lvl+0x8c/0xd0
[   29.696421]  print_report+0x118/0x608
[   29.696468]  kasan_report+0xdc/0x128
[   29.696525]  kasan_check_range+0x100/0x1a8
[   29.696577]  __kasan_check_write+0x20/0x30
[   29.696638]  kasan_atomics_helper+0xff0/0x4858
[   29.696688]  kasan_atomics+0x198/0x2e0
[   29.696735]  kunit_try_run_case+0x170/0x3f0
[   29.696784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.696839]  kthread+0x328/0x630
[   29.696882]  ret_from_fork+0x10/0x20
[   29.696931] 
[   29.696951] Allocated by task 277:
[   29.696980]  kasan_save_stack+0x3c/0x68
[   29.697022]  kasan_save_track+0x20/0x40
[   29.697328]  kasan_save_alloc_info+0x40/0x58
[   29.697673]  __kasan_kmalloc+0xd4/0xd8
[   29.698105]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.698194]  kasan_atomics+0xb8/0x2e0
[   29.698273]  kunit_try_run_case+0x170/0x3f0
[   29.698518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.698682]  kthread+0x328/0x630
[   29.698864]  ret_from_fork+0x10/0x20
[   29.698946] 
[   29.699268] The buggy address belongs to the object at fff00000c451ca00
[   29.699268]  which belongs to the cache kmalloc-64 of size 64
[   29.699623] The buggy address is located 0 bytes to the right of
[   29.699623]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.700184] 
[   29.700245] The buggy address belongs to the physical page:
[   29.700278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.700332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.700546] page_type: f5(slab)
[   29.700967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.701484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.701542] page dumped because: kasan: bad access detected
[   29.701703] 
[   29.702139] Memory state around the buggy address:
[   29.702457]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.702605]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.702908] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.703301]                                      ^
[   29.703475]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.703602]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.703854] ==================================================================
[   29.756284] ==================================================================
[   29.756336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.756793] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.756864] 
[   29.757108] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.757211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.757248] Hardware name: linux,dummy-virt (DT)
[   29.757279] Call trace:
[   29.757303]  show_stack+0x20/0x38 (C)
[   29.757355]  dump_stack_lvl+0x8c/0xd0
[   29.757636]  print_report+0x118/0x608
[   29.757714]  kasan_report+0xdc/0x128
[   29.758038]  kasan_check_range+0x100/0x1a8
[   29.758193]  __kasan_check_write+0x20/0x30
[   29.758246]  kasan_atomics_helper+0x12d8/0x4858
[   29.758419]  kasan_atomics+0x198/0x2e0
[   29.758489]  kunit_try_run_case+0x170/0x3f0
[   29.758543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.758801]  kthread+0x328/0x630
[   29.758979]  ret_from_fork+0x10/0x20
[   29.759231] 
[   29.759279] Allocated by task 277:
[   29.759329]  kasan_save_stack+0x3c/0x68
[   29.759376]  kasan_save_track+0x20/0x40
[   29.759948]  kasan_save_alloc_info+0x40/0x58
[   29.760163]  __kasan_kmalloc+0xd4/0xd8
[   29.760247]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.760290]  kasan_atomics+0xb8/0x2e0
[   29.760327]  kunit_try_run_case+0x170/0x3f0
[   29.760369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.760417]  kthread+0x328/0x630
[   29.760454]  ret_from_fork+0x10/0x20
[   29.761140] 
[   29.761256] The buggy address belongs to the object at fff00000c451ca00
[   29.761256]  which belongs to the cache kmalloc-64 of size 64
[   29.761323] The buggy address is located 0 bytes to the right of
[   29.761323]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.761953] 
[   29.761995] The buggy address belongs to the physical page:
[   29.762031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.762096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.762203] page_type: f5(slab)
[   29.762246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.762316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.762360] page dumped because: kasan: bad access detected
[   29.762393] 
[   29.762424] Memory state around the buggy address:
[   29.762457]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.762502]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.762555] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.762596]                                      ^
[   29.762636]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.762681]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.762736] ==================================================================
[   29.878320] ==================================================================
[   29.878536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   29.878685] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.878761] 
[   29.878820] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.878981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.879037] Hardware name: linux,dummy-virt (DT)
[   29.879220] Call trace:
[   29.879247]  show_stack+0x20/0x38 (C)
[   29.879453]  dump_stack_lvl+0x8c/0xd0
[   29.879515]  print_report+0x118/0x608
[   29.879803]  kasan_report+0xdc/0x128
[   29.880298]  __asan_report_load8_noabort+0x20/0x30
[   29.880388]  kasan_atomics_helper+0x3e20/0x4858
[   29.880443]  kasan_atomics+0x198/0x2e0
[   29.880491]  kunit_try_run_case+0x170/0x3f0
[   29.880690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.881202]  kthread+0x328/0x630
[   29.881335]  ret_from_fork+0x10/0x20
[   29.881438] 
[   29.881476] Allocated by task 277:
[   29.881653]  kasan_save_stack+0x3c/0x68
[   29.881868]  kasan_save_track+0x20/0x40
[   29.882098]  kasan_save_alloc_info+0x40/0x58
[   29.882271]  __kasan_kmalloc+0xd4/0xd8
[   29.882322]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.882566]  kasan_atomics+0xb8/0x2e0
[   29.882740]  kunit_try_run_case+0x170/0x3f0
[   29.883103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.883260]  kthread+0x328/0x630
[   29.883299]  ret_from_fork+0x10/0x20
[   29.883497] 
[   29.883708] The buggy address belongs to the object at fff00000c451ca00
[   29.883708]  which belongs to the cache kmalloc-64 of size 64
[   29.883904] The buggy address is located 0 bytes to the right of
[   29.883904]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.884111] 
[   29.884137] The buggy address belongs to the physical page:
[   29.884322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.884588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.884723] page_type: f5(slab)
[   29.885110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.885250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.885355] page dumped because: kasan: bad access detected
[   29.885389] 
[   29.885556] Memory state around the buggy address:
[   29.885739]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.885790]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.885834] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.885875]                                      ^
[   29.885943]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.885987]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.886028] ==================================================================
[   29.617917] ==================================================================
[   29.617969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.618032] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.618519] 
[   29.618598] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.618693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.618723] Hardware name: linux,dummy-virt (DT)
[   29.618755] Call trace:
[   29.618778]  show_stack+0x20/0x38 (C)
[   29.618832]  dump_stack_lvl+0x8c/0xd0
[   29.618883]  print_report+0x118/0x608
[   29.618932]  kasan_report+0xdc/0x128
[   29.619002]  __asan_report_load4_noabort+0x20/0x30
[   29.619068]  kasan_atomics_helper+0x3e04/0x4858
[   29.619136]  kasan_atomics+0x198/0x2e0
[   29.619193]  kunit_try_run_case+0x170/0x3f0
[   29.619251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.619311]  kthread+0x328/0x630
[   29.619355]  ret_from_fork+0x10/0x20
[   29.619415] 
[   29.619444] Allocated by task 277:
[   29.619475]  kasan_save_stack+0x3c/0x68
[   29.619518]  kasan_save_track+0x20/0x40
[   29.619573]  kasan_save_alloc_info+0x40/0x58
[   29.619622]  __kasan_kmalloc+0xd4/0xd8
[   29.619663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.619707]  kasan_atomics+0xb8/0x2e0
[   29.619744]  kunit_try_run_case+0x170/0x3f0
[   29.620532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.620592]  kthread+0x328/0x630
[   29.621025]  ret_from_fork+0x10/0x20
[   29.621274] 
[   29.621329] The buggy address belongs to the object at fff00000c451ca00
[   29.621329]  which belongs to the cache kmalloc-64 of size 64
[   29.621525] The buggy address is located 0 bytes to the right of
[   29.621525]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.621778] 
[   29.621819] The buggy address belongs to the physical page:
[   29.621870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.622205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.622387] page_type: f5(slab)
[   29.622499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.622578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.622974] page dumped because: kasan: bad access detected
[   29.623214] 
[   29.623418] Memory state around the buggy address:
[   29.623494]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.623637]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.623751] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.623940]                                      ^
[   29.623982]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.624121]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.624348] ==================================================================
[   29.705377] ==================================================================
[   29.705441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.705706] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.705786] 
[   29.706073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.706290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.706506] Hardware name: linux,dummy-virt (DT)
[   29.706669] Call trace:
[   29.706841]  show_stack+0x20/0x38 (C)
[   29.707027]  dump_stack_lvl+0x8c/0xd0
[   29.707359]  print_report+0x118/0x608
[   29.707533]  kasan_report+0xdc/0x128
[   29.707596]  kasan_check_range+0x100/0x1a8
[   29.707935]  __kasan_check_write+0x20/0x30
[   29.708148]  kasan_atomics_helper+0x1058/0x4858
[   29.708282]  kasan_atomics+0x198/0x2e0
[   29.708336]  kunit_try_run_case+0x170/0x3f0
[   29.708393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.708594]  kthread+0x328/0x630
[   29.708836]  ret_from_fork+0x10/0x20
[   29.709006] 
[   29.709040] Allocated by task 277:
[   29.709085]  kasan_save_stack+0x3c/0x68
[   29.709143]  kasan_save_track+0x20/0x40
[   29.709184]  kasan_save_alloc_info+0x40/0x58
[   29.709221]  __kasan_kmalloc+0xd4/0xd8
[   29.709262]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.709314]  kasan_atomics+0xb8/0x2e0
[   29.709371]  kunit_try_run_case+0x170/0x3f0
[   29.709413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.709477]  kthread+0x328/0x630
[   29.709527]  ret_from_fork+0x10/0x20
[   29.709565] 
[   29.709593] The buggy address belongs to the object at fff00000c451ca00
[   29.709593]  which belongs to the cache kmalloc-64 of size 64
[   29.709675] The buggy address is located 0 bytes to the right of
[   29.709675]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.709750] 
[   29.709787] The buggy address belongs to the physical page:
[   29.709827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.709889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.709951] page_type: f5(slab)
[   29.709992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.710044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.710094] page dumped because: kasan: bad access detected
[   29.710127] 
[   29.710165] Memory state around the buggy address:
[   29.710198]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.710256]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.710307] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.710356]                                      ^
[   29.710400]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710451]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710500] ==================================================================
[   29.490137] ==================================================================
[   29.490204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.490258] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.490318] 
[   29.490351] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.490441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.490478] Hardware name: linux,dummy-virt (DT)
[   29.490511] Call trace:
[   29.490544]  show_stack+0x20/0x38 (C)
[   29.490595]  dump_stack_lvl+0x8c/0xd0
[   29.490644]  print_report+0x118/0x608
[   29.490701]  kasan_report+0xdc/0x128
[   29.490750]  __asan_report_load4_noabort+0x20/0x30
[   29.490801]  kasan_atomics_helper+0x42d8/0x4858
[   29.490863]  kasan_atomics+0x198/0x2e0
[   29.490912]  kunit_try_run_case+0x170/0x3f0
[   29.490968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.491023]  kthread+0x328/0x630
[   29.491466]  ret_from_fork+0x10/0x20
[   29.491527] 
[   29.491594] Allocated by task 277:
[   29.491628]  kasan_save_stack+0x3c/0x68
[   29.492294]  kasan_save_track+0x20/0x40
[   29.492375]  kasan_save_alloc_info+0x40/0x58
[   29.492416]  __kasan_kmalloc+0xd4/0xd8
[   29.492456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.492497]  kasan_atomics+0xb8/0x2e0
[   29.492537]  kunit_try_run_case+0x170/0x3f0
[   29.492940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.493509]  kthread+0x328/0x630
[   29.493614]  ret_from_fork+0x10/0x20
[   29.493709] 
[   29.493773] The buggy address belongs to the object at fff00000c451ca00
[   29.493773]  which belongs to the cache kmalloc-64 of size 64
[   29.494174] The buggy address is located 0 bytes to the right of
[   29.494174]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.494312] 
[   29.494337] The buggy address belongs to the physical page:
[   29.494779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.494856] page_type: f5(slab)
[   29.495203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.496341] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.499377] ==================================================================
[   29.721382] ==================================================================
[   29.721571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.721752] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.721815] 
[   29.721849] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.721941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.722136] Hardware name: linux,dummy-virt (DT)
[   29.722346] Call trace:
[   29.722393]  show_stack+0x20/0x38 (C)
[   29.722449]  dump_stack_lvl+0x8c/0xd0
[   29.722659]  print_report+0x118/0x608
[   29.722756]  kasan_report+0xdc/0x128
[   29.723091]  kasan_check_range+0x100/0x1a8
[   29.723172]  __kasan_check_write+0x20/0x30
[   29.723391]  kasan_atomics_helper+0x1128/0x4858
[   29.723456]  kasan_atomics+0x198/0x2e0
[   29.723603]  kunit_try_run_case+0x170/0x3f0
[   29.723659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.723715]  kthread+0x328/0x630
[   29.724073]  ret_from_fork+0x10/0x20
[   29.724486] 
[   29.724586] Allocated by task 277:
[   29.724624]  kasan_save_stack+0x3c/0x68
[   29.724672]  kasan_save_track+0x20/0x40
[   29.724712]  kasan_save_alloc_info+0x40/0x58
[   29.724759]  __kasan_kmalloc+0xd4/0xd8
[   29.724921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.725136]  kasan_atomics+0xb8/0x2e0
[   29.725219]  kunit_try_run_case+0x170/0x3f0
[   29.725583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.725936]  kthread+0x328/0x630
[   29.726193]  ret_from_fork+0x10/0x20
[   29.726244] 
[   29.726266] The buggy address belongs to the object at fff00000c451ca00
[   29.726266]  which belongs to the cache kmalloc-64 of size 64
[   29.726432] The buggy address is located 0 bytes to the right of
[   29.726432]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.726946] 
[   29.726983] The buggy address belongs to the physical page:
[   29.727036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.727102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.727153] page_type: f5(slab)
[   29.727388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.727677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.727925] page dumped because: kasan: bad access detected
[   29.728197] 
[   29.728248] Memory state around the buggy address:
[   29.728450]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.728681]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.728733] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.728773]                                      ^
[   29.728841]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.728886]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.728942] ==================================================================
[   29.868490] ==================================================================
[   29.868702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   29.869014] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.869095] 
[   29.869144] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.869321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.869390] Hardware name: linux,dummy-virt (DT)
[   29.869425] Call trace:
[   29.869449]  show_stack+0x20/0x38 (C)
[   29.869682]  dump_stack_lvl+0x8c/0xd0
[   29.869754]  print_report+0x118/0x608
[   29.869896]  kasan_report+0xdc/0x128
[   29.870147]  kasan_check_range+0x100/0x1a8
[   29.870703]  __kasan_check_write+0x20/0x30
[   29.870781]  kasan_atomics_helper+0x175c/0x4858
[   29.870833]  kasan_atomics+0x198/0x2e0
[   29.870880]  kunit_try_run_case+0x170/0x3f0
[   29.871031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.871151]  kthread+0x328/0x630
[   29.871214]  ret_from_fork+0x10/0x20
[   29.871554] 
[   29.871590] Allocated by task 277:
[   29.871893]  kasan_save_stack+0x3c/0x68
[   29.872274]  kasan_save_track+0x20/0x40
[   29.872364]  kasan_save_alloc_info+0x40/0x58
[   29.872420]  __kasan_kmalloc+0xd4/0xd8
[   29.872460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.872502]  kasan_atomics+0xb8/0x2e0
[   29.872540]  kunit_try_run_case+0x170/0x3f0
[   29.873014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.873321]  kthread+0x328/0x630
[   29.873452]  ret_from_fork+0x10/0x20
[   29.873581] 
[   29.873639] The buggy address belongs to the object at fff00000c451ca00
[   29.873639]  which belongs to the cache kmalloc-64 of size 64
[   29.873947] The buggy address is located 0 bytes to the right of
[   29.873947]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.874362] 
[   29.874881] The buggy address belongs to the physical page:
[   29.875043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.875241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.875560] page_type: f5(slab)
[   29.875609] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.876036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.876234] page dumped because: kasan: bad access detected
[   29.876456] 
[   29.876504] Memory state around the buggy address:
[   29.876661]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.876772]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.877152] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.877242]                                      ^
[   29.877323]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.877449]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.877561] ==================================================================
[   29.683045] ==================================================================
[   29.683559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.683633] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.683685] 
[   29.683715] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.683802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.684290] Hardware name: linux,dummy-virt (DT)
[   29.684618] Call trace:
[   29.684770]  show_stack+0x20/0x38 (C)
[   29.684849]  dump_stack_lvl+0x8c/0xd0
[   29.684920]  print_report+0x118/0x608
[   29.685281]  kasan_report+0xdc/0x128
[   29.685370]  kasan_check_range+0x100/0x1a8
[   29.685478]  __kasan_check_write+0x20/0x30
[   29.685541]  kasan_atomics_helper+0xf88/0x4858
[   29.685749]  kasan_atomics+0x198/0x2e0
[   29.685954]  kunit_try_run_case+0x170/0x3f0
[   29.686188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.686309]  kthread+0x328/0x630
[   29.686357]  ret_from_fork+0x10/0x20
[   29.686663] 
[   29.686995] Allocated by task 277:
[   29.687150]  kasan_save_stack+0x3c/0x68
[   29.687393]  kasan_save_track+0x20/0x40
[   29.688196]  kasan_save_alloc_info+0x40/0x58
[   29.688259]  __kasan_kmalloc+0xd4/0xd8
[   29.688301]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.688493]  kasan_atomics+0xb8/0x2e0
[   29.688896]  kunit_try_run_case+0x170/0x3f0
[   29.689241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.689449]  kthread+0x328/0x630
[   29.689518]  ret_from_fork+0x10/0x20
[   29.689690] 
[   29.690222] The buggy address belongs to the object at fff00000c451ca00
[   29.690222]  which belongs to the cache kmalloc-64 of size 64
[   29.690291] The buggy address is located 0 bytes to the right of
[   29.690291]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.690488] 
[   29.690823] The buggy address belongs to the physical page:
[   29.690865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.691181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.691709] page_type: f5(slab)
[   29.691785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.691859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.691915] page dumped because: kasan: bad access detected
[   29.691947] 
[   29.691968] Memory state around the buggy address:
[   29.692456]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.692666]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.692845] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.692945]                                      ^
[   29.693180]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.693830]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.693972] ==================================================================
[   29.508792] ==================================================================
[   29.508978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.509188] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.509253] 
[   29.509415] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.509517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.509725] Hardware name: linux,dummy-virt (DT)
[   29.509770] Call trace:
[   29.509796]  show_stack+0x20/0x38 (C)
[   29.509960]  dump_stack_lvl+0x8c/0xd0
[   29.510022]  print_report+0x118/0x608
[   29.510166]  kasan_report+0xdc/0x128
[   29.510284]  kasan_check_range+0x100/0x1a8
[   29.510402]  __kasan_check_write+0x20/0x30
[   29.510451]  kasan_atomics_helper+0x99c/0x4858
[   29.510502]  kasan_atomics+0x198/0x2e0
[   29.510547]  kunit_try_run_case+0x170/0x3f0
[   29.511020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.511122]  kthread+0x328/0x630
[   29.511327]  ret_from_fork+0x10/0x20
[   29.511394] 
[   29.511414] Allocated by task 277:
[   29.511642]  kasan_save_stack+0x3c/0x68
[   29.511796]  kasan_save_track+0x20/0x40
[   29.512028]  kasan_save_alloc_info+0x40/0x58
[   29.512089]  __kasan_kmalloc+0xd4/0xd8
[   29.512129]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.512365]  kasan_atomics+0xb8/0x2e0
[   29.512597]  kunit_try_run_case+0x170/0x3f0
[   29.512709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.512907]  kthread+0x328/0x630
[   29.512948]  ret_from_fork+0x10/0x20
[   29.513021] 
[   29.513232] The buggy address belongs to the object at fff00000c451ca00
[   29.513232]  which belongs to the cache kmalloc-64 of size 64
[   29.513331] The buggy address is located 0 bytes to the right of
[   29.513331]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.513540] 
[   29.513567] The buggy address belongs to the physical page:
[   29.513601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.513656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.513734] page_type: f5(slab)
[   29.513774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.513839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.513881] page dumped because: kasan: bad access detected
[   29.513923] 
[   29.513944] Memory state around the buggy address:
[   29.513984]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.514038]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.514095] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.514152]                                      ^
[   29.514249]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.515894] 
[   29.516292] Call trace:
[   29.517317]  kasan_check_range+0x100/0x1a8
[   29.521837] 
[   29.521939] The buggy address belongs to the physical page:
[   29.522045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.522162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.522350] page_type: f5(slab)
[   29.522424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.522799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.523039] page dumped because: kasan: bad access detected
[   29.523192] 
[   29.523252] Memory state around the buggy address:
[   29.523424]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.523655]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.523867] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.524044]                                      ^
[   29.524143]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.524192]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.524233] ==================================================================
[   29.636385] ==================================================================
[   29.636437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.636653] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.637065] 
[   29.637192] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.637289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.637320] Hardware name: linux,dummy-virt (DT)
[   29.637479] Call trace:
[   29.637506]  show_stack+0x20/0x38 (C)
[   29.637562]  dump_stack_lvl+0x8c/0xd0
[   29.637645]  print_report+0x118/0x608
[   29.637978]  kasan_report+0xdc/0x128
[   29.638068]  __asan_report_load8_noabort+0x20/0x30
[   29.638176]  kasan_atomics_helper+0x3f58/0x4858
[   29.638270]  kasan_atomics+0x198/0x2e0
[   29.638668]  kunit_try_run_case+0x170/0x3f0
[   29.638747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.639087]  kthread+0x328/0x630
[   29.639329]  ret_from_fork+0x10/0x20
[   29.639480] 
[   29.639508] Allocated by task 277:
[   29.639740]  kasan_save_stack+0x3c/0x68
[   29.639813]  kasan_save_track+0x20/0x40
[   29.639855]  kasan_save_alloc_info+0x40/0x58
[   29.640134]  __kasan_kmalloc+0xd4/0xd8
[   29.640178]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.640227]  kasan_atomics+0xb8/0x2e0
[   29.640266]  kunit_try_run_case+0x170/0x3f0
[   29.640582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.640821]  kthread+0x328/0x630
[   29.641038]  ret_from_fork+0x10/0x20
[   29.641092] 
[   29.641168] The buggy address belongs to the object at fff00000c451ca00
[   29.641168]  which belongs to the cache kmalloc-64 of size 64
[   29.641232] The buggy address is located 0 bytes to the right of
[   29.641232]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.641297] 
[   29.641338] The buggy address belongs to the physical page:
[   29.641369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.641436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.641497] page_type: f5(slab)
[   29.641544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.641597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.641673] page dumped because: kasan: bad access detected
[   29.641716] 
[   29.641750] Memory state around the buggy address:
[   29.641782]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.641828]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.641881] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.641932]                                      ^
[   29.641976]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.642030]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.642079] ==================================================================
[   29.643522] ==================================================================
[   29.643575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.643631] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277
[   29.644110] 
[   29.644187] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.644960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.645022] Hardware name: linux,dummy-virt (DT)
[   29.645131] Call trace:
[   29.645159]  show_stack+0x20/0x38 (C)
[   29.645233]  dump_stack_lvl+0x8c/0xd0
[   29.645609]  print_report+0x118/0x608
[   29.645688]  kasan_report+0xdc/0x128
[   29.645869]  kasan_check_range+0x100/0x1a8
[   29.646105]  __kasan_check_write+0x20/0x30
[   29.646184]  kasan_atomics_helper+0xe44/0x4858
[   29.646373]  kasan_atomics+0x198/0x2e0
[   29.646617]  kunit_try_run_case+0x170/0x3f0
[   29.646814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.647010]  kthread+0x328/0x630
[   29.647089]  ret_from_fork+0x10/0x20
[   29.647593] 
[   29.647676] Allocated by task 277:
[   29.647829]  kasan_save_stack+0x3c/0x68
[   29.648021]  kasan_save_track+0x20/0x40
[   29.648247]  kasan_save_alloc_info+0x40/0x58
[   29.648386]  __kasan_kmalloc+0xd4/0xd8
[   29.648530]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.648897]  kasan_atomics+0xb8/0x2e0
[   29.648975]  kunit_try_run_case+0x170/0x3f0
[   29.649017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.649331]  kthread+0x328/0x630
[   29.649615]  ret_from_fork+0x10/0x20
[   29.649795] 
[   29.649920] The buggy address belongs to the object at fff00000c451ca00
[   29.649920]  which belongs to the cache kmalloc-64 of size 64
[   29.650380] The buggy address is located 0 bytes to the right of
[   29.650380]  allocated 48-byte region [fff00000c451ca00, fff00000c451ca30)
[   29.650615] 
[   29.650710] The buggy address belongs to the physical page:
[   29.650984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c
[   29.651182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.651480] page_type: f5(slab)
[   29.651555] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.651742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.651797] page dumped because: kasan: bad access detected
[   29.651958] 
[   29.652254] Memory state around the buggy address:
[   29.652298]  fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.652344]  fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.652521] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.652752]                                      ^
[   29.652797]  fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.653112]  fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.653207] ==================================================================

[   25.471365] ==================================================================
[   25.471758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   25.472476] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.472861] 
[   25.473060] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.473114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.473127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.473154] Call Trace:
[   25.473177]  <TASK>
[   25.473202]  dump_stack_lvl+0x73/0xb0
[   25.473252]  print_report+0xd1/0x650
[   25.473277]  ? __virt_addr_valid+0x1db/0x2d0
[   25.473314]  ? kasan_atomics_helper+0x1818/0x5450
[   25.473336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.473363]  ? kasan_atomics_helper+0x1818/0x5450
[   25.473385]  kasan_report+0x141/0x180
[   25.473407]  ? kasan_atomics_helper+0x1818/0x5450
[   25.473433]  kasan_check_range+0x10c/0x1c0
[   25.473456]  __kasan_check_write+0x18/0x20
[   25.473480]  kasan_atomics_helper+0x1818/0x5450
[   25.473503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.473528]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.473555]  ? kasan_atomics+0x152/0x310
[   25.473582]  kasan_atomics+0x1dc/0x310
[   25.473604]  ? __pfx_kasan_atomics+0x10/0x10
[   25.473628]  ? trace_hardirqs_on+0x37/0xe0
[   25.473652]  ? __pfx_read_tsc+0x10/0x10
[   25.473676]  ? ktime_get_ts64+0x86/0x230
[   25.473702]  kunit_try_run_case+0x1a5/0x480
[   25.473728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.473753]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.473780]  ? __kthread_parkme+0x82/0x180
[   25.473802]  ? preempt_count_sub+0x50/0x80
[   25.473827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.473851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.473875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.473900]  kthread+0x337/0x6f0
[   25.473922]  ? trace_preempt_on+0x20/0xc0
[   25.473944]  ? __pfx_kthread+0x10/0x10
[   25.473965]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.473991]  ? calculate_sigpending+0x7b/0xa0
[   25.474036]  ? __pfx_kthread+0x10/0x10
[   25.474059]  ret_from_fork+0x116/0x1d0
[   25.474079]  ? __pfx_kthread+0x10/0x10
[   25.474100]  ret_from_fork_asm+0x1a/0x30
[   25.474132]  </TASK>
[   25.474145] 
[   25.486526] Allocated by task 294:
[   25.486692]  kasan_save_stack+0x45/0x70
[   25.486846]  kasan_save_track+0x18/0x40
[   25.486975]  kasan_save_alloc_info+0x3b/0x50
[   25.487412]  __kasan_kmalloc+0xb7/0xc0
[   25.487757]  __kmalloc_cache_noprof+0x189/0x420
[   25.488192]  kasan_atomics+0x95/0x310
[   25.488560]  kunit_try_run_case+0x1a5/0x480
[   25.488948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.489457]  kthread+0x337/0x6f0
[   25.489757]  ret_from_fork+0x116/0x1d0
[   25.490132]  ret_from_fork_asm+0x1a/0x30
[   25.490512] 
[   25.490688] The buggy address belongs to the object at ffff888100aaa000
[   25.490688]  which belongs to the cache kmalloc-64 of size 64
[   25.491445] The buggy address is located 0 bytes to the right of
[   25.491445]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.492516] 
[   25.492591] The buggy address belongs to the physical page:
[   25.492763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.493001] flags: 0x200000000000000(node=0|zone=2)
[   25.493471] page_type: f5(slab)
[   25.493790] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.494460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.495125] page dumped because: kasan: bad access detected
[   25.495612] 
[   25.495760] Memory state around the buggy address:
[   25.496226]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.496706]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.497195] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.497699]                                      ^
[   25.497895]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.498515]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.498724] ==================================================================
[   25.045418] ==================================================================
[   25.045764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   25.046153] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.046492] 
[   25.046603] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.046654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.046668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.046693] Call Trace:
[   25.046715]  <TASK>
[   25.046735]  dump_stack_lvl+0x73/0xb0
[   25.046763]  print_report+0xd1/0x650
[   25.046786]  ? __virt_addr_valid+0x1db/0x2d0
[   25.046811]  ? kasan_atomics_helper+0xe78/0x5450
[   25.046833]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.046861]  ? kasan_atomics_helper+0xe78/0x5450
[   25.046883]  kasan_report+0x141/0x180
[   25.046906]  ? kasan_atomics_helper+0xe78/0x5450
[   25.046932]  kasan_check_range+0x10c/0x1c0
[   25.046956]  __kasan_check_write+0x18/0x20
[   25.046981]  kasan_atomics_helper+0xe78/0x5450
[   25.047031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.047060]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.047086]  ? kasan_atomics+0x152/0x310
[   25.047114]  kasan_atomics+0x1dc/0x310
[   25.047137]  ? __pfx_kasan_atomics+0x10/0x10
[   25.047161]  ? trace_hardirqs_on+0x37/0xe0
[   25.047186]  ? __pfx_read_tsc+0x10/0x10
[   25.047209]  ? ktime_get_ts64+0x86/0x230
[   25.047244]  kunit_try_run_case+0x1a5/0x480
[   25.047270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.047296]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.047324]  ? __kthread_parkme+0x82/0x180
[   25.047350]  ? preempt_count_sub+0x50/0x80
[   25.047377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.047404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.047429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.047454]  kthread+0x337/0x6f0
[   25.047475]  ? trace_preempt_on+0x20/0xc0
[   25.047500]  ? __pfx_kthread+0x10/0x10
[   25.047521]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.047546]  ? calculate_sigpending+0x7b/0xa0
[   25.047571]  ? __pfx_kthread+0x10/0x10
[   25.047593]  ret_from_fork+0x116/0x1d0
[   25.047613]  ? __pfx_kthread+0x10/0x10
[   25.047634]  ret_from_fork_asm+0x1a/0x30
[   25.047667]  </TASK>
[   25.047679] 
[   25.054745] Allocated by task 294:
[   25.054919]  kasan_save_stack+0x45/0x70
[   25.055122]  kasan_save_track+0x18/0x40
[   25.055302]  kasan_save_alloc_info+0x3b/0x50
[   25.055492]  __kasan_kmalloc+0xb7/0xc0
[   25.055656]  __kmalloc_cache_noprof+0x189/0x420
[   25.055842]  kasan_atomics+0x95/0x310
[   25.055991]  kunit_try_run_case+0x1a5/0x480
[   25.056214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.056447]  kthread+0x337/0x6f0
[   25.056591]  ret_from_fork+0x116/0x1d0
[   25.056723]  ret_from_fork_asm+0x1a/0x30
[   25.056917] 
[   25.057025] The buggy address belongs to the object at ffff888100aaa000
[   25.057025]  which belongs to the cache kmalloc-64 of size 64
[   25.057492] The buggy address is located 0 bytes to the right of
[   25.057492]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.057919] 
[   25.057994] The buggy address belongs to the physical page:
[   25.058182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.058545] flags: 0x200000000000000(node=0|zone=2)
[   25.058775] page_type: f5(slab)
[   25.058946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.059331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.059626] page dumped because: kasan: bad access detected
[   25.059811] 
[   25.059875] Memory state around the buggy address:
[   25.060046]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.060372]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.060693] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.060989]                                      ^
[   25.061201]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.061500]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.061771] ==================================================================
[   25.062430] ==================================================================
[   25.062765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   25.063152] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.063495] 
[   25.063599] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.063645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.063658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.063682] Call Trace:
[   25.063700]  <TASK>
[   25.063718]  dump_stack_lvl+0x73/0xb0
[   25.063745]  print_report+0xd1/0x650
[   25.063768]  ? __virt_addr_valid+0x1db/0x2d0
[   25.063792]  ? kasan_atomics_helper+0xf10/0x5450
[   25.063815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.063841]  ? kasan_atomics_helper+0xf10/0x5450
[   25.063864]  kasan_report+0x141/0x180
[   25.063887]  ? kasan_atomics_helper+0xf10/0x5450
[   25.063913]  kasan_check_range+0x10c/0x1c0
[   25.063937]  __kasan_check_write+0x18/0x20
[   25.063962]  kasan_atomics_helper+0xf10/0x5450
[   25.063985]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.064036]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.064062]  ? kasan_atomics+0x152/0x310
[   25.064089]  kasan_atomics+0x1dc/0x310
[   25.064112]  ? __pfx_kasan_atomics+0x10/0x10
[   25.064135]  ? trace_hardirqs_on+0x37/0xe0
[   25.064159]  ? __pfx_read_tsc+0x10/0x10
[   25.064183]  ? ktime_get_ts64+0x86/0x230
[   25.064209]  kunit_try_run_case+0x1a5/0x480
[   25.065287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.065332]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.065364]  ? __kthread_parkme+0x82/0x180
[   25.065387]  ? preempt_count_sub+0x50/0x80
[   25.065414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.065440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.065465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.065489]  kthread+0x337/0x6f0
[   25.065510]  ? trace_preempt_on+0x20/0xc0
[   25.065534]  ? __pfx_kthread+0x10/0x10
[   25.065556]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.065580]  ? calculate_sigpending+0x7b/0xa0
[   25.065604]  ? __pfx_kthread+0x10/0x10
[   25.065626]  ret_from_fork+0x116/0x1d0
[   25.065646]  ? __pfx_kthread+0x10/0x10
[   25.065667]  ret_from_fork_asm+0x1a/0x30
[   25.065698]  </TASK>
[   25.065711] 
[   25.081420] Allocated by task 294:
[   25.081613]  kasan_save_stack+0x45/0x70
[   25.081819]  kasan_save_track+0x18/0x40
[   25.081990]  kasan_save_alloc_info+0x3b/0x50
[   25.082180]  __kasan_kmalloc+0xb7/0xc0
[   25.082361]  __kmalloc_cache_noprof+0x189/0x420
[   25.082566]  kasan_atomics+0x95/0x310
[   25.082738]  kunit_try_run_case+0x1a5/0x480
[   25.082921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.083806]  kthread+0x337/0x6f0
[   25.084080]  ret_from_fork+0x116/0x1d0
[   25.084237]  ret_from_fork_asm+0x1a/0x30
[   25.084630] 
[   25.084726] The buggy address belongs to the object at ffff888100aaa000
[   25.084726]  which belongs to the cache kmalloc-64 of size 64
[   25.085613] The buggy address is located 0 bytes to the right of
[   25.085613]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.086395] 
[   25.086620] The buggy address belongs to the physical page:
[   25.087042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.087553] flags: 0x200000000000000(node=0|zone=2)
[   25.087956] page_type: f5(slab)
[   25.088316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.088802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.089301] page dumped because: kasan: bad access detected
[   25.089725] 
[   25.089817] Memory state around the buggy address:
[   25.090196]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.090511]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.090802] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.091399]                                      ^
[   25.091672]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.092149]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.092639] ==================================================================
[   25.094113] ==================================================================
[   25.094469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   25.094786] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.095342] 
[   25.095717] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.095779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.095794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.095819] Call Trace:
[   25.095843]  <TASK>
[   25.095902]  dump_stack_lvl+0x73/0xb0
[   25.095936]  print_report+0xd1/0x650
[   25.095959]  ? __virt_addr_valid+0x1db/0x2d0
[   25.095984]  ? kasan_atomics_helper+0xfa9/0x5450
[   25.096006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.096044]  ? kasan_atomics_helper+0xfa9/0x5450
[   25.096066]  kasan_report+0x141/0x180
[   25.096090]  ? kasan_atomics_helper+0xfa9/0x5450
[   25.096116]  kasan_check_range+0x10c/0x1c0
[   25.096141]  __kasan_check_write+0x18/0x20
[   25.096165]  kasan_atomics_helper+0xfa9/0x5450
[   25.096188]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.096213]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.096252]  ? kasan_atomics+0x152/0x310
[   25.096279]  kasan_atomics+0x1dc/0x310
[   25.096302]  ? __pfx_kasan_atomics+0x10/0x10
[   25.096325]  ? trace_hardirqs_on+0x37/0xe0
[   25.096350]  ? __pfx_read_tsc+0x10/0x10
[   25.096373]  ? ktime_get_ts64+0x86/0x230
[   25.096399]  kunit_try_run_case+0x1a5/0x480
[   25.096425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.096450]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.096478]  ? __kthread_parkme+0x82/0x180
[   25.096500]  ? preempt_count_sub+0x50/0x80
[   25.096524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.096549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.096574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.096598]  kthread+0x337/0x6f0
[   25.096619]  ? trace_preempt_on+0x20/0xc0
[   25.096642]  ? __pfx_kthread+0x10/0x10
[   25.096664]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.096688]  ? calculate_sigpending+0x7b/0xa0
[   25.096714]  ? __pfx_kthread+0x10/0x10
[   25.096737]  ret_from_fork+0x116/0x1d0
[   25.096757]  ? __pfx_kthread+0x10/0x10
[   25.096778]  ret_from_fork_asm+0x1a/0x30
[   25.096810]  </TASK>
[   25.096822] 
[   25.107819] Allocated by task 294:
[   25.108150]  kasan_save_stack+0x45/0x70
[   25.108358]  kasan_save_track+0x18/0x40
[   25.108535]  kasan_save_alloc_info+0x3b/0x50
[   25.108723]  __kasan_kmalloc+0xb7/0xc0
[   25.108884]  __kmalloc_cache_noprof+0x189/0x420
[   25.109157]  kasan_atomics+0x95/0x310
[   25.109310]  kunit_try_run_case+0x1a5/0x480
[   25.109454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.109664]  kthread+0x337/0x6f0
[   25.109828]  ret_from_fork+0x116/0x1d0
[   25.110012]  ret_from_fork_asm+0x1a/0x30
[   25.110179] 
[   25.110256] The buggy address belongs to the object at ffff888100aaa000
[   25.110256]  which belongs to the cache kmalloc-64 of size 64
[   25.110876] The buggy address is located 0 bytes to the right of
[   25.110876]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.111466] 
[   25.111564] The buggy address belongs to the physical page:
[   25.111816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.112197] flags: 0x200000000000000(node=0|zone=2)
[   25.112368] page_type: f5(slab)
[   25.112633] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.112922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.113201] page dumped because: kasan: bad access detected
[   25.113381] 
[   25.113469] Memory state around the buggy address:
[   25.113688]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.114007]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.114277] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.114588]                                      ^
[   25.114809]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.115131]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.115443] ==================================================================
[   24.768893] ==================================================================
[   24.769173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   24.770364] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.770718] 
[   24.770838] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.770894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.770908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.770933] Call Trace:
[   24.770955]  <TASK>
[   24.770978]  dump_stack_lvl+0x73/0xb0
[   24.771010]  print_report+0xd1/0x650
[   24.771042]  ? __virt_addr_valid+0x1db/0x2d0
[   24.771069]  ? kasan_atomics_helper+0x565/0x5450
[   24.771091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.771118]  ? kasan_atomics_helper+0x565/0x5450
[   24.771140]  kasan_report+0x141/0x180
[   24.771162]  ? kasan_atomics_helper+0x565/0x5450
[   24.771189]  kasan_check_range+0x10c/0x1c0
[   24.771212]  __kasan_check_write+0x18/0x20
[   24.771464]  kasan_atomics_helper+0x565/0x5450
[   24.771487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.771513]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.771540]  ? kasan_atomics+0x152/0x310
[   24.771589]  kasan_atomics+0x1dc/0x310
[   24.771613]  ? __pfx_kasan_atomics+0x10/0x10
[   24.771636]  ? trace_hardirqs_on+0x37/0xe0
[   24.771660]  ? __pfx_read_tsc+0x10/0x10
[   24.771684]  ? ktime_get_ts64+0x86/0x230
[   24.771710]  kunit_try_run_case+0x1a5/0x480
[   24.771737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.771784]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.771812]  ? __kthread_parkme+0x82/0x180
[   24.771834]  ? preempt_count_sub+0x50/0x80
[   24.771858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.771884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.771908]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.771933]  kthread+0x337/0x6f0
[   24.771953]  ? trace_preempt_on+0x20/0xc0
[   24.771976]  ? __pfx_kthread+0x10/0x10
[   24.771997]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.772033]  ? calculate_sigpending+0x7b/0xa0
[   24.772059]  ? __pfx_kthread+0x10/0x10
[   24.772081]  ret_from_fork+0x116/0x1d0
[   24.772102]  ? __pfx_kthread+0x10/0x10
[   24.772126]  ret_from_fork_asm+0x1a/0x30
[   24.772162]  </TASK>
[   24.772175] 
[   24.781800] Allocated by task 294:
[   24.782005]  kasan_save_stack+0x45/0x70
[   24.782200]  kasan_save_track+0x18/0x40
[   24.782345]  kasan_save_alloc_info+0x3b/0x50
[   24.782491]  __kasan_kmalloc+0xb7/0xc0
[   24.782677]  __kmalloc_cache_noprof+0x189/0x420
[   24.782898]  kasan_atomics+0x95/0x310
[   24.783058]  kunit_try_run_case+0x1a5/0x480
[   24.783261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.783453]  kthread+0x337/0x6f0
[   24.783618]  ret_from_fork+0x116/0x1d0
[   24.783803]  ret_from_fork_asm+0x1a/0x30
[   24.783998] 
[   24.784097] The buggy address belongs to the object at ffff888100aaa000
[   24.784097]  which belongs to the cache kmalloc-64 of size 64
[   24.784528] The buggy address is located 0 bytes to the right of
[   24.784528]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.785297] 
[   24.785722] The buggy address belongs to the physical page:
[   24.785960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.786508] flags: 0x200000000000000(node=0|zone=2)
[   24.786717] page_type: f5(slab)
[   24.786874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.787492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.787859] page dumped because: kasan: bad access detected
[   24.788258] 
[   24.788335] Memory state around the buggy address:
[   24.788568]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.788870]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.789420] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.789785]                                      ^
[   24.790146]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.790575]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.790995] ==================================================================
[   25.349827] ==================================================================
[   25.350400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   25.350699] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.350920] 
[   25.351003] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.351057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.351070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.351095] Call Trace:
[   25.351116]  <TASK>
[   25.351136]  dump_stack_lvl+0x73/0xb0
[   25.351164]  print_report+0xd1/0x650
[   25.351187]  ? __virt_addr_valid+0x1db/0x2d0
[   25.351212]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.351246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.351275]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.351297]  kasan_report+0x141/0x180
[   25.351320]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.351346]  __asan_report_store8_noabort+0x1b/0x30
[   25.351371]  kasan_atomics_helper+0x50d4/0x5450
[   25.351395]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.351421]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.351447]  ? kasan_atomics+0x152/0x310
[   25.351476]  kasan_atomics+0x1dc/0x310
[   25.351498]  ? __pfx_kasan_atomics+0x10/0x10
[   25.351522]  ? trace_hardirqs_on+0x37/0xe0
[   25.351546]  ? __pfx_read_tsc+0x10/0x10
[   25.351570]  ? ktime_get_ts64+0x86/0x230
[   25.351596]  kunit_try_run_case+0x1a5/0x480
[   25.351623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.351648]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.351675]  ? __kthread_parkme+0x82/0x180
[   25.351697]  ? preempt_count_sub+0x50/0x80
[   25.351721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.351747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.351772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.351796]  kthread+0x337/0x6f0
[   25.351816]  ? trace_preempt_on+0x20/0xc0
[   25.351839]  ? __pfx_kthread+0x10/0x10
[   25.351860]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.351885]  ? calculate_sigpending+0x7b/0xa0
[   25.351911]  ? __pfx_kthread+0x10/0x10
[   25.351932]  ret_from_fork+0x116/0x1d0
[   25.351953]  ? __pfx_kthread+0x10/0x10
[   25.351974]  ret_from_fork_asm+0x1a/0x30
[   25.352006]  </TASK>
[   25.352019] 
[   25.359520] Allocated by task 294:
[   25.359660]  kasan_save_stack+0x45/0x70
[   25.359802]  kasan_save_track+0x18/0x40
[   25.359932]  kasan_save_alloc_info+0x3b/0x50
[   25.360074]  __kasan_kmalloc+0xb7/0xc0
[   25.360199]  __kmalloc_cache_noprof+0x189/0x420
[   25.360470]  kasan_atomics+0x95/0x310
[   25.360655]  kunit_try_run_case+0x1a5/0x480
[   25.360859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.361102]  kthread+0x337/0x6f0
[   25.361276]  ret_from_fork+0x116/0x1d0
[   25.361459]  ret_from_fork_asm+0x1a/0x30
[   25.361653] 
[   25.361742] The buggy address belongs to the object at ffff888100aaa000
[   25.361742]  which belongs to the cache kmalloc-64 of size 64
[   25.362130] The buggy address is located 0 bytes to the right of
[   25.362130]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.362966] 
[   25.363069] The buggy address belongs to the physical page:
[   25.363318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.363559] flags: 0x200000000000000(node=0|zone=2)
[   25.363720] page_type: f5(slab)
[   25.363888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.364483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.364791] page dumped because: kasan: bad access detected
[   25.365030] 
[   25.365120] Memory state around the buggy address:
[   25.365350]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.365617]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.365908] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.366238]                                      ^
[   25.366445]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.366758]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.367107] ==================================================================
[   25.408283] ==================================================================
[   25.408574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   25.409032] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.409335] 
[   25.409438] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.409492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.409507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.409531] Call Trace:
[   25.409553]  <TASK>
[   25.409573]  dump_stack_lvl+0x73/0xb0
[   25.409603]  print_report+0xd1/0x650
[   25.409626]  ? __virt_addr_valid+0x1db/0x2d0
[   25.409651]  ? kasan_atomics_helper+0x164f/0x5450
[   25.409674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.409701]  ? kasan_atomics_helper+0x164f/0x5450
[   25.409723]  kasan_report+0x141/0x180
[   25.409746]  ? kasan_atomics_helper+0x164f/0x5450
[   25.409772]  kasan_check_range+0x10c/0x1c0
[   25.409797]  __kasan_check_write+0x18/0x20
[   25.409821]  kasan_atomics_helper+0x164f/0x5450
[   25.409845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.409871]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.409897]  ? kasan_atomics+0x152/0x310
[   25.409924]  kasan_atomics+0x1dc/0x310
[   25.409947]  ? __pfx_kasan_atomics+0x10/0x10
[   25.409970]  ? trace_hardirqs_on+0x37/0xe0
[   25.409995]  ? __pfx_read_tsc+0x10/0x10
[   25.410027]  ? ktime_get_ts64+0x86/0x230
[   25.410053]  kunit_try_run_case+0x1a5/0x480
[   25.410079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.410105]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.410133]  ? __kthread_parkme+0x82/0x180
[   25.410155]  ? preempt_count_sub+0x50/0x80
[   25.410180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.410205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.410241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.410266]  kthread+0x337/0x6f0
[   25.410287]  ? trace_preempt_on+0x20/0xc0
[   25.410310]  ? __pfx_kthread+0x10/0x10
[   25.410331]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.410357]  ? calculate_sigpending+0x7b/0xa0
[   25.410382]  ? __pfx_kthread+0x10/0x10
[   25.410405]  ret_from_fork+0x116/0x1d0
[   25.410426]  ? __pfx_kthread+0x10/0x10
[   25.410448]  ret_from_fork_asm+0x1a/0x30
[   25.410480]  </TASK>
[   25.410492] 
[   25.417713] Allocated by task 294:
[   25.417896]  kasan_save_stack+0x45/0x70
[   25.418124]  kasan_save_track+0x18/0x40
[   25.418268]  kasan_save_alloc_info+0x3b/0x50
[   25.418411]  __kasan_kmalloc+0xb7/0xc0
[   25.418539]  __kmalloc_cache_noprof+0x189/0x420
[   25.418690]  kasan_atomics+0x95/0x310
[   25.418815]  kunit_try_run_case+0x1a5/0x480
[   25.419004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.419290]  kthread+0x337/0x6f0
[   25.419461]  ret_from_fork+0x116/0x1d0
[   25.419648]  ret_from_fork_asm+0x1a/0x30
[   25.419844] 
[   25.419934] The buggy address belongs to the object at ffff888100aaa000
[   25.419934]  which belongs to the cache kmalloc-64 of size 64
[   25.420881] The buggy address is located 0 bytes to the right of
[   25.420881]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.421420] 
[   25.421490] The buggy address belongs to the physical page:
[   25.421712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.422090] flags: 0x200000000000000(node=0|zone=2)
[   25.422315] page_type: f5(slab)
[   25.422476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.422787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.423128] page dumped because: kasan: bad access detected
[   25.423311] 
[   25.423382] Memory state around the buggy address:
[   25.423535]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.423749]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.423977] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.424633]                                      ^
[   25.424854]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.425165]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.425661] ==================================================================
[   25.294272] ==================================================================
[   25.294644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   25.295140] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.295390] 
[   25.295501] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.295551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.295568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.295593] Call Trace:
[   25.295616]  <TASK>
[   25.295636]  dump_stack_lvl+0x73/0xb0
[   25.295666]  print_report+0xd1/0x650
[   25.295690]  ? __virt_addr_valid+0x1db/0x2d0
[   25.295715]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.295737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.295764]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.295786]  kasan_report+0x141/0x180
[   25.295808]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.295834]  kasan_check_range+0x10c/0x1c0
[   25.295858]  __kasan_check_read+0x15/0x20
[   25.295882]  kasan_atomics_helper+0x13b5/0x5450
[   25.295905]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.295930]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.295956]  ? kasan_atomics+0x152/0x310
[   25.295983]  kasan_atomics+0x1dc/0x310
[   25.296007]  ? __pfx_kasan_atomics+0x10/0x10
[   25.296029]  ? trace_hardirqs_on+0x37/0xe0
[   25.296076]  ? __pfx_read_tsc+0x10/0x10
[   25.296102]  ? ktime_get_ts64+0x86/0x230
[   25.296128]  kunit_try_run_case+0x1a5/0x480
[   25.296165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.296191]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.296234]  ? __kthread_parkme+0x82/0x180
[   25.296256]  ? preempt_count_sub+0x50/0x80
[   25.296281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.296306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.296330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.296355]  kthread+0x337/0x6f0
[   25.296376]  ? trace_preempt_on+0x20/0xc0
[   25.296400]  ? __pfx_kthread+0x10/0x10
[   25.296422]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.296447]  ? calculate_sigpending+0x7b/0xa0
[   25.296472]  ? __pfx_kthread+0x10/0x10
[   25.296495]  ret_from_fork+0x116/0x1d0
[   25.296515]  ? __pfx_kthread+0x10/0x10
[   25.296536]  ret_from_fork_asm+0x1a/0x30
[   25.296569]  </TASK>
[   25.296581] 
[   25.304030] Allocated by task 294:
[   25.304245]  kasan_save_stack+0x45/0x70
[   25.304451]  kasan_save_track+0x18/0x40
[   25.304664]  kasan_save_alloc_info+0x3b/0x50
[   25.304868]  __kasan_kmalloc+0xb7/0xc0
[   25.305194]  __kmalloc_cache_noprof+0x189/0x420
[   25.305356]  kasan_atomics+0x95/0x310
[   25.305483]  kunit_try_run_case+0x1a5/0x480
[   25.305623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.305790]  kthread+0x337/0x6f0
[   25.305904]  ret_from_fork+0x116/0x1d0
[   25.306055]  ret_from_fork_asm+0x1a/0x30
[   25.306259] 
[   25.306350] The buggy address belongs to the object at ffff888100aaa000
[   25.306350]  which belongs to the cache kmalloc-64 of size 64
[   25.306883] The buggy address is located 0 bytes to the right of
[   25.306883]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.307950] 
[   25.308043] The buggy address belongs to the physical page:
[   25.308320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.308656] flags: 0x200000000000000(node=0|zone=2)
[   25.308819] page_type: f5(slab)
[   25.308965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.309660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.309978] page dumped because: kasan: bad access detected
[   25.310274] 
[   25.310365] Memory state around the buggy address:
[   25.310572]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.310921]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.311248] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.311530]                                      ^
[   25.311757]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.312038]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.312276] ==================================================================
[   24.906089] ==================================================================
[   24.906345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   24.906575] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.907238] 
[   24.907350] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.907401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.907415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.907439] Call Trace:
[   24.907460]  <TASK>
[   24.907479]  dump_stack_lvl+0x73/0xb0
[   24.907509]  print_report+0xd1/0x650
[   24.907532]  ? __virt_addr_valid+0x1db/0x2d0
[   24.907558]  ? kasan_atomics_helper+0x992/0x5450
[   24.907580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.907608]  ? kasan_atomics_helper+0x992/0x5450
[   24.907631]  kasan_report+0x141/0x180
[   24.907653]  ? kasan_atomics_helper+0x992/0x5450
[   24.907680]  kasan_check_range+0x10c/0x1c0
[   24.907704]  __kasan_check_write+0x18/0x20
[   24.907728]  kasan_atomics_helper+0x992/0x5450
[   24.907751]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.907778]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.907804]  ? kasan_atomics+0x152/0x310
[   24.907831]  kasan_atomics+0x1dc/0x310
[   24.907855]  ? __pfx_kasan_atomics+0x10/0x10
[   24.907879]  ? trace_hardirqs_on+0x37/0xe0
[   24.907903]  ? __pfx_read_tsc+0x10/0x10
[   24.907926]  ? ktime_get_ts64+0x86/0x230
[   24.907952]  kunit_try_run_case+0x1a5/0x480
[   24.907978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.908004]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.908032]  ? __kthread_parkme+0x82/0x180
[   24.908053]  ? preempt_count_sub+0x50/0x80
[   24.908079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.908104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.908129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.908154]  kthread+0x337/0x6f0
[   24.908175]  ? trace_preempt_on+0x20/0xc0
[   24.908198]  ? __pfx_kthread+0x10/0x10
[   24.908231]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.908256]  ? calculate_sigpending+0x7b/0xa0
[   24.908282]  ? __pfx_kthread+0x10/0x10
[   24.908304]  ret_from_fork+0x116/0x1d0
[   24.908325]  ? __pfx_kthread+0x10/0x10
[   24.908347]  ret_from_fork_asm+0x1a/0x30
[   24.908378]  </TASK>
[   24.908392] 
[   24.915820] Allocated by task 294:
[   24.915952]  kasan_save_stack+0x45/0x70
[   24.916095]  kasan_save_track+0x18/0x40
[   24.916274]  kasan_save_alloc_info+0x3b/0x50
[   24.916493]  __kasan_kmalloc+0xb7/0xc0
[   24.916680]  __kmalloc_cache_noprof+0x189/0x420
[   24.916899]  kasan_atomics+0x95/0x310
[   24.917149]  kunit_try_run_case+0x1a5/0x480
[   24.917367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.917622]  kthread+0x337/0x6f0
[   24.917784]  ret_from_fork+0x116/0x1d0
[   24.917974]  ret_from_fork_asm+0x1a/0x30
[   24.918171] 
[   24.918248] The buggy address belongs to the object at ffff888100aaa000
[   24.918248]  which belongs to the cache kmalloc-64 of size 64
[   24.918594] The buggy address is located 0 bytes to the right of
[   24.918594]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.918953] 
[   24.919024] The buggy address belongs to the physical page:
[   24.919207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.919460] flags: 0x200000000000000(node=0|zone=2)
[   24.919623] page_type: f5(slab)
[   24.919792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.920141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.920496] page dumped because: kasan: bad access detected
[   24.920766] 
[   24.920854] Memory state around the buggy address:
[   24.921075]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.921405]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.921797] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.922068]                                      ^
[   24.922240]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.922450]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.922658] ==================================================================
[   24.940658] ==================================================================
[   24.940902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   24.941127] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.941358] 
[   24.941439] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.941487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.941500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.941523] Call Trace:
[   24.941542]  <TASK>
[   24.941560]  dump_stack_lvl+0x73/0xb0
[   24.941588]  print_report+0xd1/0x650
[   24.941611]  ? __virt_addr_valid+0x1db/0x2d0
[   24.941635]  ? kasan_atomics_helper+0xac7/0x5450
[   24.941656]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.941682]  ? kasan_atomics_helper+0xac7/0x5450
[   24.941704]  kasan_report+0x141/0x180
[   24.941726]  ? kasan_atomics_helper+0xac7/0x5450
[   24.941752]  kasan_check_range+0x10c/0x1c0
[   24.941775]  __kasan_check_write+0x18/0x20
[   24.941798]  kasan_atomics_helper+0xac7/0x5450
[   24.941821]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.941848]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.941872]  ? kasan_atomics+0x152/0x310
[   24.941899]  kasan_atomics+0x1dc/0x310
[   24.941922]  ? __pfx_kasan_atomics+0x10/0x10
[   24.942205]  ? trace_hardirqs_on+0x37/0xe0
[   24.942241]  ? __pfx_read_tsc+0x10/0x10
[   24.942265]  ? ktime_get_ts64+0x86/0x230
[   24.942293]  kunit_try_run_case+0x1a5/0x480
[   24.942320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.942347]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.942375]  ? __kthread_parkme+0x82/0x180
[   24.942397]  ? preempt_count_sub+0x50/0x80
[   24.942421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.942446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.942470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.942496]  kthread+0x337/0x6f0
[   24.942517]  ? trace_preempt_on+0x20/0xc0
[   24.942540]  ? __pfx_kthread+0x10/0x10
[   24.942562]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.942586]  ? calculate_sigpending+0x7b/0xa0
[   24.942612]  ? __pfx_kthread+0x10/0x10
[   24.942633]  ret_from_fork+0x116/0x1d0
[   24.942654]  ? __pfx_kthread+0x10/0x10
[   24.942675]  ret_from_fork_asm+0x1a/0x30
[   24.942706]  </TASK>
[   24.942719] 
[   24.950272] Allocated by task 294:
[   24.950449]  kasan_save_stack+0x45/0x70
[   24.950649]  kasan_save_track+0x18/0x40
[   24.950869]  kasan_save_alloc_info+0x3b/0x50
[   24.951094]  __kasan_kmalloc+0xb7/0xc0
[   24.951293]  __kmalloc_cache_noprof+0x189/0x420
[   24.951542]  kasan_atomics+0x95/0x310
[   24.951677]  kunit_try_run_case+0x1a5/0x480
[   24.951818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.951984]  kthread+0x337/0x6f0
[   24.952097]  ret_from_fork+0x116/0x1d0
[   24.952232]  ret_from_fork_asm+0x1a/0x30
[   24.952365] 
[   24.952430] The buggy address belongs to the object at ffff888100aaa000
[   24.952430]  which belongs to the cache kmalloc-64 of size 64
[   24.952796] The buggy address is located 0 bytes to the right of
[   24.952796]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.953355] 
[   24.953534] The buggy address belongs to the physical page:
[   24.953801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.954317] flags: 0x200000000000000(node=0|zone=2)
[   24.954548] page_type: f5(slab)
[   24.954717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.955057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.955320] page dumped because: kasan: bad access detected
[   24.955487] 
[   24.955551] Memory state around the buggy address:
[   24.955701]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.955911]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.956422] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.956739]                                      ^
[   24.956968]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.957272]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.957610] ==================================================================
[   25.593045] ==================================================================
[   25.593345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   25.593576] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.593986] 
[   25.594157] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.594208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.594232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.594256] Call Trace:
[   25.594276]  <TASK>
[   25.594295]  dump_stack_lvl+0x73/0xb0
[   25.594322]  print_report+0xd1/0x650
[   25.594346]  ? __virt_addr_valid+0x1db/0x2d0
[   25.594370]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.594392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.594419]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.594455]  kasan_report+0x141/0x180
[   25.594478]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.594517]  kasan_check_range+0x10c/0x1c0
[   25.594542]  __kasan_check_write+0x18/0x20
[   25.594565]  kasan_atomics_helper+0x1b22/0x5450
[   25.594598]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.594625]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.594658]  ? kasan_atomics+0x152/0x310
[   25.594685]  kasan_atomics+0x1dc/0x310
[   25.594708]  ? __pfx_kasan_atomics+0x10/0x10
[   25.594741]  ? trace_hardirqs_on+0x37/0xe0
[   25.594764]  ? __pfx_read_tsc+0x10/0x10
[   25.594787]  ? ktime_get_ts64+0x86/0x230
[   25.594812]  kunit_try_run_case+0x1a5/0x480
[   25.594837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.594863]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.594891]  ? __kthread_parkme+0x82/0x180
[   25.594911]  ? preempt_count_sub+0x50/0x80
[   25.594935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.594959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.594984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.595032]  kthread+0x337/0x6f0
[   25.595053]  ? trace_preempt_on+0x20/0xc0
[   25.595086]  ? __pfx_kthread+0x10/0x10
[   25.595108]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.595133]  ? calculate_sigpending+0x7b/0xa0
[   25.595158]  ? __pfx_kthread+0x10/0x10
[   25.595180]  ret_from_fork+0x116/0x1d0
[   25.595200]  ? __pfx_kthread+0x10/0x10
[   25.595237]  ret_from_fork_asm+0x1a/0x30
[   25.595270]  </TASK>
[   25.595292] 
[   25.602337] Allocated by task 294:
[   25.602509]  kasan_save_stack+0x45/0x70
[   25.602700]  kasan_save_track+0x18/0x40
[   25.602885]  kasan_save_alloc_info+0x3b/0x50
[   25.603171]  __kasan_kmalloc+0xb7/0xc0
[   25.603361]  __kmalloc_cache_noprof+0x189/0x420
[   25.603576]  kasan_atomics+0x95/0x310
[   25.603755]  kunit_try_run_case+0x1a5/0x480
[   25.603955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.604341]  kthread+0x337/0x6f0
[   25.604504]  ret_from_fork+0x116/0x1d0
[   25.604677]  ret_from_fork_asm+0x1a/0x30
[   25.604811] 
[   25.604875] The buggy address belongs to the object at ffff888100aaa000
[   25.604875]  which belongs to the cache kmalloc-64 of size 64
[   25.605672] The buggy address is located 0 bytes to the right of
[   25.605672]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.606263] 
[   25.606398] The buggy address belongs to the physical page:
[   25.606669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.606982] flags: 0x200000000000000(node=0|zone=2)
[   25.607338] page_type: f5(slab)
[   25.607522] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.607798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.608020] page dumped because: kasan: bad access detected
[   25.608278] 
[   25.608367] Memory state around the buggy address:
[   25.608788]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.609092]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.609423] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.609924]                                      ^
[   25.610814]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.611146]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.611532] ==================================================================
[   25.665901] ==================================================================
[   25.666356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   25.666639] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.666915] 
[   25.667189] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.667260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.667275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.667299] Call Trace:
[   25.667321]  <TASK>
[   25.667344]  dump_stack_lvl+0x73/0xb0
[   25.667375]  print_report+0xd1/0x650
[   25.667400]  ? __virt_addr_valid+0x1db/0x2d0
[   25.667426]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.667449]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.667475]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.667498]  kasan_report+0x141/0x180
[   25.667521]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.667547]  kasan_check_range+0x10c/0x1c0
[   25.667571]  __kasan_check_write+0x18/0x20
[   25.667595]  kasan_atomics_helper+0x1ce1/0x5450
[   25.667618]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.667645]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.667670]  ? kasan_atomics+0x152/0x310
[   25.667698]  kasan_atomics+0x1dc/0x310
[   25.667721]  ? __pfx_kasan_atomics+0x10/0x10
[   25.667744]  ? trace_hardirqs_on+0x37/0xe0
[   25.667768]  ? __pfx_read_tsc+0x10/0x10
[   25.667791]  ? ktime_get_ts64+0x86/0x230
[   25.667817]  kunit_try_run_case+0x1a5/0x480
[   25.667845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.667869]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.667897]  ? __kthread_parkme+0x82/0x180
[   25.667919]  ? preempt_count_sub+0x50/0x80
[   25.667944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.667969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.667994]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.668018]  kthread+0x337/0x6f0
[   25.668049]  ? trace_preempt_on+0x20/0xc0
[   25.668072]  ? __pfx_kthread+0x10/0x10
[   25.668095]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.668119]  ? calculate_sigpending+0x7b/0xa0
[   25.668144]  ? __pfx_kthread+0x10/0x10
[   25.668167]  ret_from_fork+0x116/0x1d0
[   25.668188]  ? __pfx_kthread+0x10/0x10
[   25.668209]  ret_from_fork_asm+0x1a/0x30
[   25.668254]  </TASK>
[   25.668266] 
[   25.675264] Allocated by task 294:
[   25.675608]  kasan_save_stack+0x45/0x70
[   25.675808]  kasan_save_track+0x18/0x40
[   25.675992]  kasan_save_alloc_info+0x3b/0x50
[   25.676135]  __kasan_kmalloc+0xb7/0xc0
[   25.676281]  __kmalloc_cache_noprof+0x189/0x420
[   25.676433]  kasan_atomics+0x95/0x310
[   25.676595]  kunit_try_run_case+0x1a5/0x480
[   25.676775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.676977]  kthread+0x337/0x6f0
[   25.677296]  ret_from_fork+0x116/0x1d0
[   25.677490]  ret_from_fork_asm+0x1a/0x30
[   25.677654] 
[   25.677737] The buggy address belongs to the object at ffff888100aaa000
[   25.677737]  which belongs to the cache kmalloc-64 of size 64
[   25.678236] The buggy address is located 0 bytes to the right of
[   25.678236]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.678641] 
[   25.678735] The buggy address belongs to the physical page:
[   25.678986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.679317] flags: 0x200000000000000(node=0|zone=2)
[   25.679520] page_type: f5(slab)
[   25.679677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.679942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.680270] page dumped because: kasan: bad access detected
[   25.680443] 
[   25.680510] Memory state around the buggy address:
[   25.680661]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.680871]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.681172] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.681449]                                      ^
[   25.681640]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.681959]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.682490] ==================================================================
[   25.555813] ==================================================================
[   25.556478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   25.557291] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.558054] 
[   25.558254] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.558317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.558331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.558367] Call Trace:
[   25.558390]  <TASK>
[   25.558412]  dump_stack_lvl+0x73/0xb0
[   25.558443]  print_report+0xd1/0x650
[   25.558468]  ? __virt_addr_valid+0x1db/0x2d0
[   25.558493]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.558515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.558541]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.558573]  kasan_report+0x141/0x180
[   25.558596]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.558622]  kasan_check_range+0x10c/0x1c0
[   25.558645]  __kasan_check_write+0x18/0x20
[   25.558669]  kasan_atomics_helper+0x19e3/0x5450
[   25.558701]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.558727]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.558753]  ? kasan_atomics+0x152/0x310
[   25.558790]  kasan_atomics+0x1dc/0x310
[   25.558814]  ? __pfx_kasan_atomics+0x10/0x10
[   25.558836]  ? trace_hardirqs_on+0x37/0xe0
[   25.558861]  ? __pfx_read_tsc+0x10/0x10
[   25.558883]  ? ktime_get_ts64+0x86/0x230
[   25.558908]  kunit_try_run_case+0x1a5/0x480
[   25.558934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.558959]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.558986]  ? __kthread_parkme+0x82/0x180
[   25.559009]  ? preempt_count_sub+0x50/0x80
[   25.559049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.559074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.559098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.559124]  kthread+0x337/0x6f0
[   25.559143]  ? trace_preempt_on+0x20/0xc0
[   25.559166]  ? __pfx_kthread+0x10/0x10
[   25.559187]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.559212]  ? calculate_sigpending+0x7b/0xa0
[   25.559246]  ? __pfx_kthread+0x10/0x10
[   25.559268]  ret_from_fork+0x116/0x1d0
[   25.559289]  ? __pfx_kthread+0x10/0x10
[   25.559311]  ret_from_fork_asm+0x1a/0x30
[   25.559343]  </TASK>
[   25.559356] 
[   25.566746] Allocated by task 294:
[   25.566877]  kasan_save_stack+0x45/0x70
[   25.567012]  kasan_save_track+0x18/0x40
[   25.567209]  kasan_save_alloc_info+0x3b/0x50
[   25.567434]  __kasan_kmalloc+0xb7/0xc0
[   25.567615]  __kmalloc_cache_noprof+0x189/0x420
[   25.567832]  kasan_atomics+0x95/0x310
[   25.568142]  kunit_try_run_case+0x1a5/0x480
[   25.568294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.568463]  kthread+0x337/0x6f0
[   25.568640]  ret_from_fork+0x116/0x1d0
[   25.568822]  ret_from_fork_asm+0x1a/0x30
[   25.569053] 
[   25.569146] The buggy address belongs to the object at ffff888100aaa000
[   25.569146]  which belongs to the cache kmalloc-64 of size 64
[   25.569726] The buggy address is located 0 bytes to the right of
[   25.569726]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.570244] 
[   25.570314] The buggy address belongs to the physical page:
[   25.570562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.570939] flags: 0x200000000000000(node=0|zone=2)
[   25.571175] page_type: f5(slab)
[   25.571313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.571541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.571760] page dumped because: kasan: bad access detected
[   25.571986] 
[   25.572072] Memory state around the buggy address:
[   25.572305]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.572643]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.572871] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.573258]                                      ^
[   25.573477]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.573756]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.574056] ==================================================================
[   24.621997] ==================================================================
[   24.622391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   24.622635] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.622857] 
[   24.622941] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.622992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.623004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.623034] Call Trace:
[   24.623048]  <TASK>
[   24.623068]  dump_stack_lvl+0x73/0xb0
[   24.623096]  print_report+0xd1/0x650
[   24.623117]  ? __virt_addr_valid+0x1db/0x2d0
[   24.623141]  ? kasan_atomics_helper+0x4ba2/0x5450
[   24.623161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.623187]  ? kasan_atomics_helper+0x4ba2/0x5450
[   24.623207]  kasan_report+0x141/0x180
[   24.623239]  ? kasan_atomics_helper+0x4ba2/0x5450
[   24.623264]  __asan_report_store4_noabort+0x1b/0x30
[   24.623341]  kasan_atomics_helper+0x4ba2/0x5450
[   24.623365]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.623517]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.623544]  ? kasan_atomics+0x152/0x310
[   24.623573]  kasan_atomics+0x1dc/0x310
[   24.623595]  ? __pfx_kasan_atomics+0x10/0x10
[   24.623618]  ? trace_hardirqs_on+0x37/0xe0
[   24.623642]  ? __pfx_read_tsc+0x10/0x10
[   24.623664]  ? ktime_get_ts64+0x86/0x230
[   24.623688]  kunit_try_run_case+0x1a5/0x480
[   24.623712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.623736]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.623762]  ? __kthread_parkme+0x82/0x180
[   24.623784]  ? preempt_count_sub+0x50/0x80
[   24.623808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.623832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.623855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.623878]  kthread+0x337/0x6f0
[   24.623898]  ? trace_preempt_on+0x20/0xc0
[   24.623920]  ? __pfx_kthread+0x10/0x10
[   24.623941]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.623966]  ? calculate_sigpending+0x7b/0xa0
[   24.623990]  ? __pfx_kthread+0x10/0x10
[   24.624011]  ret_from_fork+0x116/0x1d0
[   24.624030]  ? __pfx_kthread+0x10/0x10
[   24.624050]  ret_from_fork_asm+0x1a/0x30
[   24.624081]  </TASK>
[   24.624092] 
[   24.636047] Allocated by task 294:
[   24.636392]  kasan_save_stack+0x45/0x70
[   24.636542]  kasan_save_track+0x18/0x40
[   24.636671]  kasan_save_alloc_info+0x3b/0x50
[   24.636812]  __kasan_kmalloc+0xb7/0xc0
[   24.636935]  __kmalloc_cache_noprof+0x189/0x420
[   24.637197]  kasan_atomics+0x95/0x310
[   24.637554]  kunit_try_run_case+0x1a5/0x480
[   24.638079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.638572]  kthread+0x337/0x6f0
[   24.638882]  ret_from_fork+0x116/0x1d0
[   24.639287]  ret_from_fork_asm+0x1a/0x30
[   24.639589] 
[   24.639659] The buggy address belongs to the object at ffff888100aaa000
[   24.639659]  which belongs to the cache kmalloc-64 of size 64
[   24.640014] The buggy address is located 0 bytes to the right of
[   24.640014]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.640443] 
[   24.640548] The buggy address belongs to the physical page:
[   24.640766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.641028] flags: 0x200000000000000(node=0|zone=2)
[   24.641309] page_type: f5(slab)
[   24.641477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.641803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.642039] page dumped because: kasan: bad access detected
[   24.642360] 
[   24.642466] Memory state around the buggy address:
[   24.642690]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.642924]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.643292] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.643587]                                      ^
[   24.643745]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.643971]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.644404] ==================================================================
[   24.708446] ==================================================================
[   24.708783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   24.709187] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.709500] 
[   24.709602] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.709652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.709675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.709699] Call Trace:
[   24.709719]  <TASK>
[   24.709739]  dump_stack_lvl+0x73/0xb0
[   24.709779]  print_report+0xd1/0x650
[   24.709802]  ? __virt_addr_valid+0x1db/0x2d0
[   24.709825]  ? kasan_atomics_helper+0x4b54/0x5450
[   24.709847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.709874]  ? kasan_atomics_helper+0x4b54/0x5450
[   24.709895]  kasan_report+0x141/0x180
[   24.709918]  ? kasan_atomics_helper+0x4b54/0x5450
[   24.709945]  __asan_report_load4_noabort+0x18/0x20
[   24.709970]  kasan_atomics_helper+0x4b54/0x5450
[   24.709993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.710019]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.710045]  ? kasan_atomics+0x152/0x310
[   24.710073]  kasan_atomics+0x1dc/0x310
[   24.710096]  ? __pfx_kasan_atomics+0x10/0x10
[   24.710119]  ? trace_hardirqs_on+0x37/0xe0
[   24.710143]  ? __pfx_read_tsc+0x10/0x10
[   24.710166]  ? ktime_get_ts64+0x86/0x230
[   24.710192]  kunit_try_run_case+0x1a5/0x480
[   24.710227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.710262]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.710289]  ? __kthread_parkme+0x82/0x180
[   24.710311]  ? preempt_count_sub+0x50/0x80
[   24.710346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.710371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.710395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.710420]  kthread+0x337/0x6f0
[   24.710441]  ? trace_preempt_on+0x20/0xc0
[   24.710464]  ? __pfx_kthread+0x10/0x10
[   24.710486]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.710510]  ? calculate_sigpending+0x7b/0xa0
[   24.710535]  ? __pfx_kthread+0x10/0x10
[   24.710557]  ret_from_fork+0x116/0x1d0
[   24.710578]  ? __pfx_kthread+0x10/0x10
[   24.710599]  ret_from_fork_asm+0x1a/0x30
[   24.710631]  </TASK>
[   24.710643] 
[   24.718434] Allocated by task 294:
[   24.718641]  kasan_save_stack+0x45/0x70
[   24.718862]  kasan_save_track+0x18/0x40
[   24.719136]  kasan_save_alloc_info+0x3b/0x50
[   24.719381]  __kasan_kmalloc+0xb7/0xc0
[   24.719550]  __kmalloc_cache_noprof+0x189/0x420
[   24.719779]  kasan_atomics+0x95/0x310
[   24.719928]  kunit_try_run_case+0x1a5/0x480
[   24.720071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.720337]  kthread+0x337/0x6f0
[   24.720529]  ret_from_fork+0x116/0x1d0
[   24.720738]  ret_from_fork_asm+0x1a/0x30
[   24.720921] 
[   24.721061] The buggy address belongs to the object at ffff888100aaa000
[   24.721061]  which belongs to the cache kmalloc-64 of size 64
[   24.721618] The buggy address is located 0 bytes to the right of
[   24.721618]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.722167] 
[   24.722305] The buggy address belongs to the physical page:
[   24.722562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.722803] flags: 0x200000000000000(node=0|zone=2)
[   24.722966] page_type: f5(slab)
[   24.723090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.723427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.724190] page dumped because: kasan: bad access detected
[   24.724465] 
[   24.724554] Memory state around the buggy address:
[   24.724766]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.724979]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.725506] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.725858]                                      ^
[   24.726158]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.726384]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.726594] ==================================================================
[   25.902633] ==================================================================
[   25.902884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   25.903122] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.904037] 
[   25.904305] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.904361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.904375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.904399] Call Trace:
[   25.905090]  <TASK>
[   25.905177]  dump_stack_lvl+0x73/0xb0
[   25.905386]  print_report+0xd1/0x650
[   25.905704]  ? __virt_addr_valid+0x1db/0x2d0
[   25.905741]  ? kasan_atomics_helper+0x224c/0x5450
[   25.905765]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.905792]  ? kasan_atomics_helper+0x224c/0x5450
[   25.905814]  kasan_report+0x141/0x180
[   25.905837]  ? kasan_atomics_helper+0x224c/0x5450
[   25.905863]  kasan_check_range+0x10c/0x1c0
[   25.905887]  __kasan_check_write+0x18/0x20
[   25.905911]  kasan_atomics_helper+0x224c/0x5450
[   25.905934]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.905959]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.905985]  ? kasan_atomics+0x152/0x310
[   25.906041]  kasan_atomics+0x1dc/0x310
[   25.906065]  ? __pfx_kasan_atomics+0x10/0x10
[   25.906087]  ? trace_hardirqs_on+0x37/0xe0
[   25.906111]  ? __pfx_read_tsc+0x10/0x10
[   25.906134]  ? ktime_get_ts64+0x86/0x230
[   25.906160]  kunit_try_run_case+0x1a5/0x480
[   25.906185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.906211]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.906248]  ? __kthread_parkme+0x82/0x180
[   25.906269]  ? preempt_count_sub+0x50/0x80
[   25.906294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.906319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.906345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.906370]  kthread+0x337/0x6f0
[   25.906390]  ? trace_preempt_on+0x20/0xc0
[   25.906414]  ? __pfx_kthread+0x10/0x10
[   25.906435]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.906460]  ? calculate_sigpending+0x7b/0xa0
[   25.906486]  ? __pfx_kthread+0x10/0x10
[   25.906507]  ret_from_fork+0x116/0x1d0
[   25.906527]  ? __pfx_kthread+0x10/0x10
[   25.906548]  ret_from_fork_asm+0x1a/0x30
[   25.906581]  </TASK>
[   25.906593] 
[   25.918183] Allocated by task 294:
[   25.918539]  kasan_save_stack+0x45/0x70
[   25.918910]  kasan_save_track+0x18/0x40
[   25.919293]  kasan_save_alloc_info+0x3b/0x50
[   25.919806]  __kasan_kmalloc+0xb7/0xc0
[   25.920230]  __kmalloc_cache_noprof+0x189/0x420
[   25.920698]  kasan_atomics+0x95/0x310
[   25.921056]  kunit_try_run_case+0x1a5/0x480
[   25.921455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.921923]  kthread+0x337/0x6f0
[   25.922295]  ret_from_fork+0x116/0x1d0
[   25.922638]  ret_from_fork_asm+0x1a/0x30
[   25.923000] 
[   25.923176] The buggy address belongs to the object at ffff888100aaa000
[   25.923176]  which belongs to the cache kmalloc-64 of size 64
[   25.923822] The buggy address is located 0 bytes to the right of
[   25.923822]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.924473] 
[   25.924638] The buggy address belongs to the physical page:
[   25.925163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.925854] flags: 0x200000000000000(node=0|zone=2)
[   25.926359] page_type: f5(slab)
[   25.926702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.927379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.927757] page dumped because: kasan: bad access detected
[   25.928268] 
[   25.928399] Memory state around the buggy address:
[   25.928765]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.928972]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.929389] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.929831]                                      ^
[   25.929979]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.930198]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.930409] ==================================================================
[   25.499376] ==================================================================
[   25.500198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   25.500853] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.501535] 
[   25.501724] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.501788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.501802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.501827] Call Trace:
[   25.501848]  <TASK>
[   25.501878]  dump_stack_lvl+0x73/0xb0
[   25.501908]  print_report+0xd1/0x650
[   25.501932]  ? __virt_addr_valid+0x1db/0x2d0
[   25.501968]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.501990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.502036]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.502057]  kasan_report+0x141/0x180
[   25.502080]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.502106]  kasan_check_range+0x10c/0x1c0
[   25.502130]  __kasan_check_write+0x18/0x20
[   25.502153]  kasan_atomics_helper+0x18b1/0x5450
[   25.502176]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.502202]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.502236]  ? kasan_atomics+0x152/0x310
[   25.502263]  kasan_atomics+0x1dc/0x310
[   25.502286]  ? __pfx_kasan_atomics+0x10/0x10
[   25.502309]  ? trace_hardirqs_on+0x37/0xe0
[   25.502332]  ? __pfx_read_tsc+0x10/0x10
[   25.502355]  ? ktime_get_ts64+0x86/0x230
[   25.502381]  kunit_try_run_case+0x1a5/0x480
[   25.502407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.502433]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.502460]  ? __kthread_parkme+0x82/0x180
[   25.502482]  ? preempt_count_sub+0x50/0x80
[   25.502506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.502531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.502555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.502580]  kthread+0x337/0x6f0
[   25.502600]  ? trace_preempt_on+0x20/0xc0
[   25.502623]  ? __pfx_kthread+0x10/0x10
[   25.502645]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.502669]  ? calculate_sigpending+0x7b/0xa0
[   25.502694]  ? __pfx_kthread+0x10/0x10
[   25.502715]  ret_from_fork+0x116/0x1d0
[   25.502735]  ? __pfx_kthread+0x10/0x10
[   25.502757]  ret_from_fork_asm+0x1a/0x30
[   25.502789]  </TASK>
[   25.502801] 
[   25.515071] Allocated by task 294:
[   25.515433]  kasan_save_stack+0x45/0x70
[   25.515807]  kasan_save_track+0x18/0x40
[   25.516177]  kasan_save_alloc_info+0x3b/0x50
[   25.516491]  __kasan_kmalloc+0xb7/0xc0
[   25.516619]  __kmalloc_cache_noprof+0x189/0x420
[   25.516769]  kasan_atomics+0x95/0x310
[   25.516894]  kunit_try_run_case+0x1a5/0x480
[   25.517123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.517615]  kthread+0x337/0x6f0
[   25.517912]  ret_from_fork+0x116/0x1d0
[   25.518291]  ret_from_fork_asm+0x1a/0x30
[   25.518664] 
[   25.518815] The buggy address belongs to the object at ffff888100aaa000
[   25.518815]  which belongs to the cache kmalloc-64 of size 64
[   25.519889] The buggy address is located 0 bytes to the right of
[   25.519889]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.520706] 
[   25.520781] The buggy address belongs to the physical page:
[   25.520951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.521603] flags: 0x200000000000000(node=0|zone=2)
[   25.522044] page_type: f5(slab)
[   25.522353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.523066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.523715] page dumped because: kasan: bad access detected
[   25.523884] 
[   25.523950] Memory state around the buggy address:
[   25.524336]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.524961]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.525592] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.525960]                                      ^
[   25.526380]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.526923]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.527148] ==================================================================
[   25.849261] ==================================================================
[   25.849611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   25.850363] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.850644] 
[   25.850752] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.850803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.850817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.850842] Call Trace:
[   25.850864]  <TASK>
[   25.850885]  dump_stack_lvl+0x73/0xb0
[   25.850915]  print_report+0xd1/0x650
[   25.850939]  ? __virt_addr_valid+0x1db/0x2d0
[   25.850964]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.850986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.851032]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.851055]  kasan_report+0x141/0x180
[   25.851078]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.851104]  __asan_report_load8_noabort+0x18/0x20
[   25.851129]  kasan_atomics_helper+0x4fb2/0x5450
[   25.851151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.851178]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.851204]  ? kasan_atomics+0x152/0x310
[   25.851244]  kasan_atomics+0x1dc/0x310
[   25.851267]  ? __pfx_kasan_atomics+0x10/0x10
[   25.851290]  ? trace_hardirqs_on+0x37/0xe0
[   25.851314]  ? __pfx_read_tsc+0x10/0x10
[   25.851338]  ? ktime_get_ts64+0x86/0x230
[   25.851364]  kunit_try_run_case+0x1a5/0x480
[   25.851390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.851416]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.851444]  ? __kthread_parkme+0x82/0x180
[   25.851465]  ? preempt_count_sub+0x50/0x80
[   25.851490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.851514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.851539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.851563]  kthread+0x337/0x6f0
[   25.851584]  ? trace_preempt_on+0x20/0xc0
[   25.851607]  ? __pfx_kthread+0x10/0x10
[   25.851629]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.851654]  ? calculate_sigpending+0x7b/0xa0
[   25.851678]  ? __pfx_kthread+0x10/0x10
[   25.851700]  ret_from_fork+0x116/0x1d0
[   25.851720]  ? __pfx_kthread+0x10/0x10
[   25.851741]  ret_from_fork_asm+0x1a/0x30
[   25.851773]  </TASK>
[   25.851784] 
[   25.858919] Allocated by task 294:
[   25.859095]  kasan_save_stack+0x45/0x70
[   25.859243]  kasan_save_track+0x18/0x40
[   25.859372]  kasan_save_alloc_info+0x3b/0x50
[   25.859515]  __kasan_kmalloc+0xb7/0xc0
[   25.859639]  __kmalloc_cache_noprof+0x189/0x420
[   25.859787]  kasan_atomics+0x95/0x310
[   25.859912]  kunit_try_run_case+0x1a5/0x480
[   25.860176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.860437]  kthread+0x337/0x6f0
[   25.860602]  ret_from_fork+0x116/0x1d0
[   25.860783]  ret_from_fork_asm+0x1a/0x30
[   25.860974] 
[   25.861057] The buggy address belongs to the object at ffff888100aaa000
[   25.861057]  which belongs to the cache kmalloc-64 of size 64
[   25.861817] The buggy address is located 0 bytes to the right of
[   25.861817]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.862361] 
[   25.862430] The buggy address belongs to the physical page:
[   25.862597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.862833] flags: 0x200000000000000(node=0|zone=2)
[   25.863115] page_type: f5(slab)
[   25.863291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.863622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.863955] page dumped because: kasan: bad access detected
[   25.864201] 
[   25.864301] Memory state around the buggy address:
[   25.864504]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.864760]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.865060] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.865346]                                      ^
[   25.865542]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.865832]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.866163] ==================================================================
[   24.598410] ==================================================================
[   24.599138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   24.599521] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.599807] 
[   24.599932] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.599987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.600063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.600091] Call Trace:
[   24.600106]  <TASK>
[   24.600127]  dump_stack_lvl+0x73/0xb0
[   24.600157]  print_report+0xd1/0x650
[   24.600181]  ? __virt_addr_valid+0x1db/0x2d0
[   24.600207]  ? kasan_atomics_helper+0x4bbc/0x5450
[   24.600238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.600264]  ? kasan_atomics_helper+0x4bbc/0x5450
[   24.600285]  kasan_report+0x141/0x180
[   24.600306]  ? kasan_atomics_helper+0x4bbc/0x5450
[   24.600330]  __asan_report_load4_noabort+0x18/0x20
[   24.600355]  kasan_atomics_helper+0x4bbc/0x5450
[   24.600375]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.600437]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.600461]  ? kasan_atomics+0x152/0x310
[   24.600512]  kasan_atomics+0x1dc/0x310
[   24.600533]  ? __pfx_kasan_atomics+0x10/0x10
[   24.600555]  ? trace_hardirqs_on+0x37/0xe0
[   24.600578]  ? __pfx_read_tsc+0x10/0x10
[   24.600600]  ? ktime_get_ts64+0x86/0x230
[   24.600624]  kunit_try_run_case+0x1a5/0x480
[   24.600649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.600673]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.600723]  ? __kthread_parkme+0x82/0x180
[   24.600744]  ? preempt_count_sub+0x50/0x80
[   24.600767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.600801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.600826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.600848]  kthread+0x337/0x6f0
[   24.600868]  ? trace_preempt_on+0x20/0xc0
[   24.600890]  ? __pfx_kthread+0x10/0x10
[   24.600909]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.600932]  ? calculate_sigpending+0x7b/0xa0
[   24.600955]  ? __pfx_kthread+0x10/0x10
[   24.600976]  ret_from_fork+0x116/0x1d0
[   24.600994]  ? __pfx_kthread+0x10/0x10
[   24.601014]  ret_from_fork_asm+0x1a/0x30
[   24.601045]  </TASK>
[   24.601057] 
[   24.612771] Allocated by task 294:
[   24.612982]  kasan_save_stack+0x45/0x70
[   24.613200]  kasan_save_track+0x18/0x40
[   24.613395]  kasan_save_alloc_info+0x3b/0x50
[   24.613567]  __kasan_kmalloc+0xb7/0xc0
[   24.613686]  __kmalloc_cache_noprof+0x189/0x420
[   24.613830]  kasan_atomics+0x95/0x310
[   24.613953]  kunit_try_run_case+0x1a5/0x480
[   24.614362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.614707]  kthread+0x337/0x6f0
[   24.614868]  ret_from_fork+0x116/0x1d0
[   24.615090]  ret_from_fork_asm+0x1a/0x30
[   24.615287] 
[   24.615378] The buggy address belongs to the object at ffff888100aaa000
[   24.615378]  which belongs to the cache kmalloc-64 of size 64
[   24.616102] The buggy address is located 0 bytes to the right of
[   24.616102]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.616648] 
[   24.616723] The buggy address belongs to the physical page:
[   24.616942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.617430] flags: 0x200000000000000(node=0|zone=2)
[   24.617747] page_type: f5(slab)
[   24.617907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.618121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.618678] page dumped because: kasan: bad access detected
[   24.618915] 
[   24.618998] Memory state around the buggy address:
[   24.619315]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.619626]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.619981] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.620341]                                      ^
[   24.620497]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.620809]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.621143] ==================================================================
[   24.645238] ==================================================================
[   24.645541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   24.645824] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.646636] 
[   24.646754] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.646807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.646820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.646855] Call Trace:
[   24.646877]  <TASK>
[   24.646897]  dump_stack_lvl+0x73/0xb0
[   24.646940]  print_report+0xd1/0x650
[   24.646963]  ? __virt_addr_valid+0x1db/0x2d0
[   24.646986]  ? kasan_atomics_helper+0x4b88/0x5450
[   24.647007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.647051]  ? kasan_atomics_helper+0x4b88/0x5450
[   24.647083]  kasan_report+0x141/0x180
[   24.647105]  ? kasan_atomics_helper+0x4b88/0x5450
[   24.647130]  __asan_report_load4_noabort+0x18/0x20
[   24.647165]  kasan_atomics_helper+0x4b88/0x5450
[   24.647194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.647236]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.647261]  ? kasan_atomics+0x152/0x310
[   24.647287]  kasan_atomics+0x1dc/0x310
[   24.647309]  ? __pfx_kasan_atomics+0x10/0x10
[   24.647331]  ? trace_hardirqs_on+0x37/0xe0
[   24.647354]  ? __pfx_read_tsc+0x10/0x10
[   24.647376]  ? ktime_get_ts64+0x86/0x230
[   24.647410]  kunit_try_run_case+0x1a5/0x480
[   24.647435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.647459]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.647497]  ? __kthread_parkme+0x82/0x180
[   24.647518]  ? preempt_count_sub+0x50/0x80
[   24.647541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.647574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.647598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.647621]  kthread+0x337/0x6f0
[   24.647651]  ? trace_preempt_on+0x20/0xc0
[   24.647674]  ? __pfx_kthread+0x10/0x10
[   24.647694]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.647718]  ? calculate_sigpending+0x7b/0xa0
[   24.647751]  ? __pfx_kthread+0x10/0x10
[   24.647772]  ret_from_fork+0x116/0x1d0
[   24.647791]  ? __pfx_kthread+0x10/0x10
[   24.647812]  ret_from_fork_asm+0x1a/0x30
[   24.647854]  </TASK>
[   24.647865] 
[   24.656416] Allocated by task 294:
[   24.656616]  kasan_save_stack+0x45/0x70
[   24.656877]  kasan_save_track+0x18/0x40
[   24.657008]  kasan_save_alloc_info+0x3b/0x50
[   24.657175]  __kasan_kmalloc+0xb7/0xc0
[   24.657378]  __kmalloc_cache_noprof+0x189/0x420
[   24.657785]  kasan_atomics+0x95/0x310
[   24.657972]  kunit_try_run_case+0x1a5/0x480
[   24.658238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.658511]  kthread+0x337/0x6f0
[   24.658743]  ret_from_fork+0x116/0x1d0
[   24.658930]  ret_from_fork_asm+0x1a/0x30
[   24.659116] 
[   24.659182] The buggy address belongs to the object at ffff888100aaa000
[   24.659182]  which belongs to the cache kmalloc-64 of size 64
[   24.659670] The buggy address is located 0 bytes to the right of
[   24.659670]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.660466] 
[   24.660556] The buggy address belongs to the physical page:
[   24.660792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.661444] flags: 0x200000000000000(node=0|zone=2)
[   24.661695] page_type: f5(slab)
[   24.661816] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.662203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.662748] page dumped because: kasan: bad access detected
[   24.663021] 
[   24.663153] Memory state around the buggy address:
[   24.663446]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.663677]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.664237] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.664595]                                      ^
[   24.664791]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.665127]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.665489] ==================================================================
[   24.869981] ==================================================================
[   24.870349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   24.871153] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.871516] 
[   24.871623] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.871675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.871690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.871716] Call Trace:
[   24.871738]  <TASK>
[   24.871761]  dump_stack_lvl+0x73/0xb0
[   24.871792]  print_report+0xd1/0x650
[   24.871817]  ? __virt_addr_valid+0x1db/0x2d0
[   24.871843]  ? kasan_atomics_helper+0x860/0x5450
[   24.871865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.871893]  ? kasan_atomics_helper+0x860/0x5450
[   24.871915]  kasan_report+0x141/0x180
[   24.871938]  ? kasan_atomics_helper+0x860/0x5450
[   24.871964]  kasan_check_range+0x10c/0x1c0
[   24.871987]  __kasan_check_write+0x18/0x20
[   24.872011]  kasan_atomics_helper+0x860/0x5450
[   24.872035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.872061]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.872088]  ? kasan_atomics+0x152/0x310
[   24.872115]  kasan_atomics+0x1dc/0x310
[   24.872138]  ? __pfx_kasan_atomics+0x10/0x10
[   24.872161]  ? trace_hardirqs_on+0x37/0xe0
[   24.872185]  ? __pfx_read_tsc+0x10/0x10
[   24.872209]  ? ktime_get_ts64+0x86/0x230
[   24.872248]  kunit_try_run_case+0x1a5/0x480
[   24.872274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.872300]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.872328]  ? __kthread_parkme+0x82/0x180
[   24.872349]  ? preempt_count_sub+0x50/0x80
[   24.872374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.872399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.872424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.872448]  kthread+0x337/0x6f0
[   24.872469]  ? trace_preempt_on+0x20/0xc0
[   24.872492]  ? __pfx_kthread+0x10/0x10
[   24.872514]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.872538]  ? calculate_sigpending+0x7b/0xa0
[   24.872564]  ? __pfx_kthread+0x10/0x10
[   24.872586]  ret_from_fork+0x116/0x1d0
[   24.872606]  ? __pfx_kthread+0x10/0x10
[   24.872627]  ret_from_fork_asm+0x1a/0x30
[   24.872661]  </TASK>
[   24.872673] 
[   24.880101] Allocated by task 294:
[   24.880308]  kasan_save_stack+0x45/0x70
[   24.880487]  kasan_save_track+0x18/0x40
[   24.880674]  kasan_save_alloc_info+0x3b/0x50
[   24.880853]  __kasan_kmalloc+0xb7/0xc0
[   24.881030]  __kmalloc_cache_noprof+0x189/0x420
[   24.881212]  kasan_atomics+0x95/0x310
[   24.881390]  kunit_try_run_case+0x1a5/0x480
[   24.881566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.881772]  kthread+0x337/0x6f0
[   24.881888]  ret_from_fork+0x116/0x1d0
[   24.882016]  ret_from_fork_asm+0x1a/0x30
[   24.882230] 
[   24.882321] The buggy address belongs to the object at ffff888100aaa000
[   24.882321]  which belongs to the cache kmalloc-64 of size 64
[   24.882862] The buggy address is located 0 bytes to the right of
[   24.882862]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.883365] 
[   24.883440] The buggy address belongs to the physical page:
[   24.883610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.883915] flags: 0x200000000000000(node=0|zone=2)
[   24.884193] page_type: f5(slab)
[   24.884523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.884853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.885202] page dumped because: kasan: bad access detected
[   24.885429] 
[   24.885494] Memory state around the buggy address:
[   24.885645]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.885856]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.886186] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.886508]                                      ^
[   24.886732]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.886999]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.887317] ==================================================================
[   25.831536] ==================================================================
[   25.831897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   25.832595] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.833089] 
[   25.833209] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.833278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.833292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.833318] Call Trace:
[   25.833340]  <TASK>
[   25.833362]  dump_stack_lvl+0x73/0xb0
[   25.833395]  print_report+0xd1/0x650
[   25.833420]  ? __virt_addr_valid+0x1db/0x2d0
[   25.833445]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.833468]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.833495]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.833517]  kasan_report+0x141/0x180
[   25.833541]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.833567]  kasan_check_range+0x10c/0x1c0
[   25.833591]  __kasan_check_write+0x18/0x20
[   25.833615]  kasan_atomics_helper+0x20c8/0x5450
[   25.833639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.833666]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.833692]  ? kasan_atomics+0x152/0x310
[   25.833721]  kasan_atomics+0x1dc/0x310
[   25.833745]  ? __pfx_kasan_atomics+0x10/0x10
[   25.833767]  ? trace_hardirqs_on+0x37/0xe0
[   25.833792]  ? __pfx_read_tsc+0x10/0x10
[   25.833816]  ? ktime_get_ts64+0x86/0x230
[   25.833841]  kunit_try_run_case+0x1a5/0x480
[   25.833868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.833894]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.833921]  ? __kthread_parkme+0x82/0x180
[   25.833943]  ? preempt_count_sub+0x50/0x80
[   25.833968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.833993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.834018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.834043]  kthread+0x337/0x6f0
[   25.834064]  ? trace_preempt_on+0x20/0xc0
[   25.834086]  ? __pfx_kthread+0x10/0x10
[   25.834107]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.834132]  ? calculate_sigpending+0x7b/0xa0
[   25.834157]  ? __pfx_kthread+0x10/0x10
[   25.834180]  ret_from_fork+0x116/0x1d0
[   25.834200]  ? __pfx_kthread+0x10/0x10
[   25.834230]  ret_from_fork_asm+0x1a/0x30
[   25.834262]  </TASK>
[   25.834275] 
[   25.841567] Allocated by task 294:
[   25.841744]  kasan_save_stack+0x45/0x70
[   25.841897]  kasan_save_track+0x18/0x40
[   25.842033]  kasan_save_alloc_info+0x3b/0x50
[   25.842261]  __kasan_kmalloc+0xb7/0xc0
[   25.842445]  __kmalloc_cache_noprof+0x189/0x420
[   25.842623]  kasan_atomics+0x95/0x310
[   25.842760]  kunit_try_run_case+0x1a5/0x480
[   25.842918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.843364]  kthread+0x337/0x6f0
[   25.843532]  ret_from_fork+0x116/0x1d0
[   25.843723]  ret_from_fork_asm+0x1a/0x30
[   25.843884] 
[   25.843951] The buggy address belongs to the object at ffff888100aaa000
[   25.843951]  which belongs to the cache kmalloc-64 of size 64
[   25.844362] The buggy address is located 0 bytes to the right of
[   25.844362]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.844908] 
[   25.845002] The buggy address belongs to the physical page:
[   25.845294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.845603] flags: 0x200000000000000(node=0|zone=2)
[   25.845765] page_type: f5(slab)
[   25.845882] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.846111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.846455] page dumped because: kasan: bad access detected
[   25.846706] 
[   25.846884] Memory state around the buggy address:
[   25.847132]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.847437]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.847723] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.847991]                                      ^
[   25.848200]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.848464]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.848673] ==================================================================
[   25.612661] ==================================================================
[   25.612897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   25.613124] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.614529] 
[   25.614883] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.614940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.614956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.614980] Call Trace:
[   25.615001]  <TASK>
[   25.615023]  dump_stack_lvl+0x73/0xb0
[   25.615062]  print_report+0xd1/0x650
[   25.615087]  ? __virt_addr_valid+0x1db/0x2d0
[   25.615112]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.615136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.615162]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.615184]  kasan_report+0x141/0x180
[   25.615207]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.615246]  kasan_check_range+0x10c/0x1c0
[   25.615270]  __kasan_check_write+0x18/0x20
[   25.615294]  kasan_atomics_helper+0x1c18/0x5450
[   25.615317]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.615344]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.615369]  ? kasan_atomics+0x152/0x310
[   25.615420]  kasan_atomics+0x1dc/0x310
[   25.615443]  ? __pfx_kasan_atomics+0x10/0x10
[   25.615465]  ? trace_hardirqs_on+0x37/0xe0
[   25.615489]  ? __pfx_read_tsc+0x10/0x10
[   25.615512]  ? ktime_get_ts64+0x86/0x230
[   25.615537]  kunit_try_run_case+0x1a5/0x480
[   25.615563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.615588]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.615615]  ? __kthread_parkme+0x82/0x180
[   25.615637]  ? preempt_count_sub+0x50/0x80
[   25.615660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.615687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.615711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.615735]  kthread+0x337/0x6f0
[   25.615757]  ? trace_preempt_on+0x20/0xc0
[   25.615779]  ? __pfx_kthread+0x10/0x10
[   25.615800]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.615825]  ? calculate_sigpending+0x7b/0xa0
[   25.615851]  ? __pfx_kthread+0x10/0x10
[   25.615873]  ret_from_fork+0x116/0x1d0
[   25.615893]  ? __pfx_kthread+0x10/0x10
[   25.615913]  ret_from_fork_asm+0x1a/0x30
[   25.615946]  </TASK>
[   25.615958] 
[   25.626843] Allocated by task 294:
[   25.627179]  kasan_save_stack+0x45/0x70
[   25.627396]  kasan_save_track+0x18/0x40
[   25.627560]  kasan_save_alloc_info+0x3b/0x50
[   25.627745]  __kasan_kmalloc+0xb7/0xc0
[   25.627909]  __kmalloc_cache_noprof+0x189/0x420
[   25.628549]  kasan_atomics+0x95/0x310
[   25.628814]  kunit_try_run_case+0x1a5/0x480
[   25.629149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.629579]  kthread+0x337/0x6f0
[   25.629848]  ret_from_fork+0x116/0x1d0
[   25.630216]  ret_from_fork_asm+0x1a/0x30
[   25.630539] 
[   25.630755] The buggy address belongs to the object at ffff888100aaa000
[   25.630755]  which belongs to the cache kmalloc-64 of size 64
[   25.631496] The buggy address is located 0 bytes to the right of
[   25.631496]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.631987] 
[   25.632145] The buggy address belongs to the physical page:
[   25.632382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.632691] flags: 0x200000000000000(node=0|zone=2)
[   25.632901] page_type: f5(slab)
[   25.633389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.633910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.634446] page dumped because: kasan: bad access detected
[   25.634865] 
[   25.635112] Memory state around the buggy address:
[   25.635448]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.636070]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.636550] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.636846]                                      ^
[   25.637087]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.637657]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.638163] ==================================================================
[   24.792147] ==================================================================
[   24.792477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   24.793008] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.793546] 
[   24.793767] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.793922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.793943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.793967] Call Trace:
[   24.793988]  <TASK>
[   24.794008]  dump_stack_lvl+0x73/0xb0
[   24.794037]  print_report+0xd1/0x650
[   24.794061]  ? __virt_addr_valid+0x1db/0x2d0
[   24.794086]  ? kasan_atomics_helper+0x5fe/0x5450
[   24.794108]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.794134]  ? kasan_atomics_helper+0x5fe/0x5450
[   24.794156]  kasan_report+0x141/0x180
[   24.794178]  ? kasan_atomics_helper+0x5fe/0x5450
[   24.794204]  kasan_check_range+0x10c/0x1c0
[   24.794241]  __kasan_check_write+0x18/0x20
[   24.794265]  kasan_atomics_helper+0x5fe/0x5450
[   24.794287]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.794313]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.794339]  ? kasan_atomics+0x152/0x310
[   24.794366]  kasan_atomics+0x1dc/0x310
[   24.794389]  ? __pfx_kasan_atomics+0x10/0x10
[   24.794412]  ? trace_hardirqs_on+0x37/0xe0
[   24.794436]  ? __pfx_read_tsc+0x10/0x10
[   24.794459]  ? ktime_get_ts64+0x86/0x230
[   24.794484]  kunit_try_run_case+0x1a5/0x480
[   24.794510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.794536]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.794563]  ? __kthread_parkme+0x82/0x180
[   24.794584]  ? preempt_count_sub+0x50/0x80
[   24.794608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.794633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.794657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.794682]  kthread+0x337/0x6f0
[   24.794703]  ? trace_preempt_on+0x20/0xc0
[   24.794725]  ? __pfx_kthread+0x10/0x10
[   24.794747]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.794772]  ? calculate_sigpending+0x7b/0xa0
[   24.794796]  ? __pfx_kthread+0x10/0x10
[   24.794818]  ret_from_fork+0x116/0x1d0
[   24.794837]  ? __pfx_kthread+0x10/0x10
[   24.794859]  ret_from_fork_asm+0x1a/0x30
[   24.794890]  </TASK>
[   24.794902] 
[   24.805737] Allocated by task 294:
[   24.805935]  kasan_save_stack+0x45/0x70
[   24.806405]  kasan_save_track+0x18/0x40
[   24.806690]  kasan_save_alloc_info+0x3b/0x50
[   24.806996]  __kasan_kmalloc+0xb7/0xc0
[   24.807410]  __kmalloc_cache_noprof+0x189/0x420
[   24.807740]  kasan_atomics+0x95/0x310
[   24.808020]  kunit_try_run_case+0x1a5/0x480
[   24.808335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.808695]  kthread+0x337/0x6f0
[   24.808858]  ret_from_fork+0x116/0x1d0
[   24.809003]  ret_from_fork_asm+0x1a/0x30
[   24.809281] 
[   24.809647] The buggy address belongs to the object at ffff888100aaa000
[   24.809647]  which belongs to the cache kmalloc-64 of size 64
[   24.810332] The buggy address is located 0 bytes to the right of
[   24.810332]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.810931] 
[   24.811043] The buggy address belongs to the physical page:
[   24.811313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.811626] flags: 0x200000000000000(node=0|zone=2)
[   24.811867] page_type: f5(slab)
[   24.812029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.812713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.813082] page dumped because: kasan: bad access detected
[   24.813457] 
[   24.813549] Memory state around the buggy address:
[   24.813946]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.814367]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.814780] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.815239]                                      ^
[   24.815555]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.815959]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.816368] ==================================================================
[   25.385241] ==================================================================
[   25.385912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   25.386646] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.387052] 
[   25.387165] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.387228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.387242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.387268] Call Trace:
[   25.387290]  <TASK>
[   25.387313]  dump_stack_lvl+0x73/0xb0
[   25.387355]  print_report+0xd1/0x650
[   25.387379]  ? __virt_addr_valid+0x1db/0x2d0
[   25.387404]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.387439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.387467]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.387489]  kasan_report+0x141/0x180
[   25.387512]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.387538]  kasan_check_range+0x10c/0x1c0
[   25.387563]  __kasan_check_write+0x18/0x20
[   25.387587]  kasan_atomics_helper+0x15b6/0x5450
[   25.387611]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.387638]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.387664]  ? kasan_atomics+0x152/0x310
[   25.387692]  kasan_atomics+0x1dc/0x310
[   25.387716]  ? __pfx_kasan_atomics+0x10/0x10
[   25.387739]  ? trace_hardirqs_on+0x37/0xe0
[   25.387764]  ? __pfx_read_tsc+0x10/0x10
[   25.387788]  ? ktime_get_ts64+0x86/0x230
[   25.387814]  kunit_try_run_case+0x1a5/0x480
[   25.387840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.387866]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.387894]  ? __kthread_parkme+0x82/0x180
[   25.387916]  ? preempt_count_sub+0x50/0x80
[   25.387941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.387965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.387991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.388016]  kthread+0x337/0x6f0
[   25.388037]  ? trace_preempt_on+0x20/0xc0
[   25.388060]  ? __pfx_kthread+0x10/0x10
[   25.388082]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.388107]  ? calculate_sigpending+0x7b/0xa0
[   25.388132]  ? __pfx_kthread+0x10/0x10
[   25.388155]  ret_from_fork+0x116/0x1d0
[   25.388175]  ? __pfx_kthread+0x10/0x10
[   25.388196]  ret_from_fork_asm+0x1a/0x30
[   25.388237]  </TASK>
[   25.388250] 
[   25.399893] Allocated by task 294:
[   25.400145]  kasan_save_stack+0x45/0x70
[   25.400335]  kasan_save_track+0x18/0x40
[   25.400507]  kasan_save_alloc_info+0x3b/0x50
[   25.400650]  __kasan_kmalloc+0xb7/0xc0
[   25.400775]  __kmalloc_cache_noprof+0x189/0x420
[   25.400923]  kasan_atomics+0x95/0x310
[   25.401085]  kunit_try_run_case+0x1a5/0x480
[   25.401304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.401561]  kthread+0x337/0x6f0
[   25.401724]  ret_from_fork+0x116/0x1d0
[   25.401906]  ret_from_fork_asm+0x1a/0x30
[   25.402200] 
[   25.402287] The buggy address belongs to the object at ffff888100aaa000
[   25.402287]  which belongs to the cache kmalloc-64 of size 64
[   25.402633] The buggy address is located 0 bytes to the right of
[   25.402633]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.403375] 
[   25.403473] The buggy address belongs to the physical page:
[   25.403690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.404064] flags: 0x200000000000000(node=0|zone=2)
[   25.404240] page_type: f5(slab)
[   25.404414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.404714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.404943] page dumped because: kasan: bad access detected
[   25.405110] 
[   25.405198] Memory state around the buggy address:
[   25.405429]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.405941]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.406258] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.406561]                                      ^
[   25.406711]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.406921]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.407470] ==================================================================
[   25.312857] ==================================================================
[   25.313308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   25.313776] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.314193] 
[   25.314291] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.314342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.314355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.314380] Call Trace:
[   25.314402]  <TASK>
[   25.314422]  dump_stack_lvl+0x73/0xb0
[   25.314450]  print_report+0xd1/0x650
[   25.314473]  ? __virt_addr_valid+0x1db/0x2d0
[   25.314498]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.314519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.314547]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.314569]  kasan_report+0x141/0x180
[   25.314592]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.314618]  __asan_report_load8_noabort+0x18/0x20
[   25.314644]  kasan_atomics_helper+0x4eae/0x5450
[   25.314667]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.314694]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.314733]  ? kasan_atomics+0x152/0x310
[   25.314760]  kasan_atomics+0x1dc/0x310
[   25.314790]  ? __pfx_kasan_atomics+0x10/0x10
[   25.314813]  ? trace_hardirqs_on+0x37/0xe0
[   25.314837]  ? __pfx_read_tsc+0x10/0x10
[   25.314861]  ? ktime_get_ts64+0x86/0x230
[   25.314887]  kunit_try_run_case+0x1a5/0x480
[   25.314913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.314940]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.314967]  ? __kthread_parkme+0x82/0x180
[   25.314989]  ? preempt_count_sub+0x50/0x80
[   25.315014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.315045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.315070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.315095]  kthread+0x337/0x6f0
[   25.315116]  ? trace_preempt_on+0x20/0xc0
[   25.315139]  ? __pfx_kthread+0x10/0x10
[   25.315160]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.315184]  ? calculate_sigpending+0x7b/0xa0
[   25.315209]  ? __pfx_kthread+0x10/0x10
[   25.315241]  ret_from_fork+0x116/0x1d0
[   25.315262]  ? __pfx_kthread+0x10/0x10
[   25.315284]  ret_from_fork_asm+0x1a/0x30
[   25.315316]  </TASK>
[   25.315328] 
[   25.322699] Allocated by task 294:
[   25.322882]  kasan_save_stack+0x45/0x70
[   25.323079]  kasan_save_track+0x18/0x40
[   25.323273]  kasan_save_alloc_info+0x3b/0x50
[   25.323419]  __kasan_kmalloc+0xb7/0xc0
[   25.323545]  __kmalloc_cache_noprof+0x189/0x420
[   25.323692]  kasan_atomics+0x95/0x310
[   25.323818]  kunit_try_run_case+0x1a5/0x480
[   25.324016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.324278]  kthread+0x337/0x6f0
[   25.324444]  ret_from_fork+0x116/0x1d0
[   25.324653]  ret_from_fork_asm+0x1a/0x30
[   25.324848] 
[   25.324939] The buggy address belongs to the object at ffff888100aaa000
[   25.324939]  which belongs to the cache kmalloc-64 of size 64
[   25.325594] The buggy address is located 0 bytes to the right of
[   25.325594]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.326033] 
[   25.326142] The buggy address belongs to the physical page:
[   25.326417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.326655] flags: 0x200000000000000(node=0|zone=2)
[   25.326817] page_type: f5(slab)
[   25.326966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.327658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.327991] page dumped because: kasan: bad access detected
[   25.328323] 
[   25.328436] Memory state around the buggy address:
[   25.328600]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.328925]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.329237] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.329526]                                      ^
[   25.329737]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.330070]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.330367] ==================================================================
[   25.444934] ==================================================================
[   25.445358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   25.445829] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.446168] 
[   25.446284] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.446335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.446350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.446373] Call Trace:
[   25.446393]  <TASK>
[   25.446414]  dump_stack_lvl+0x73/0xb0
[   25.446442]  print_report+0xd1/0x650
[   25.446465]  ? __virt_addr_valid+0x1db/0x2d0
[   25.446490]  ? kasan_atomics_helper+0x177f/0x5450
[   25.446511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.446538]  ? kasan_atomics_helper+0x177f/0x5450
[   25.446561]  kasan_report+0x141/0x180
[   25.446584]  ? kasan_atomics_helper+0x177f/0x5450
[   25.446610]  kasan_check_range+0x10c/0x1c0
[   25.446634]  __kasan_check_write+0x18/0x20
[   25.446658]  kasan_atomics_helper+0x177f/0x5450
[   25.446681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.446708]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.446733]  ? kasan_atomics+0x152/0x310
[   25.446762]  kasan_atomics+0x1dc/0x310
[   25.446785]  ? __pfx_kasan_atomics+0x10/0x10
[   25.446808]  ? trace_hardirqs_on+0x37/0xe0
[   25.446832]  ? __pfx_read_tsc+0x10/0x10
[   25.446855]  ? ktime_get_ts64+0x86/0x230
[   25.446881]  kunit_try_run_case+0x1a5/0x480
[   25.446906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.446932]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.446959]  ? __kthread_parkme+0x82/0x180
[   25.446981]  ? preempt_count_sub+0x50/0x80
[   25.447006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.447049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.447074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.447099]  kthread+0x337/0x6f0
[   25.447120]  ? trace_preempt_on+0x20/0xc0
[   25.447144]  ? __pfx_kthread+0x10/0x10
[   25.447165]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.447190]  ? calculate_sigpending+0x7b/0xa0
[   25.447215]  ? __pfx_kthread+0x10/0x10
[   25.447248]  ret_from_fork+0x116/0x1d0
[   25.447269]  ? __pfx_kthread+0x10/0x10
[   25.447290]  ret_from_fork_asm+0x1a/0x30
[   25.447323]  </TASK>
[   25.447335] 
[   25.457244] Allocated by task 294:
[   25.457607]  kasan_save_stack+0x45/0x70
[   25.458039]  kasan_save_track+0x18/0x40
[   25.458435]  kasan_save_alloc_info+0x3b/0x50
[   25.458859]  __kasan_kmalloc+0xb7/0xc0
[   25.459251]  __kmalloc_cache_noprof+0x189/0x420
[   25.459667]  kasan_atomics+0x95/0x310
[   25.460023]  kunit_try_run_case+0x1a5/0x480
[   25.460425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.460901]  kthread+0x337/0x6f0
[   25.461237]  ret_from_fork+0x116/0x1d0
[   25.461586]  ret_from_fork_asm+0x1a/0x30
[   25.461937] 
[   25.462025] The buggy address belongs to the object at ffff888100aaa000
[   25.462025]  which belongs to the cache kmalloc-64 of size 64
[   25.462738] The buggy address is located 0 bytes to the right of
[   25.462738]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.463342] 
[   25.463512] The buggy address belongs to the physical page:
[   25.463995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.464711] flags: 0x200000000000000(node=0|zone=2)
[   25.465179] page_type: f5(slab)
[   25.465497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.465943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.466553] page dumped because: kasan: bad access detected
[   25.467070] 
[   25.467142] Memory state around the buggy address:
[   25.467302]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.467925]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.468561] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.468906]                                      ^
[   25.469210]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.469823]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.470454] ==================================================================
[   25.183637] ==================================================================
[   25.184165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   25.184435] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.184657] 
[   25.184740] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.184789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.184803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.184827] Call Trace:
[   25.184847]  <TASK>
[   25.184867]  dump_stack_lvl+0x73/0xb0
[   25.184894]  print_report+0xd1/0x650
[   25.184918]  ? __virt_addr_valid+0x1db/0x2d0
[   25.184942]  ? kasan_atomics_helper+0x1148/0x5450
[   25.184964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.184991]  ? kasan_atomics_helper+0x1148/0x5450
[   25.185015]  kasan_report+0x141/0x180
[   25.185048]  ? kasan_atomics_helper+0x1148/0x5450
[   25.185075]  kasan_check_range+0x10c/0x1c0
[   25.185099]  __kasan_check_write+0x18/0x20
[   25.185122]  kasan_atomics_helper+0x1148/0x5450
[   25.185154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.185180]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.185206]  ? kasan_atomics+0x152/0x310
[   25.185251]  kasan_atomics+0x1dc/0x310
[   25.185275]  ? __pfx_kasan_atomics+0x10/0x10
[   25.185297]  ? trace_hardirqs_on+0x37/0xe0
[   25.185322]  ? __pfx_read_tsc+0x10/0x10
[   25.185347]  ? ktime_get_ts64+0x86/0x230
[   25.185383]  kunit_try_run_case+0x1a5/0x480
[   25.185408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.185444]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.185472]  ? __kthread_parkme+0x82/0x180
[   25.185494]  ? preempt_count_sub+0x50/0x80
[   25.185519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.185544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.185568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.185593]  kthread+0x337/0x6f0
[   25.185614]  ? trace_preempt_on+0x20/0xc0
[   25.185637]  ? __pfx_kthread+0x10/0x10
[   25.185659]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.185682]  ? calculate_sigpending+0x7b/0xa0
[   25.185708]  ? __pfx_kthread+0x10/0x10
[   25.185730]  ret_from_fork+0x116/0x1d0
[   25.185751]  ? __pfx_kthread+0x10/0x10
[   25.185772]  ret_from_fork_asm+0x1a/0x30
[   25.185804]  </TASK>
[   25.185817] 
[   25.195112] Allocated by task 294:
[   25.195255]  kasan_save_stack+0x45/0x70
[   25.195660]  kasan_save_track+0x18/0x40
[   25.195826]  kasan_save_alloc_info+0x3b/0x50
[   25.196026]  __kasan_kmalloc+0xb7/0xc0
[   25.196155]  __kmalloc_cache_noprof+0x189/0x420
[   25.196315]  kasan_atomics+0x95/0x310
[   25.196548]  kunit_try_run_case+0x1a5/0x480
[   25.196772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.197026]  kthread+0x337/0x6f0
[   25.197191]  ret_from_fork+0x116/0x1d0
[   25.197386]  ret_from_fork_asm+0x1a/0x30
[   25.197542] 
[   25.197652] The buggy address belongs to the object at ffff888100aaa000
[   25.197652]  which belongs to the cache kmalloc-64 of size 64
[   25.198232] The buggy address is located 0 bytes to the right of
[   25.198232]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.198642] 
[   25.198712] The buggy address belongs to the physical page:
[   25.198941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.199574] flags: 0x200000000000000(node=0|zone=2)
[   25.199954] page_type: f5(slab)
[   25.200179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.200471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.200799] page dumped because: kasan: bad access detected
[   25.201037] 
[   25.201116] Memory state around the buggy address:
[   25.201345]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.201647]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.201946] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.202271]                                      ^
[   25.202476]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.202762]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.203053] ==================================================================
[   25.768854] ==================================================================
[   25.769349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   25.769594] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.770095] 
[   25.770205] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.770264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.770278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.770303] Call Trace:
[   25.770323]  <TASK>
[   25.770342]  dump_stack_lvl+0x73/0xb0
[   25.770372]  print_report+0xd1/0x650
[   25.770395]  ? __virt_addr_valid+0x1db/0x2d0
[   25.770421]  ? kasan_atomics_helper+0x4f71/0x5450
[   25.770443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.770470]  ? kasan_atomics_helper+0x4f71/0x5450
[   25.770492]  kasan_report+0x141/0x180
[   25.770515]  ? kasan_atomics_helper+0x4f71/0x5450
[   25.770541]  __asan_report_load8_noabort+0x18/0x20
[   25.770566]  kasan_atomics_helper+0x4f71/0x5450
[   25.770589]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.770615]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.770641]  ? kasan_atomics+0x152/0x310
[   25.770668]  kasan_atomics+0x1dc/0x310
[   25.770691]  ? __pfx_kasan_atomics+0x10/0x10
[   25.770714]  ? trace_hardirqs_on+0x37/0xe0
[   25.770737]  ? __pfx_read_tsc+0x10/0x10
[   25.770759]  ? ktime_get_ts64+0x86/0x230
[   25.770785]  kunit_try_run_case+0x1a5/0x480
[   25.770809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.770834]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.770862]  ? __kthread_parkme+0x82/0x180
[   25.770883]  ? preempt_count_sub+0x50/0x80
[   25.770907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.770932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.770957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.770981]  kthread+0x337/0x6f0
[   25.771002]  ? trace_preempt_on+0x20/0xc0
[   25.771024]  ? __pfx_kthread+0x10/0x10
[   25.771051]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.771076]  ? calculate_sigpending+0x7b/0xa0
[   25.771100]  ? __pfx_kthread+0x10/0x10
[   25.771122]  ret_from_fork+0x116/0x1d0
[   25.771142]  ? __pfx_kthread+0x10/0x10
[   25.771163]  ret_from_fork_asm+0x1a/0x30
[   25.771194]  </TASK>
[   25.771207] 
[   25.778949] Allocated by task 294:
[   25.779268]  kasan_save_stack+0x45/0x70
[   25.779448]  kasan_save_track+0x18/0x40
[   25.779616]  kasan_save_alloc_info+0x3b/0x50
[   25.779794]  __kasan_kmalloc+0xb7/0xc0
[   25.779947]  __kmalloc_cache_noprof+0x189/0x420
[   25.780094]  kasan_atomics+0x95/0x310
[   25.780391]  kunit_try_run_case+0x1a5/0x480
[   25.780596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.780843]  kthread+0x337/0x6f0
[   25.781049]  ret_from_fork+0x116/0x1d0
[   25.781205]  ret_from_fork_asm+0x1a/0x30
[   25.781379] 
[   25.781473] The buggy address belongs to the object at ffff888100aaa000
[   25.781473]  which belongs to the cache kmalloc-64 of size 64
[   25.781909] The buggy address is located 0 bytes to the right of
[   25.781909]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.782395] 
[   25.782493] The buggy address belongs to the physical page:
[   25.782705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.783014] flags: 0x200000000000000(node=0|zone=2)
[   25.783262] page_type: f5(slab)
[   25.783383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.783608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.783859] page dumped because: kasan: bad access detected
[   25.784103] 
[   25.784191] Memory state around the buggy address:
[   25.784470]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.784775]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.784985] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.785437]                                      ^
[   25.785618]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.785828]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.786183] ==================================================================
[   25.116073] ==================================================================
[   25.116495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   25.116763] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.117080] 
[   25.117163] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.117214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.117239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.117262] Call Trace:
[   25.117282]  <TASK>
[   25.117303]  dump_stack_lvl+0x73/0xb0
[   25.117332]  print_report+0xd1/0x650
[   25.117354]  ? __virt_addr_valid+0x1db/0x2d0
[   25.117377]  ? kasan_atomics_helper+0x4a36/0x5450
[   25.117399]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.117426]  ? kasan_atomics_helper+0x4a36/0x5450
[   25.117447]  kasan_report+0x141/0x180
[   25.117470]  ? kasan_atomics_helper+0x4a36/0x5450
[   25.117496]  __asan_report_load4_noabort+0x18/0x20
[   25.117521]  kasan_atomics_helper+0x4a36/0x5450
[   25.117544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.117570]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.117595]  ? kasan_atomics+0x152/0x310
[   25.117637]  kasan_atomics+0x1dc/0x310
[   25.117661]  ? __pfx_kasan_atomics+0x10/0x10
[   25.117684]  ? trace_hardirqs_on+0x37/0xe0
[   25.117708]  ? __pfx_read_tsc+0x10/0x10
[   25.117732]  ? ktime_get_ts64+0x86/0x230
[   25.117757]  kunit_try_run_case+0x1a5/0x480
[   25.117784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.117809]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.117837]  ? __kthread_parkme+0x82/0x180
[   25.117858]  ? preempt_count_sub+0x50/0x80
[   25.117884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.117908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.117933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.117958]  kthread+0x337/0x6f0
[   25.117979]  ? trace_preempt_on+0x20/0xc0
[   25.118002]  ? __pfx_kthread+0x10/0x10
[   25.118025]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.118050]  ? calculate_sigpending+0x7b/0xa0
[   25.118075]  ? __pfx_kthread+0x10/0x10
[   25.118097]  ret_from_fork+0x116/0x1d0
[   25.118117]  ? __pfx_kthread+0x10/0x10
[   25.118139]  ret_from_fork_asm+0x1a/0x30
[   25.118171]  </TASK>
[   25.118183] 
[   25.127312] Allocated by task 294:
[   25.127469]  kasan_save_stack+0x45/0x70
[   25.127624]  kasan_save_track+0x18/0x40
[   25.127750]  kasan_save_alloc_info+0x3b/0x50
[   25.127890]  __kasan_kmalloc+0xb7/0xc0
[   25.128014]  __kmalloc_cache_noprof+0x189/0x420
[   25.128161]  kasan_atomics+0x95/0x310
[   25.128468]  kunit_try_run_case+0x1a5/0x480
[   25.128994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.129455]  kthread+0x337/0x6f0
[   25.129808]  ret_from_fork+0x116/0x1d0
[   25.130252]  ret_from_fork_asm+0x1a/0x30
[   25.130641] 
[   25.130795] The buggy address belongs to the object at ffff888100aaa000
[   25.130795]  which belongs to the cache kmalloc-64 of size 64
[   25.131936] The buggy address is located 0 bytes to the right of
[   25.131936]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.133190] 
[   25.133361] The buggy address belongs to the physical page:
[   25.133857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.134657] flags: 0x200000000000000(node=0|zone=2)
[   25.135154] page_type: f5(slab)
[   25.135316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.135543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.135757] page dumped because: kasan: bad access detected
[   25.135918] 
[   25.135979] Memory state around the buggy address:
[   25.136585]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.137383]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.138015] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.138651]                                      ^
[   25.139052]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.139491]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.139697] ==================================================================
[   25.700662] ==================================================================
[   25.701118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   25.701475] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.701809] 
[   25.701912] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.701959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.701973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.701996] Call Trace:
[   25.702022]  <TASK>
[   25.702039]  dump_stack_lvl+0x73/0xb0
[   25.702066]  print_report+0xd1/0x650
[   25.702089]  ? __virt_addr_valid+0x1db/0x2d0
[   25.702114]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.702136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.702163]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.702184]  kasan_report+0x141/0x180
[   25.702207]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.702244]  kasan_check_range+0x10c/0x1c0
[   25.702268]  __kasan_check_write+0x18/0x20
[   25.702293]  kasan_atomics_helper+0x1e12/0x5450
[   25.702316]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.702342]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.702368]  ? kasan_atomics+0x152/0x310
[   25.702395]  kasan_atomics+0x1dc/0x310
[   25.702418]  ? __pfx_kasan_atomics+0x10/0x10
[   25.702441]  ? trace_hardirqs_on+0x37/0xe0
[   25.702465]  ? __pfx_read_tsc+0x10/0x10
[   25.702487]  ? ktime_get_ts64+0x86/0x230
[   25.702512]  kunit_try_run_case+0x1a5/0x480
[   25.702538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.702564]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.702591]  ? __kthread_parkme+0x82/0x180
[   25.702613]  ? preempt_count_sub+0x50/0x80
[   25.702636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.702662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.702686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.702710]  kthread+0x337/0x6f0
[   25.702732]  ? trace_preempt_on+0x20/0xc0
[   25.702756]  ? __pfx_kthread+0x10/0x10
[   25.702778]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.702803]  ? calculate_sigpending+0x7b/0xa0
[   25.702828]  ? __pfx_kthread+0x10/0x10
[   25.702849]  ret_from_fork+0x116/0x1d0
[   25.702870]  ? __pfx_kthread+0x10/0x10
[   25.702891]  ret_from_fork_asm+0x1a/0x30
[   25.702922]  </TASK>
[   25.702934] 
[   25.712921] Allocated by task 294:
[   25.713164]  kasan_save_stack+0x45/0x70
[   25.713359]  kasan_save_track+0x18/0x40
[   25.713529]  kasan_save_alloc_info+0x3b/0x50
[   25.713703]  __kasan_kmalloc+0xb7/0xc0
[   25.713856]  __kmalloc_cache_noprof+0x189/0x420
[   25.714493]  kasan_atomics+0x95/0x310
[   25.714819]  kunit_try_run_case+0x1a5/0x480
[   25.715395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.715643]  kthread+0x337/0x6f0
[   25.715787]  ret_from_fork+0x116/0x1d0
[   25.715947]  ret_from_fork_asm+0x1a/0x30
[   25.716350] 
[   25.716576] The buggy address belongs to the object at ffff888100aaa000
[   25.716576]  which belongs to the cache kmalloc-64 of size 64
[   25.717284] The buggy address is located 0 bytes to the right of
[   25.717284]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.717775] 
[   25.717859] The buggy address belongs to the physical page:
[   25.718347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.718886] flags: 0x200000000000000(node=0|zone=2)
[   25.719306] page_type: f5(slab)
[   25.719583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.720205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.720523] page dumped because: kasan: bad access detected
[   25.720739] 
[   25.720817] Memory state around the buggy address:
[   25.721003]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.721301]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.721576] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.721866]                                      ^
[   25.722463]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.722924]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.723460] ==================================================================
[   25.574579] ==================================================================
[   25.574952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   25.575427] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.575846] 
[   25.575931] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.575979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.575993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.576026] Call Trace:
[   25.576046]  <TASK>
[   25.576065]  dump_stack_lvl+0x73/0xb0
[   25.576095]  print_report+0xd1/0x650
[   25.576119]  ? __virt_addr_valid+0x1db/0x2d0
[   25.576143]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.576165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.576192]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.576213]  kasan_report+0x141/0x180
[   25.576248]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.576274]  kasan_check_range+0x10c/0x1c0
[   25.576298]  __kasan_check_write+0x18/0x20
[   25.576321]  kasan_atomics_helper+0x1a7f/0x5450
[   25.576345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.576371]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.576396]  ? kasan_atomics+0x152/0x310
[   25.576423]  kasan_atomics+0x1dc/0x310
[   25.576446]  ? __pfx_kasan_atomics+0x10/0x10
[   25.576469]  ? trace_hardirqs_on+0x37/0xe0
[   25.576502]  ? __pfx_read_tsc+0x10/0x10
[   25.576525]  ? ktime_get_ts64+0x86/0x230
[   25.576550]  kunit_try_run_case+0x1a5/0x480
[   25.576589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.576614]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.576641]  ? __kthread_parkme+0x82/0x180
[   25.576672]  ? preempt_count_sub+0x50/0x80
[   25.576696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.576720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.576757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.576782]  kthread+0x337/0x6f0
[   25.576802]  ? trace_preempt_on+0x20/0xc0
[   25.576834]  ? __pfx_kthread+0x10/0x10
[   25.576856]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.576881]  ? calculate_sigpending+0x7b/0xa0
[   25.576917]  ? __pfx_kthread+0x10/0x10
[   25.576940]  ret_from_fork+0x116/0x1d0
[   25.576961]  ? __pfx_kthread+0x10/0x10
[   25.576990]  ret_from_fork_asm+0x1a/0x30
[   25.577023]  </TASK>
[   25.577036] 
[   25.584651] Allocated by task 294:
[   25.584843]  kasan_save_stack+0x45/0x70
[   25.585047]  kasan_save_track+0x18/0x40
[   25.585228]  kasan_save_alloc_info+0x3b/0x50
[   25.585440]  __kasan_kmalloc+0xb7/0xc0
[   25.585611]  __kmalloc_cache_noprof+0x189/0x420
[   25.585825]  kasan_atomics+0x95/0x310
[   25.585953]  kunit_try_run_case+0x1a5/0x480
[   25.586312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.586540]  kthread+0x337/0x6f0
[   25.586724]  ret_from_fork+0x116/0x1d0
[   25.586894]  ret_from_fork_asm+0x1a/0x30
[   25.587037] 
[   25.587104] The buggy address belongs to the object at ffff888100aaa000
[   25.587104]  which belongs to the cache kmalloc-64 of size 64
[   25.587463] The buggy address is located 0 bytes to the right of
[   25.587463]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.587821] 
[   25.587889] The buggy address belongs to the physical page:
[   25.588056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.588771] flags: 0x200000000000000(node=0|zone=2)
[   25.589003] page_type: f5(slab)
[   25.589295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.589632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.589962] page dumped because: kasan: bad access detected
[   25.590233] 
[   25.590330] Memory state around the buggy address:
[   25.590522]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.590735]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.590946] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.591548]                                      ^
[   25.591774]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.592194]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.592424] ==================================================================
[   24.817677] ==================================================================
[   24.818139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   24.818619] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.818934] 
[   24.819047] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.819102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.819116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.819320] Call Trace:
[   24.819348]  <TASK>
[   24.819371]  dump_stack_lvl+0x73/0xb0
[   24.819405]  print_report+0xd1/0x650
[   24.819431]  ? __virt_addr_valid+0x1db/0x2d0
[   24.819457]  ? kasan_atomics_helper+0x697/0x5450
[   24.819479]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.819506]  ? kasan_atomics_helper+0x697/0x5450
[   24.819528]  kasan_report+0x141/0x180
[   24.819552]  ? kasan_atomics_helper+0x697/0x5450
[   24.819577]  kasan_check_range+0x10c/0x1c0
[   24.819601]  __kasan_check_write+0x18/0x20
[   24.819624]  kasan_atomics_helper+0x697/0x5450
[   24.819647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.819674]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.819700]  ? kasan_atomics+0x152/0x310
[   24.819726]  kasan_atomics+0x1dc/0x310
[   24.819750]  ? __pfx_kasan_atomics+0x10/0x10
[   24.819772]  ? trace_hardirqs_on+0x37/0xe0
[   24.819797]  ? __pfx_read_tsc+0x10/0x10
[   24.819820]  ? ktime_get_ts64+0x86/0x230
[   24.819846]  kunit_try_run_case+0x1a5/0x480
[   24.819873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.819898]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.819926]  ? __kthread_parkme+0x82/0x180
[   24.819950]  ? preempt_count_sub+0x50/0x80
[   24.819974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.819999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.820033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.820058]  kthread+0x337/0x6f0
[   24.820079]  ? trace_preempt_on+0x20/0xc0
[   24.820102]  ? __pfx_kthread+0x10/0x10
[   24.820123]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.820147]  ? calculate_sigpending+0x7b/0xa0
[   24.820172]  ? __pfx_kthread+0x10/0x10
[   24.820194]  ret_from_fork+0x116/0x1d0
[   24.820216]  ? __pfx_kthread+0x10/0x10
[   24.820249]  ret_from_fork_asm+0x1a/0x30
[   24.820283]  </TASK>
[   24.820296] 
[   24.827232] Allocated by task 294:
[   24.827359]  kasan_save_stack+0x45/0x70
[   24.827558]  kasan_save_track+0x18/0x40
[   24.827706]  kasan_save_alloc_info+0x3b/0x50
[   24.827846]  __kasan_kmalloc+0xb7/0xc0
[   24.827966]  __kmalloc_cache_noprof+0x189/0x420
[   24.828175]  kasan_atomics+0x95/0x310
[   24.828363]  kunit_try_run_case+0x1a5/0x480
[   24.828536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.828699]  kthread+0x337/0x6f0
[   24.828812]  ret_from_fork+0x116/0x1d0
[   24.828984]  ret_from_fork_asm+0x1a/0x30
[   24.829187] 
[   24.829287] The buggy address belongs to the object at ffff888100aaa000
[   24.829287]  which belongs to the cache kmalloc-64 of size 64
[   24.829815] The buggy address is located 0 bytes to the right of
[   24.829815]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.830331] 
[   24.830401] The buggy address belongs to the physical page:
[   24.830650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.830893] flags: 0x200000000000000(node=0|zone=2)
[   24.831056] page_type: f5(slab)
[   24.831172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.831402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.831621] page dumped because: kasan: bad access detected
[   24.831862] 
[   24.831949] Memory state around the buggy address:
[   24.832167]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.832510]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.832992] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.833362]                                      ^
[   24.833512]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.833723]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.833932] ==================================================================
[   25.367745] ==================================================================
[   25.368118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   25.368468] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.368782] 
[   25.368894] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.368956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.368970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.368994] Call Trace:
[   25.369027]  <TASK>
[   25.369049]  dump_stack_lvl+0x73/0xb0
[   25.369078]  print_report+0xd1/0x650
[   25.369102]  ? __virt_addr_valid+0x1db/0x2d0
[   25.369127]  ? kasan_atomics_helper+0x151d/0x5450
[   25.369150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.369178]  ? kasan_atomics_helper+0x151d/0x5450
[   25.369200]  kasan_report+0x141/0x180
[   25.369233]  ? kasan_atomics_helper+0x151d/0x5450
[   25.369260]  kasan_check_range+0x10c/0x1c0
[   25.369284]  __kasan_check_write+0x18/0x20
[   25.369308]  kasan_atomics_helper+0x151d/0x5450
[   25.369331]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.369358]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.369384]  ? kasan_atomics+0x152/0x310
[   25.369411]  kasan_atomics+0x1dc/0x310
[   25.369434]  ? __pfx_kasan_atomics+0x10/0x10
[   25.369457]  ? trace_hardirqs_on+0x37/0xe0
[   25.369482]  ? __pfx_read_tsc+0x10/0x10
[   25.369506]  ? ktime_get_ts64+0x86/0x230
[   25.369531]  kunit_try_run_case+0x1a5/0x480
[   25.369557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.369583]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.369609]  ? __kthread_parkme+0x82/0x180
[   25.369631]  ? preempt_count_sub+0x50/0x80
[   25.369656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.369681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.369705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.369729]  kthread+0x337/0x6f0
[   25.369750]  ? trace_preempt_on+0x20/0xc0
[   25.369773]  ? __pfx_kthread+0x10/0x10
[   25.369795]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.369820]  ? calculate_sigpending+0x7b/0xa0
[   25.369845]  ? __pfx_kthread+0x10/0x10
[   25.369867]  ret_from_fork+0x116/0x1d0
[   25.369887]  ? __pfx_kthread+0x10/0x10
[   25.369908]  ret_from_fork_asm+0x1a/0x30
[   25.369940]  </TASK>
[   25.369952] 
[   25.377535] Allocated by task 294:
[   25.377701]  kasan_save_stack+0x45/0x70
[   25.377899]  kasan_save_track+0x18/0x40
[   25.378143]  kasan_save_alloc_info+0x3b/0x50
[   25.378303]  __kasan_kmalloc+0xb7/0xc0
[   25.378433]  __kmalloc_cache_noprof+0x189/0x420
[   25.378583]  kasan_atomics+0x95/0x310
[   25.378710]  kunit_try_run_case+0x1a5/0x480
[   25.378855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.379138]  kthread+0x337/0x6f0
[   25.379316]  ret_from_fork+0x116/0x1d0
[   25.379498]  ret_from_fork_asm+0x1a/0x30
[   25.379690] 
[   25.379783] The buggy address belongs to the object at ffff888100aaa000
[   25.379783]  which belongs to the cache kmalloc-64 of size 64
[   25.380162] The buggy address is located 0 bytes to the right of
[   25.380162]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.380631] 
[   25.380727] The buggy address belongs to the physical page:
[   25.380979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.381354] flags: 0x200000000000000(node=0|zone=2)
[   25.381628] page_type: f5(slab)
[   25.381834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.382173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.382408] page dumped because: kasan: bad access detected
[   25.382572] 
[   25.382637] Memory state around the buggy address:
[   25.382787]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.383250]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.383595] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.383904]                                      ^
[   25.384109]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.384330]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.384539] ==================================================================
[   24.687865] ==================================================================
[   24.688387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   24.688775] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.689248] 
[   24.689406] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.689458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.689472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.689497] Call Trace:
[   24.689562]  <TASK>
[   24.689600]  dump_stack_lvl+0x73/0xb0
[   24.689688]  print_report+0xd1/0x650
[   24.689725]  ? __virt_addr_valid+0x1db/0x2d0
[   24.689751]  ? kasan_atomics_helper+0x3df/0x5450
[   24.689773]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.689801]  ? kasan_atomics_helper+0x3df/0x5450
[   24.689822]  kasan_report+0x141/0x180
[   24.689845]  ? kasan_atomics_helper+0x3df/0x5450
[   24.689871]  kasan_check_range+0x10c/0x1c0
[   24.689895]  __kasan_check_read+0x15/0x20
[   24.689919]  kasan_atomics_helper+0x3df/0x5450
[   24.689941]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.689968]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.689995]  ? kasan_atomics+0x152/0x310
[   24.690035]  kasan_atomics+0x1dc/0x310
[   24.690058]  ? __pfx_kasan_atomics+0x10/0x10
[   24.690081]  ? trace_hardirqs_on+0x37/0xe0
[   24.690105]  ? __pfx_read_tsc+0x10/0x10
[   24.690128]  ? ktime_get_ts64+0x86/0x230
[   24.690153]  kunit_try_run_case+0x1a5/0x480
[   24.690179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.690204]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.690244]  ? __kthread_parkme+0x82/0x180
[   24.690265]  ? preempt_count_sub+0x50/0x80
[   24.690289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.690314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.690339]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.690364]  kthread+0x337/0x6f0
[   24.690385]  ? trace_preempt_on+0x20/0xc0
[   24.690408]  ? __pfx_kthread+0x10/0x10
[   24.690430]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.690454]  ? calculate_sigpending+0x7b/0xa0
[   24.690479]  ? __pfx_kthread+0x10/0x10
[   24.690502]  ret_from_fork+0x116/0x1d0
[   24.690522]  ? __pfx_kthread+0x10/0x10
[   24.690543]  ret_from_fork_asm+0x1a/0x30
[   24.690575]  </TASK>
[   24.690588] 
[   24.700198] Allocated by task 294:
[   24.700379]  kasan_save_stack+0x45/0x70
[   24.700588]  kasan_save_track+0x18/0x40
[   24.700764]  kasan_save_alloc_info+0x3b/0x50
[   24.700911]  __kasan_kmalloc+0xb7/0xc0
[   24.701051]  __kmalloc_cache_noprof+0x189/0x420
[   24.701293]  kasan_atomics+0x95/0x310
[   24.701489]  kunit_try_run_case+0x1a5/0x480
[   24.701642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.701830]  kthread+0x337/0x6f0
[   24.702050]  ret_from_fork+0x116/0x1d0
[   24.702247]  ret_from_fork_asm+0x1a/0x30
[   24.702465] 
[   24.702535] The buggy address belongs to the object at ffff888100aaa000
[   24.702535]  which belongs to the cache kmalloc-64 of size 64
[   24.703042] The buggy address is located 0 bytes to the right of
[   24.703042]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.703576] 
[   24.703662] The buggy address belongs to the physical page:
[   24.703897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.704276] flags: 0x200000000000000(node=0|zone=2)
[   24.704490] page_type: f5(slab)
[   24.704644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.704947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.705288] page dumped because: kasan: bad access detected
[   24.705456] 
[   24.705519] Memory state around the buggy address:
[   24.705725]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.706047]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.706530] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.706770]                                      ^
[   24.706945]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.707502]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.707863] ==================================================================
[   25.527728] ==================================================================
[   25.528419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   25.529161] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.529947] 
[   25.530190] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.530376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.530399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.530425] Call Trace:
[   25.530526]  <TASK>
[   25.530553]  dump_stack_lvl+0x73/0xb0
[   25.530702]  print_report+0xd1/0x650
[   25.530737]  ? __virt_addr_valid+0x1db/0x2d0
[   25.530762]  ? kasan_atomics_helper+0x194a/0x5450
[   25.530860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.530887]  ? kasan_atomics_helper+0x194a/0x5450
[   25.530922]  kasan_report+0x141/0x180
[   25.530945]  ? kasan_atomics_helper+0x194a/0x5450
[   25.530978]  kasan_check_range+0x10c/0x1c0
[   25.531002]  __kasan_check_write+0x18/0x20
[   25.531037]  kasan_atomics_helper+0x194a/0x5450
[   25.531061]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.531086]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.531112]  ? kasan_atomics+0x152/0x310
[   25.531140]  kasan_atomics+0x1dc/0x310
[   25.531163]  ? __pfx_kasan_atomics+0x10/0x10
[   25.531186]  ? trace_hardirqs_on+0x37/0xe0
[   25.531209]  ? __pfx_read_tsc+0x10/0x10
[   25.531243]  ? ktime_get_ts64+0x86/0x230
[   25.531270]  kunit_try_run_case+0x1a5/0x480
[   25.531295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.531320]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.531349]  ? __kthread_parkme+0x82/0x180
[   25.531371]  ? preempt_count_sub+0x50/0x80
[   25.531396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.531421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.531446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.531471]  kthread+0x337/0x6f0
[   25.531492]  ? trace_preempt_on+0x20/0xc0
[   25.531514]  ? __pfx_kthread+0x10/0x10
[   25.531536]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.531560]  ? calculate_sigpending+0x7b/0xa0
[   25.531585]  ? __pfx_kthread+0x10/0x10
[   25.531607]  ret_from_fork+0x116/0x1d0
[   25.531627]  ? __pfx_kthread+0x10/0x10
[   25.531648]  ret_from_fork_asm+0x1a/0x30
[   25.531680]  </TASK>
[   25.531693] 
[   25.543894] Allocated by task 294:
[   25.544172]  kasan_save_stack+0x45/0x70
[   25.544464]  kasan_save_track+0x18/0x40
[   25.544598]  kasan_save_alloc_info+0x3b/0x50
[   25.544740]  __kasan_kmalloc+0xb7/0xc0
[   25.544867]  __kmalloc_cache_noprof+0x189/0x420
[   25.545037]  kasan_atomics+0x95/0x310
[   25.545393]  kunit_try_run_case+0x1a5/0x480
[   25.545784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.546277]  kthread+0x337/0x6f0
[   25.546598]  ret_from_fork+0x116/0x1d0
[   25.546939]  ret_from_fork_asm+0x1a/0x30
[   25.547349] 
[   25.547504] The buggy address belongs to the object at ffff888100aaa000
[   25.547504]  which belongs to the cache kmalloc-64 of size 64
[   25.548566] The buggy address is located 0 bytes to the right of
[   25.548566]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.549143] 
[   25.549216] The buggy address belongs to the physical page:
[   25.549398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.549636] flags: 0x200000000000000(node=0|zone=2)
[   25.549798] page_type: f5(slab)
[   25.549916] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.550192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.550610] page dumped because: kasan: bad access detected
[   25.551275] 
[   25.551433] Memory state around the buggy address:
[   25.551878]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.552570]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.553203] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.553826]                                      ^
[   25.554138]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.554684]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.554892] ==================================================================
[   24.834449] ==================================================================
[   24.834813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   24.835354] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.835696] 
[   24.835811] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.835861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.835873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.835898] Call Trace:
[   24.835920]  <TASK>
[   24.835940]  dump_stack_lvl+0x73/0xb0
[   24.835972]  print_report+0xd1/0x650
[   24.835997]  ? __virt_addr_valid+0x1db/0x2d0
[   24.836030]  ? kasan_atomics_helper+0x72f/0x5450
[   24.836051]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.836078]  ? kasan_atomics_helper+0x72f/0x5450
[   24.836101]  kasan_report+0x141/0x180
[   24.836123]  ? kasan_atomics_helper+0x72f/0x5450
[   24.836149]  kasan_check_range+0x10c/0x1c0
[   24.836173]  __kasan_check_write+0x18/0x20
[   24.836198]  kasan_atomics_helper+0x72f/0x5450
[   24.836233]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.836260]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.836286]  ? kasan_atomics+0x152/0x310
[   24.836313]  kasan_atomics+0x1dc/0x310
[   24.836336]  ? __pfx_kasan_atomics+0x10/0x10
[   24.836359]  ? trace_hardirqs_on+0x37/0xe0
[   24.836382]  ? __pfx_read_tsc+0x10/0x10
[   24.836405]  ? ktime_get_ts64+0x86/0x230
[   24.836431]  kunit_try_run_case+0x1a5/0x480
[   24.836458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.836483]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.836510]  ? __kthread_parkme+0x82/0x180
[   24.836532]  ? preempt_count_sub+0x50/0x80
[   24.836556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.836581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.836605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.836630]  kthread+0x337/0x6f0
[   24.836651]  ? trace_preempt_on+0x20/0xc0
[   24.836673]  ? __pfx_kthread+0x10/0x10
[   24.836695]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.836719]  ? calculate_sigpending+0x7b/0xa0
[   24.836743]  ? __pfx_kthread+0x10/0x10
[   24.836765]  ret_from_fork+0x116/0x1d0
[   24.836785]  ? __pfx_kthread+0x10/0x10
[   24.836806]  ret_from_fork_asm+0x1a/0x30
[   24.836838]  </TASK>
[   24.836851] 
[   24.844408] Allocated by task 294:
[   24.844552]  kasan_save_stack+0x45/0x70
[   24.844746]  kasan_save_track+0x18/0x40
[   24.844909]  kasan_save_alloc_info+0x3b/0x50
[   24.845123]  __kasan_kmalloc+0xb7/0xc0
[   24.845260]  __kmalloc_cache_noprof+0x189/0x420
[   24.845412]  kasan_atomics+0x95/0x310
[   24.845595]  kunit_try_run_case+0x1a5/0x480
[   24.845792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.846059]  kthread+0x337/0x6f0
[   24.846178]  ret_from_fork+0x116/0x1d0
[   24.846316]  ret_from_fork_asm+0x1a/0x30
[   24.846487] 
[   24.846577] The buggy address belongs to the object at ffff888100aaa000
[   24.846577]  which belongs to the cache kmalloc-64 of size 64
[   24.847135] The buggy address is located 0 bytes to the right of
[   24.847135]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.847519] 
[   24.847589] The buggy address belongs to the physical page:
[   24.847760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.847997] flags: 0x200000000000000(node=0|zone=2)
[   24.848241] page_type: f5(slab)
[   24.848406] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.848752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.849152] page dumped because: kasan: bad access detected
[   24.849361] 
[   24.849425] Memory state around the buggy address:
[   24.849575]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.849786]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.850027] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.850352]                                      ^
[   24.850575]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.850900]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.851522] ==================================================================
[   24.888053] ==================================================================
[   24.888377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   24.888642] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.889478] 
[   24.889612] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.889665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.889679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.889704] Call Trace:
[   24.889726]  <TASK>
[   24.889748]  dump_stack_lvl+0x73/0xb0
[   24.889792]  print_report+0xd1/0x650
[   24.889818]  ? __virt_addr_valid+0x1db/0x2d0
[   24.889844]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.889866]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.889893]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.889916]  kasan_report+0x141/0x180
[   24.889939]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.889965]  kasan_check_range+0x10c/0x1c0
[   24.889990]  __kasan_check_write+0x18/0x20
[   24.890014]  kasan_atomics_helper+0x8f9/0x5450
[   24.890051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.890079]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.890105]  ? kasan_atomics+0x152/0x310
[   24.890132]  kasan_atomics+0x1dc/0x310
[   24.890156]  ? __pfx_kasan_atomics+0x10/0x10
[   24.890178]  ? trace_hardirqs_on+0x37/0xe0
[   24.890203]  ? __pfx_read_tsc+0x10/0x10
[   24.890239]  ? ktime_get_ts64+0x86/0x230
[   24.890265]  kunit_try_run_case+0x1a5/0x480
[   24.890291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.890317]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.890345]  ? __kthread_parkme+0x82/0x180
[   24.890367]  ? preempt_count_sub+0x50/0x80
[   24.890392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.890417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.890442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.890467]  kthread+0x337/0x6f0
[   24.890488]  ? trace_preempt_on+0x20/0xc0
[   24.890512]  ? __pfx_kthread+0x10/0x10
[   24.890533]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.890557]  ? calculate_sigpending+0x7b/0xa0
[   24.890582]  ? __pfx_kthread+0x10/0x10
[   24.890604]  ret_from_fork+0x116/0x1d0
[   24.890624]  ? __pfx_kthread+0x10/0x10
[   24.890646]  ret_from_fork_asm+0x1a/0x30
[   24.890677]  </TASK>
[   24.890690] 
[   24.898316] Allocated by task 294:
[   24.898472]  kasan_save_stack+0x45/0x70
[   24.898608]  kasan_save_track+0x18/0x40
[   24.898737]  kasan_save_alloc_info+0x3b/0x50
[   24.898881]  __kasan_kmalloc+0xb7/0xc0
[   24.899089]  __kmalloc_cache_noprof+0x189/0x420
[   24.899319]  kasan_atomics+0x95/0x310
[   24.899503]  kunit_try_run_case+0x1a5/0x480
[   24.899706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.899920]  kthread+0x337/0x6f0
[   24.900106]  ret_from_fork+0x116/0x1d0
[   24.900279]  ret_from_fork_asm+0x1a/0x30
[   24.900440] 
[   24.900537] The buggy address belongs to the object at ffff888100aaa000
[   24.900537]  which belongs to the cache kmalloc-64 of size 64
[   24.900939] The buggy address is located 0 bytes to the right of
[   24.900939]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.901575] 
[   24.901671] The buggy address belongs to the physical page:
[   24.901872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.902257] flags: 0x200000000000000(node=0|zone=2)
[   24.902442] page_type: f5(slab)
[   24.902603] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.902835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.903071] page dumped because: kasan: bad access detected
[   24.903296] 
[   24.903363] Memory state around the buggy address:
[   24.903515]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.903737]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.904168] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.904493]                                      ^
[   24.904714]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.905026]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.905390] ==================================================================
[   24.993451] ==================================================================
[   24.993694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   24.994291] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.994616] 
[   24.994725] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.994776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.994790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.994813] Call Trace:
[   24.994833]  <TASK>
[   24.994852]  dump_stack_lvl+0x73/0xb0
[   24.994881]  print_report+0xd1/0x650
[   24.994904]  ? __virt_addr_valid+0x1db/0x2d0
[   24.994929]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.994951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.994978]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.995000]  kasan_report+0x141/0x180
[   24.995022]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.995055]  __asan_report_load4_noabort+0x18/0x20
[   24.995080]  kasan_atomics_helper+0x4a84/0x5450
[   24.995103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.995129]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.995155]  ? kasan_atomics+0x152/0x310
[   24.995182]  kasan_atomics+0x1dc/0x310
[   24.995205]  ? __pfx_kasan_atomics+0x10/0x10
[   24.995238]  ? trace_hardirqs_on+0x37/0xe0
[   24.995263]  ? __pfx_read_tsc+0x10/0x10
[   24.995287]  ? ktime_get_ts64+0x86/0x230
[   24.995313]  kunit_try_run_case+0x1a5/0x480
[   24.995339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.995364]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.995391]  ? __kthread_parkme+0x82/0x180
[   24.995413]  ? preempt_count_sub+0x50/0x80
[   24.995437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.995462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.995487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.995511]  kthread+0x337/0x6f0
[   24.995531]  ? trace_preempt_on+0x20/0xc0
[   24.995555]  ? __pfx_kthread+0x10/0x10
[   24.995586]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.995611]  ? calculate_sigpending+0x7b/0xa0
[   24.995637]  ? __pfx_kthread+0x10/0x10
[   24.995659]  ret_from_fork+0x116/0x1d0
[   24.995679]  ? __pfx_kthread+0x10/0x10
[   24.995701]  ret_from_fork_asm+0x1a/0x30
[   24.995733]  </TASK>
[   24.995745] 
[   25.003209] Allocated by task 294:
[   25.003410]  kasan_save_stack+0x45/0x70
[   25.003614]  kasan_save_track+0x18/0x40
[   25.003807]  kasan_save_alloc_info+0x3b/0x50
[   25.004026]  __kasan_kmalloc+0xb7/0xc0
[   25.004250]  __kmalloc_cache_noprof+0x189/0x420
[   25.004479]  kasan_atomics+0x95/0x310
[   25.004672]  kunit_try_run_case+0x1a5/0x480
[   25.004831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.005001]  kthread+0x337/0x6f0
[   25.005139]  ret_from_fork+0x116/0x1d0
[   25.005276]  ret_from_fork_asm+0x1a/0x30
[   25.005413] 
[   25.005507] The buggy address belongs to the object at ffff888100aaa000
[   25.005507]  which belongs to the cache kmalloc-64 of size 64
[   25.006070] The buggy address is located 0 bytes to the right of
[   25.006070]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.006588] 
[   25.006660] The buggy address belongs to the physical page:
[   25.006911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.007214] flags: 0x200000000000000(node=0|zone=2)
[   25.007385] page_type: f5(slab)
[   25.007501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.007727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.008079] page dumped because: kasan: bad access detected
[   25.008341] 
[   25.008431] Memory state around the buggy address:
[   25.008657]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.008971]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.009322] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.009640]                                      ^
[   25.009866]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.010133]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.010353] ==================================================================
[   25.276013] ==================================================================
[   25.276321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   25.276690] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.277095] 
[   25.277198] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.277269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.277284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.277329] Call Trace:
[   25.277351]  <TASK>
[   25.277370]  dump_stack_lvl+0x73/0xb0
[   25.277411]  print_report+0xd1/0x650
[   25.277435]  ? __virt_addr_valid+0x1db/0x2d0
[   25.277460]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.277481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.277508]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.277539]  kasan_report+0x141/0x180
[   25.277562]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.277589]  __asan_report_load4_noabort+0x18/0x20
[   25.277623]  kasan_atomics_helper+0x49ce/0x5450
[   25.277647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.277673]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.277708]  ? kasan_atomics+0x152/0x310
[   25.277735]  kasan_atomics+0x1dc/0x310
[   25.277768]  ? __pfx_kasan_atomics+0x10/0x10
[   25.277791]  ? trace_hardirqs_on+0x37/0xe0
[   25.277816]  ? __pfx_read_tsc+0x10/0x10
[   25.277839]  ? ktime_get_ts64+0x86/0x230
[   25.277864]  kunit_try_run_case+0x1a5/0x480
[   25.277890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.277916]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.277944]  ? __kthread_parkme+0x82/0x180
[   25.277966]  ? preempt_count_sub+0x50/0x80
[   25.277991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.278016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.278041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.278066]  kthread+0x337/0x6f0
[   25.278087]  ? trace_preempt_on+0x20/0xc0
[   25.278110]  ? __pfx_kthread+0x10/0x10
[   25.278132]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.278156]  ? calculate_sigpending+0x7b/0xa0
[   25.278181]  ? __pfx_kthread+0x10/0x10
[   25.278203]  ret_from_fork+0x116/0x1d0
[   25.278232]  ? __pfx_kthread+0x10/0x10
[   25.278253]  ret_from_fork_asm+0x1a/0x30
[   25.278286]  </TASK>
[   25.278298] 
[   25.285652] Allocated by task 294:
[   25.285783]  kasan_save_stack+0x45/0x70
[   25.285925]  kasan_save_track+0x18/0x40
[   25.286054]  kasan_save_alloc_info+0x3b/0x50
[   25.286197]  __kasan_kmalloc+0xb7/0xc0
[   25.286451]  __kmalloc_cache_noprof+0x189/0x420
[   25.286667]  kasan_atomics+0x95/0x310
[   25.286871]  kunit_try_run_case+0x1a5/0x480
[   25.287146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.287389]  kthread+0x337/0x6f0
[   25.287506]  ret_from_fork+0x116/0x1d0
[   25.287633]  ret_from_fork_asm+0x1a/0x30
[   25.287766] 
[   25.287831] The buggy address belongs to the object at ffff888100aaa000
[   25.287831]  which belongs to the cache kmalloc-64 of size 64
[   25.288176] The buggy address is located 0 bytes to the right of
[   25.288176]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.289324] 
[   25.289419] The buggy address belongs to the physical page:
[   25.289701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.290075] flags: 0x200000000000000(node=0|zone=2)
[   25.290323] page_type: f5(slab)
[   25.290505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.290882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.291121] page dumped because: kasan: bad access detected
[   25.291493] 
[   25.291583] Memory state around the buggy address:
[   25.291825]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.292080]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.292482] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.292788]                                      ^
[   25.292975]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.293315]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.293618] ==================================================================
[   25.725052] ==================================================================
[   25.725461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   25.726161] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.726477] 
[   25.726580] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.726634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.726649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.726674] Call Trace:
[   25.726697]  <TASK>
[   25.726719]  dump_stack_lvl+0x73/0xb0
[   25.726751]  print_report+0xd1/0x650
[   25.726775]  ? __virt_addr_valid+0x1db/0x2d0
[   25.726800]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.726822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.726849]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.726872]  kasan_report+0x141/0x180
[   25.726894]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.726921]  kasan_check_range+0x10c/0x1c0
[   25.726945]  __kasan_check_write+0x18/0x20
[   25.726968]  kasan_atomics_helper+0x1eaa/0x5450
[   25.726991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.727208]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.727260]  ? kasan_atomics+0x152/0x310
[   25.727289]  kasan_atomics+0x1dc/0x310
[   25.727314]  ? __pfx_kasan_atomics+0x10/0x10
[   25.727337]  ? trace_hardirqs_on+0x37/0xe0
[   25.727399]  ? __pfx_read_tsc+0x10/0x10
[   25.727424]  ? ktime_get_ts64+0x86/0x230
[   25.727450]  kunit_try_run_case+0x1a5/0x480
[   25.727475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.727500]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.727528]  ? __kthread_parkme+0x82/0x180
[   25.727549]  ? preempt_count_sub+0x50/0x80
[   25.727575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.727599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.727624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.727648]  kthread+0x337/0x6f0
[   25.727669]  ? trace_preempt_on+0x20/0xc0
[   25.727692]  ? __pfx_kthread+0x10/0x10
[   25.727712]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.727737]  ? calculate_sigpending+0x7b/0xa0
[   25.727763]  ? __pfx_kthread+0x10/0x10
[   25.727784]  ret_from_fork+0x116/0x1d0
[   25.727805]  ? __pfx_kthread+0x10/0x10
[   25.727825]  ret_from_fork_asm+0x1a/0x30
[   25.727858]  </TASK>
[   25.727870] 
[   25.738370] Allocated by task 294:
[   25.738825]  kasan_save_stack+0x45/0x70
[   25.739159]  kasan_save_track+0x18/0x40
[   25.739492]  kasan_save_alloc_info+0x3b/0x50
[   25.739690]  __kasan_kmalloc+0xb7/0xc0
[   25.739857]  __kmalloc_cache_noprof+0x189/0x420
[   25.740239]  kasan_atomics+0x95/0x310
[   25.740537]  kunit_try_run_case+0x1a5/0x480
[   25.740848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.741353]  kthread+0x337/0x6f0
[   25.741510]  ret_from_fork+0x116/0x1d0
[   25.741671]  ret_from_fork_asm+0x1a/0x30
[   25.741846] 
[   25.741931] The buggy address belongs to the object at ffff888100aaa000
[   25.741931]  which belongs to the cache kmalloc-64 of size 64
[   25.742949] The buggy address is located 0 bytes to the right of
[   25.742949]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.743901] 
[   25.744135] The buggy address belongs to the physical page:
[   25.744551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.745075] flags: 0x200000000000000(node=0|zone=2)
[   25.745310] page_type: f5(slab)
[   25.745469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.745770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.746323] page dumped because: kasan: bad access detected
[   25.746672] 
[   25.746887] Memory state around the buggy address:
[   25.747311]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.747781]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.748257] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.748557]                                      ^
[   25.748746]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.749268]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.749705] ==================================================================
[   25.011692] ==================================================================
[   25.012107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   25.012465] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.012814] 
[   25.012923] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.012974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.012987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.013032] Call Trace:
[   25.013054]  <TASK>
[   25.013074]  dump_stack_lvl+0x73/0xb0
[   25.013104]  print_report+0xd1/0x650
[   25.013128]  ? __virt_addr_valid+0x1db/0x2d0
[   25.013153]  ? kasan_atomics_helper+0xd47/0x5450
[   25.013175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.013202]  ? kasan_atomics_helper+0xd47/0x5450
[   25.013234]  kasan_report+0x141/0x180
[   25.013256]  ? kasan_atomics_helper+0xd47/0x5450
[   25.013281]  kasan_check_range+0x10c/0x1c0
[   25.013306]  __kasan_check_write+0x18/0x20
[   25.013329]  kasan_atomics_helper+0xd47/0x5450
[   25.013352]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.013378]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.013404]  ? kasan_atomics+0x152/0x310
[   25.013431]  kasan_atomics+0x1dc/0x310
[   25.013454]  ? __pfx_kasan_atomics+0x10/0x10
[   25.013477]  ? trace_hardirqs_on+0x37/0xe0
[   25.013502]  ? __pfx_read_tsc+0x10/0x10
[   25.013524]  ? ktime_get_ts64+0x86/0x230
[   25.013550]  kunit_try_run_case+0x1a5/0x480
[   25.013575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.013600]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.013628]  ? __kthread_parkme+0x82/0x180
[   25.013650]  ? preempt_count_sub+0x50/0x80
[   25.013674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.013699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.013723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.013748]  kthread+0x337/0x6f0
[   25.013770]  ? trace_preempt_on+0x20/0xc0
[   25.013792]  ? __pfx_kthread+0x10/0x10
[   25.013814]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.013838]  ? calculate_sigpending+0x7b/0xa0
[   25.013863]  ? __pfx_kthread+0x10/0x10
[   25.013885]  ret_from_fork+0x116/0x1d0
[   25.013905]  ? __pfx_kthread+0x10/0x10
[   25.013926]  ret_from_fork_asm+0x1a/0x30
[   25.013958]  </TASK>
[   25.013970] 
[   25.020878] Allocated by task 294:
[   25.021029]  kasan_save_stack+0x45/0x70
[   25.021233]  kasan_save_track+0x18/0x40
[   25.021412]  kasan_save_alloc_info+0x3b/0x50
[   25.021618]  __kasan_kmalloc+0xb7/0xc0
[   25.021796]  __kmalloc_cache_noprof+0x189/0x420
[   25.022023]  kasan_atomics+0x95/0x310
[   25.022202]  kunit_try_run_case+0x1a5/0x480
[   25.022410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.022656]  kthread+0x337/0x6f0
[   25.022820]  ret_from_fork+0x116/0x1d0
[   25.022999]  ret_from_fork_asm+0x1a/0x30
[   25.023207] 
[   25.023307] The buggy address belongs to the object at ffff888100aaa000
[   25.023307]  which belongs to the cache kmalloc-64 of size 64
[   25.023668] The buggy address is located 0 bytes to the right of
[   25.023668]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.024038] 
[   25.024134] The buggy address belongs to the physical page:
[   25.024391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.024752] flags: 0x200000000000000(node=0|zone=2)
[   25.024985] page_type: f5(slab)
[   25.025176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.025532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.025863] page dumped because: kasan: bad access detected
[   25.026101] 
[   25.026165] Memory state around the buggy address:
[   25.026352]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.026662]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.026940] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.027241]                                      ^
[   25.027461]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.027735]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.028023] ==================================================================
[   24.727362] ==================================================================
[   24.727713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   24.728434] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.728827] 
[   24.728975] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.729030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.729056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.729083] Call Trace:
[   24.729133]  <TASK>
[   24.729155]  dump_stack_lvl+0x73/0xb0
[   24.729185]  print_report+0xd1/0x650
[   24.729230]  ? __virt_addr_valid+0x1db/0x2d0
[   24.729255]  ? kasan_atomics_helper+0x4a0/0x5450
[   24.729277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.729304]  ? kasan_atomics_helper+0x4a0/0x5450
[   24.729326]  kasan_report+0x141/0x180
[   24.729348]  ? kasan_atomics_helper+0x4a0/0x5450
[   24.729374]  kasan_check_range+0x10c/0x1c0
[   24.729398]  __kasan_check_write+0x18/0x20
[   24.729421]  kasan_atomics_helper+0x4a0/0x5450
[   24.729444]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.729470]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.729510]  ? kasan_atomics+0x152/0x310
[   24.729538]  kasan_atomics+0x1dc/0x310
[   24.729562]  ? __pfx_kasan_atomics+0x10/0x10
[   24.729584]  ? trace_hardirqs_on+0x37/0xe0
[   24.729608]  ? __pfx_read_tsc+0x10/0x10
[   24.729631]  ? ktime_get_ts64+0x86/0x230
[   24.729657]  kunit_try_run_case+0x1a5/0x480
[   24.729684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.729710]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.729737]  ? __kthread_parkme+0x82/0x180
[   24.729758]  ? preempt_count_sub+0x50/0x80
[   24.729782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.729808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.729833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.729858]  kthread+0x337/0x6f0
[   24.729879]  ? trace_preempt_on+0x20/0xc0
[   24.729901]  ? __pfx_kthread+0x10/0x10
[   24.729922]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.729947]  ? calculate_sigpending+0x7b/0xa0
[   24.729972]  ? __pfx_kthread+0x10/0x10
[   24.729994]  ret_from_fork+0x116/0x1d0
[   24.730051]  ? __pfx_kthread+0x10/0x10
[   24.730073]  ret_from_fork_asm+0x1a/0x30
[   24.730134]  </TASK>
[   24.730146] 
[   24.737758] Allocated by task 294:
[   24.737888]  kasan_save_stack+0x45/0x70
[   24.738054]  kasan_save_track+0x18/0x40
[   24.738258]  kasan_save_alloc_info+0x3b/0x50
[   24.738546]  __kasan_kmalloc+0xb7/0xc0
[   24.738779]  __kmalloc_cache_noprof+0x189/0x420
[   24.739000]  kasan_atomics+0x95/0x310
[   24.739237]  kunit_try_run_case+0x1a5/0x480
[   24.739486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.739725]  kthread+0x337/0x6f0
[   24.739844]  ret_from_fork+0x116/0x1d0
[   24.739999]  ret_from_fork_asm+0x1a/0x30
[   24.740190] 
[   24.740322] The buggy address belongs to the object at ffff888100aaa000
[   24.740322]  which belongs to the cache kmalloc-64 of size 64
[   24.741014] The buggy address is located 0 bytes to the right of
[   24.741014]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.741448] 
[   24.741528] The buggy address belongs to the physical page:
[   24.741785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.742296] flags: 0x200000000000000(node=0|zone=2)
[   24.742623] page_type: f5(slab)
[   24.742780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.743056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.743442] page dumped because: kasan: bad access detected
[   24.743757] 
[   24.743862] Memory state around the buggy address:
[   24.744015]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.744353]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.744706] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.744917]                                      ^
[   24.745359]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.745662]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.745873] ==================================================================
[   24.852246] ==================================================================
[   24.852551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   24.853014] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.853320] 
[   24.853432] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.853482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.853496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.853520] Call Trace:
[   24.853541]  <TASK>
[   24.853560]  dump_stack_lvl+0x73/0xb0
[   24.853588]  print_report+0xd1/0x650
[   24.853611]  ? __virt_addr_valid+0x1db/0x2d0
[   24.853636]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.853658]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.853684]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.853706]  kasan_report+0x141/0x180
[   24.853728]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.853753]  kasan_check_range+0x10c/0x1c0
[   24.853778]  __kasan_check_write+0x18/0x20
[   24.853801]  kasan_atomics_helper+0x7c7/0x5450
[   24.853824]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.853850]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.853876]  ? kasan_atomics+0x152/0x310
[   24.853903]  kasan_atomics+0x1dc/0x310
[   24.853926]  ? __pfx_kasan_atomics+0x10/0x10
[   24.853949]  ? trace_hardirqs_on+0x37/0xe0
[   24.853972]  ? __pfx_read_tsc+0x10/0x10
[   24.853995]  ? ktime_get_ts64+0x86/0x230
[   24.854029]  kunit_try_run_case+0x1a5/0x480
[   24.854055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.854080]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.854107]  ? __kthread_parkme+0x82/0x180
[   24.854128]  ? preempt_count_sub+0x50/0x80
[   24.854153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.854177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.854202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.854236]  kthread+0x337/0x6f0
[   24.854257]  ? trace_preempt_on+0x20/0xc0
[   24.854279]  ? __pfx_kthread+0x10/0x10
[   24.854301]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.854326]  ? calculate_sigpending+0x7b/0xa0
[   24.854350]  ? __pfx_kthread+0x10/0x10
[   24.854372]  ret_from_fork+0x116/0x1d0
[   24.854392]  ? __pfx_kthread+0x10/0x10
[   24.854413]  ret_from_fork_asm+0x1a/0x30
[   24.854446]  </TASK>
[   24.854459] 
[   24.861210] Allocated by task 294:
[   24.861398]  kasan_save_stack+0x45/0x70
[   24.861593]  kasan_save_track+0x18/0x40
[   24.861782]  kasan_save_alloc_info+0x3b/0x50
[   24.861995]  __kasan_kmalloc+0xb7/0xc0
[   24.862183]  __kmalloc_cache_noprof+0x189/0x420
[   24.862385]  kasan_atomics+0x95/0x310
[   24.862552]  kunit_try_run_case+0x1a5/0x480
[   24.862719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.862930]  kthread+0x337/0x6f0
[   24.863143]  ret_from_fork+0x116/0x1d0
[   24.863343]  ret_from_fork_asm+0x1a/0x30
[   24.863511] 
[   24.863600] The buggy address belongs to the object at ffff888100aaa000
[   24.863600]  which belongs to the cache kmalloc-64 of size 64
[   24.863961] The buggy address is located 0 bytes to the right of
[   24.863961]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.864834] 
[   24.864909] The buggy address belongs to the physical page:
[   24.865154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.865479] flags: 0x200000000000000(node=0|zone=2)
[   24.865710] page_type: f5(slab)
[   24.865860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.866213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.866481] page dumped because: kasan: bad access detected
[   24.866650] 
[   24.866713] Memory state around the buggy address:
[   24.866863]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.867115]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.867705] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.868014]                                      ^
[   24.868240]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.868563]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.868804] ==================================================================
[   24.958377] ==================================================================
[   24.958733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   24.959067] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.959381] 
[   24.959497] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.959548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.959562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.959586] Call Trace:
[   24.959610]  <TASK>
[   24.959630]  dump_stack_lvl+0x73/0xb0
[   24.959661]  print_report+0xd1/0x650
[   24.959684]  ? __virt_addr_valid+0x1db/0x2d0
[   24.959708]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.959730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.959757]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.959778]  kasan_report+0x141/0x180
[   24.959802]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.959827]  kasan_check_range+0x10c/0x1c0
[   24.959850]  __kasan_check_write+0x18/0x20
[   24.959875]  kasan_atomics_helper+0xb6a/0x5450
[   24.959897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.959923]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.959950]  ? kasan_atomics+0x152/0x310
[   24.959977]  kasan_atomics+0x1dc/0x310
[   24.960000]  ? __pfx_kasan_atomics+0x10/0x10
[   24.960023]  ? trace_hardirqs_on+0x37/0xe0
[   24.960047]  ? __pfx_read_tsc+0x10/0x10
[   24.960071]  ? ktime_get_ts64+0x86/0x230
[   24.960096]  kunit_try_run_case+0x1a5/0x480
[   24.960121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.960147]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.960174]  ? __kthread_parkme+0x82/0x180
[   24.960196]  ? preempt_count_sub+0x50/0x80
[   24.960231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.960257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.960283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.960308]  kthread+0x337/0x6f0
[   24.960330]  ? trace_preempt_on+0x20/0xc0
[   24.960354]  ? __pfx_kthread+0x10/0x10
[   24.960374]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.960399]  ? calculate_sigpending+0x7b/0xa0
[   24.960425]  ? __pfx_kthread+0x10/0x10
[   24.960447]  ret_from_fork+0x116/0x1d0
[   24.960467]  ? __pfx_kthread+0x10/0x10
[   24.960489]  ret_from_fork_asm+0x1a/0x30
[   24.960521]  </TASK>
[   24.960532] 
[   24.967854] Allocated by task 294:
[   24.968042]  kasan_save_stack+0x45/0x70
[   24.968246]  kasan_save_track+0x18/0x40
[   24.968382]  kasan_save_alloc_info+0x3b/0x50
[   24.968525]  __kasan_kmalloc+0xb7/0xc0
[   24.968650]  __kmalloc_cache_noprof+0x189/0x420
[   24.968798]  kasan_atomics+0x95/0x310
[   24.968924]  kunit_try_run_case+0x1a5/0x480
[   24.969064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.969261]  kthread+0x337/0x6f0
[   24.969432]  ret_from_fork+0x116/0x1d0
[   24.969616]  ret_from_fork_asm+0x1a/0x30
[   24.969809] 
[   24.969905] The buggy address belongs to the object at ffff888100aaa000
[   24.969905]  which belongs to the cache kmalloc-64 of size 64
[   24.970596] The buggy address is located 0 bytes to the right of
[   24.970596]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.970959] 
[   24.971037] The buggy address belongs to the physical page:
[   24.971552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.971908] flags: 0x200000000000000(node=0|zone=2)
[   24.972146] page_type: f5(slab)
[   24.972319] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.972612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.972850] page dumped because: kasan: bad access detected
[   24.973017] 
[   24.973081] Memory state around the buggy address:
[   24.973242]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.973454]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.973972] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.974488]                                      ^
[   24.974713]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.975039]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.975377] ==================================================================
[   25.751388] ==================================================================
[   25.751717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   25.752296] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.752824] 
[   25.752932] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.752986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.753000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.753025] Call Trace:
[   25.753047]  <TASK>
[   25.753069]  dump_stack_lvl+0x73/0xb0
[   25.753101]  print_report+0xd1/0x650
[   25.753125]  ? __virt_addr_valid+0x1db/0x2d0
[   25.753150]  ? kasan_atomics_helper+0x1f43/0x5450
[   25.753172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.753200]  ? kasan_atomics_helper+0x1f43/0x5450
[   25.753238]  kasan_report+0x141/0x180
[   25.753262]  ? kasan_atomics_helper+0x1f43/0x5450
[   25.753288]  kasan_check_range+0x10c/0x1c0
[   25.753312]  __kasan_check_write+0x18/0x20
[   25.753336]  kasan_atomics_helper+0x1f43/0x5450
[   25.753360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.753387]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.753413]  ? kasan_atomics+0x152/0x310
[   25.753442]  kasan_atomics+0x1dc/0x310
[   25.753464]  ? __pfx_kasan_atomics+0x10/0x10
[   25.753486]  ? trace_hardirqs_on+0x37/0xe0
[   25.753511]  ? __pfx_read_tsc+0x10/0x10
[   25.753534]  ? ktime_get_ts64+0x86/0x230
[   25.753560]  kunit_try_run_case+0x1a5/0x480
[   25.753586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.753611]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.753639]  ? __kthread_parkme+0x82/0x180
[   25.753661]  ? preempt_count_sub+0x50/0x80
[   25.753685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.753710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.753734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.753759]  kthread+0x337/0x6f0
[   25.753780]  ? trace_preempt_on+0x20/0xc0
[   25.753802]  ? __pfx_kthread+0x10/0x10
[   25.753824]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.753848]  ? calculate_sigpending+0x7b/0xa0
[   25.753873]  ? __pfx_kthread+0x10/0x10
[   25.753895]  ret_from_fork+0x116/0x1d0
[   25.753914]  ? __pfx_kthread+0x10/0x10
[   25.753935]  ret_from_fork_asm+0x1a/0x30
[   25.753968]  </TASK>
[   25.753981] 
[   25.760999] Allocated by task 294:
[   25.761131]  kasan_save_stack+0x45/0x70
[   25.761281]  kasan_save_track+0x18/0x40
[   25.761469]  kasan_save_alloc_info+0x3b/0x50
[   25.761672]  __kasan_kmalloc+0xb7/0xc0
[   25.761850]  __kmalloc_cache_noprof+0x189/0x420
[   25.762145]  kasan_atomics+0x95/0x310
[   25.762339]  kunit_try_run_case+0x1a5/0x480
[   25.762489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.762659]  kthread+0x337/0x6f0
[   25.762774]  ret_from_fork+0x116/0x1d0
[   25.762950]  ret_from_fork_asm+0x1a/0x30
[   25.763303] 
[   25.763407] The buggy address belongs to the object at ffff888100aaa000
[   25.763407]  which belongs to the cache kmalloc-64 of size 64
[   25.763912] The buggy address is located 0 bytes to the right of
[   25.763912]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.764371] 
[   25.764443] The buggy address belongs to the physical page:
[   25.764611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.764894] flags: 0x200000000000000(node=0|zone=2)
[   25.765122] page_type: f5(slab)
[   25.765297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.765639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.765967] page dumped because: kasan: bad access detected
[   25.766210] 
[   25.766285] Memory state around the buggy address:
[   25.766435]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.766645]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.766888] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.767462]                                      ^
[   25.767690]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.768005]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.768335] ==================================================================
[   25.787169] ==================================================================
[   25.787538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   25.788397] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.788638] 
[   25.788728] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.788789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.788803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.788828] Call Trace:
[   25.788850]  <TASK>
[   25.788873]  dump_stack_lvl+0x73/0xb0
[   25.788905]  print_report+0xd1/0x650
[   25.788929]  ? __virt_addr_valid+0x1db/0x2d0
[   25.788955]  ? kasan_atomics_helper+0x2006/0x5450
[   25.788977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.789003]  ? kasan_atomics_helper+0x2006/0x5450
[   25.789026]  kasan_report+0x141/0x180
[   25.789048]  ? kasan_atomics_helper+0x2006/0x5450
[   25.789075]  kasan_check_range+0x10c/0x1c0
[   25.789099]  __kasan_check_write+0x18/0x20
[   25.789123]  kasan_atomics_helper+0x2006/0x5450
[   25.789146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.789172]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.789198]  ? kasan_atomics+0x152/0x310
[   25.789245]  kasan_atomics+0x1dc/0x310
[   25.789269]  ? __pfx_kasan_atomics+0x10/0x10
[   25.789292]  ? trace_hardirqs_on+0x37/0xe0
[   25.789316]  ? __pfx_read_tsc+0x10/0x10
[   25.789340]  ? ktime_get_ts64+0x86/0x230
[   25.789366]  kunit_try_run_case+0x1a5/0x480
[   25.789392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.789417]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.789444]  ? __kthread_parkme+0x82/0x180
[   25.789465]  ? preempt_count_sub+0x50/0x80
[   25.789489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.789514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.789538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.789563]  kthread+0x337/0x6f0
[   25.789584]  ? trace_preempt_on+0x20/0xc0
[   25.789607]  ? __pfx_kthread+0x10/0x10
[   25.789628]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.789652]  ? calculate_sigpending+0x7b/0xa0
[   25.789678]  ? __pfx_kthread+0x10/0x10
[   25.789699]  ret_from_fork+0x116/0x1d0
[   25.789719]  ? __pfx_kthread+0x10/0x10
[   25.789740]  ret_from_fork_asm+0x1a/0x30
[   25.789773]  </TASK>
[   25.789785] 
[   25.797185] Allocated by task 294:
[   25.797375]  kasan_save_stack+0x45/0x70
[   25.797555]  kasan_save_track+0x18/0x40
[   25.797713]  kasan_save_alloc_info+0x3b/0x50
[   25.797856]  __kasan_kmalloc+0xb7/0xc0
[   25.797981]  __kmalloc_cache_noprof+0x189/0x420
[   25.798130]  kasan_atomics+0x95/0x310
[   25.798288]  kunit_try_run_case+0x1a5/0x480
[   25.798489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.799038]  kthread+0x337/0x6f0
[   25.799187]  ret_from_fork+0x116/0x1d0
[   25.799320]  ret_from_fork_asm+0x1a/0x30
[   25.799448] 
[   25.799513] The buggy address belongs to the object at ffff888100aaa000
[   25.799513]  which belongs to the cache kmalloc-64 of size 64
[   25.799872] The buggy address is located 0 bytes to the right of
[   25.799872]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.800811] 
[   25.800904] The buggy address belongs to the physical page:
[   25.801123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.801417] flags: 0x200000000000000(node=0|zone=2)
[   25.801632] page_type: f5(slab)
[   25.801781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.802086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.802395] page dumped because: kasan: bad access detected
[   25.802628] 
[   25.802707] Memory state around the buggy address:
[   25.802892]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.803255]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.803531] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.803785]                                      ^
[   25.803982]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.804251]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.804447] ==================================================================
[   24.666977] ==================================================================
[   24.667323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   24.667692] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.668146] 
[   24.668352] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.668414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.668429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.668458] Call Trace:
[   24.668482]  <TASK>
[   24.668504]  dump_stack_lvl+0x73/0xb0
[   24.668571]  print_report+0xd1/0x650
[   24.668596]  ? __virt_addr_valid+0x1db/0x2d0
[   24.668662]  ? kasan_atomics_helper+0x4b6e/0x5450
[   24.668684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.668722]  ? kasan_atomics_helper+0x4b6e/0x5450
[   24.668746]  kasan_report+0x141/0x180
[   24.668769]  ? kasan_atomics_helper+0x4b6e/0x5450
[   24.668796]  __asan_report_store4_noabort+0x1b/0x30
[   24.668822]  kasan_atomics_helper+0x4b6e/0x5450
[   24.668845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.668871]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.668897]  ? kasan_atomics+0x152/0x310
[   24.668924]  kasan_atomics+0x1dc/0x310
[   24.668947]  ? __pfx_kasan_atomics+0x10/0x10
[   24.668970]  ? trace_hardirqs_on+0x37/0xe0
[   24.668994]  ? __pfx_read_tsc+0x10/0x10
[   24.669026]  ? ktime_get_ts64+0x86/0x230
[   24.669052]  kunit_try_run_case+0x1a5/0x480
[   24.669078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.669103]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.669130]  ? __kthread_parkme+0x82/0x180
[   24.669152]  ? preempt_count_sub+0x50/0x80
[   24.669177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.669201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.669237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.669262]  kthread+0x337/0x6f0
[   24.669283]  ? trace_preempt_on+0x20/0xc0
[   24.669306]  ? __pfx_kthread+0x10/0x10
[   24.669327]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.669352]  ? calculate_sigpending+0x7b/0xa0
[   24.669377]  ? __pfx_kthread+0x10/0x10
[   24.669399]  ret_from_fork+0x116/0x1d0
[   24.669419]  ? __pfx_kthread+0x10/0x10
[   24.669440]  ret_from_fork_asm+0x1a/0x30
[   24.669473]  </TASK>
[   24.669486] 
[   24.678289] Allocated by task 294:
[   24.678528]  kasan_save_stack+0x45/0x70
[   24.678735]  kasan_save_track+0x18/0x40
[   24.678988]  kasan_save_alloc_info+0x3b/0x50
[   24.679190]  __kasan_kmalloc+0xb7/0xc0
[   24.679331]  __kmalloc_cache_noprof+0x189/0x420
[   24.679483]  kasan_atomics+0x95/0x310
[   24.679647]  kunit_try_run_case+0x1a5/0x480
[   24.679837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.680157]  kthread+0x337/0x6f0
[   24.680460]  ret_from_fork+0x116/0x1d0
[   24.680799]  ret_from_fork_asm+0x1a/0x30
[   24.680949] 
[   24.681149] The buggy address belongs to the object at ffff888100aaa000
[   24.681149]  which belongs to the cache kmalloc-64 of size 64
[   24.681600] The buggy address is located 0 bytes to the right of
[   24.681600]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.682152] 
[   24.682328] The buggy address belongs to the physical page:
[   24.682672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.683004] flags: 0x200000000000000(node=0|zone=2)
[   24.683297] page_type: f5(slab)
[   24.683423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.683693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.684029] page dumped because: kasan: bad access detected
[   24.684559] 
[   24.684706] Memory state around the buggy address:
[   24.684912]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.685249]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.685692] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.685945]                                      ^
[   24.686347]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.686728]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.687081] ==================================================================
[   25.140674] ==================================================================
[   25.141428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   25.141816] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.142191] 
[   25.142363] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.142417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.142431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.142456] Call Trace:
[   25.142479]  <TASK>
[   25.142502]  dump_stack_lvl+0x73/0xb0
[   25.142534]  print_report+0xd1/0x650
[   25.142558]  ? __virt_addr_valid+0x1db/0x2d0
[   25.142584]  ? kasan_atomics_helper+0x1079/0x5450
[   25.142619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.142649]  ? kasan_atomics_helper+0x1079/0x5450
[   25.142672]  kasan_report+0x141/0x180
[   25.142707]  ? kasan_atomics_helper+0x1079/0x5450
[   25.142735]  kasan_check_range+0x10c/0x1c0
[   25.142759]  __kasan_check_write+0x18/0x20
[   25.142782]  kasan_atomics_helper+0x1079/0x5450
[   25.142805]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.142834]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.142861]  ? kasan_atomics+0x152/0x310
[   25.142888]  kasan_atomics+0x1dc/0x310
[   25.142912]  ? __pfx_kasan_atomics+0x10/0x10
[   25.142936]  ? trace_hardirqs_on+0x37/0xe0
[   25.142960]  ? __pfx_read_tsc+0x10/0x10
[   25.142985]  ? ktime_get_ts64+0x86/0x230
[   25.143013]  kunit_try_run_case+0x1a5/0x480
[   25.143060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.143086]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.143114]  ? __kthread_parkme+0x82/0x180
[   25.143136]  ? preempt_count_sub+0x50/0x80
[   25.143161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.143186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.143211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.143247]  kthread+0x337/0x6f0
[   25.143268]  ? trace_preempt_on+0x20/0xc0
[   25.143291]  ? __pfx_kthread+0x10/0x10
[   25.143313]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.143338]  ? calculate_sigpending+0x7b/0xa0
[   25.143363]  ? __pfx_kthread+0x10/0x10
[   25.143384]  ret_from_fork+0x116/0x1d0
[   25.143405]  ? __pfx_kthread+0x10/0x10
[   25.143426]  ret_from_fork_asm+0x1a/0x30
[   25.143458]  </TASK>
[   25.143471] 
[   25.152209] Allocated by task 294:
[   25.152597]  kasan_save_stack+0x45/0x70
[   25.152915]  kasan_save_track+0x18/0x40
[   25.153247]  kasan_save_alloc_info+0x3b/0x50
[   25.153438]  __kasan_kmalloc+0xb7/0xc0
[   25.153609]  __kmalloc_cache_noprof+0x189/0x420
[   25.153805]  kasan_atomics+0x95/0x310
[   25.153965]  kunit_try_run_case+0x1a5/0x480
[   25.154415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.154856]  kthread+0x337/0x6f0
[   25.155390]  ret_from_fork+0x116/0x1d0
[   25.155600]  ret_from_fork_asm+0x1a/0x30
[   25.155779] 
[   25.155863] The buggy address belongs to the object at ffff888100aaa000
[   25.155863]  which belongs to the cache kmalloc-64 of size 64
[   25.156688] The buggy address is located 0 bytes to the right of
[   25.156688]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.157529] 
[   25.157722] The buggy address belongs to the physical page:
[   25.158343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.158986] flags: 0x200000000000000(node=0|zone=2)
[   25.159393] page_type: f5(slab)
[   25.159696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.160559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.160998] page dumped because: kasan: bad access detected
[   25.161448] 
[   25.161691] Memory state around the buggy address:
[   25.162140]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.162648]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.163437] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.164175]                                      ^
[   25.164493]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.165109]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.165633] ==================================================================
[   25.257528] ==================================================================
[   25.258107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   25.258481] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.258785] 
[   25.258872] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.258926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.258940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.258963] Call Trace:
[   25.258984]  <TASK>
[   25.259005]  dump_stack_lvl+0x73/0xb0
[   25.259051]  print_report+0xd1/0x650
[   25.259075]  ? __virt_addr_valid+0x1db/0x2d0
[   25.259099]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.259121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.259148]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.259171]  kasan_report+0x141/0x180
[   25.259194]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.259230]  kasan_check_range+0x10c/0x1c0
[   25.259254]  __kasan_check_write+0x18/0x20
[   25.259279]  kasan_atomics_helper+0x12e6/0x5450
[   25.259302]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.259328]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.259355]  ? kasan_atomics+0x152/0x310
[   25.259382]  kasan_atomics+0x1dc/0x310
[   25.259405]  ? __pfx_kasan_atomics+0x10/0x10
[   25.259428]  ? trace_hardirqs_on+0x37/0xe0
[   25.259452]  ? __pfx_read_tsc+0x10/0x10
[   25.259475]  ? ktime_get_ts64+0x86/0x230
[   25.259501]  kunit_try_run_case+0x1a5/0x480
[   25.259526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.259551]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.259579]  ? __kthread_parkme+0x82/0x180
[   25.259600]  ? preempt_count_sub+0x50/0x80
[   25.259625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.259650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.259674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.259699]  kthread+0x337/0x6f0
[   25.259720]  ? trace_preempt_on+0x20/0xc0
[   25.259743]  ? __pfx_kthread+0x10/0x10
[   25.259764]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.259789]  ? calculate_sigpending+0x7b/0xa0
[   25.259814]  ? __pfx_kthread+0x10/0x10
[   25.259837]  ret_from_fork+0x116/0x1d0
[   25.259857]  ? __pfx_kthread+0x10/0x10
[   25.259878]  ret_from_fork_asm+0x1a/0x30
[   25.259911]  </TASK>
[   25.259923] 
[   25.267709] Allocated by task 294:
[   25.267897]  kasan_save_stack+0x45/0x70
[   25.268135]  kasan_save_track+0x18/0x40
[   25.268326]  kasan_save_alloc_info+0x3b/0x50
[   25.268528]  __kasan_kmalloc+0xb7/0xc0
[   25.268715]  __kmalloc_cache_noprof+0x189/0x420
[   25.268918]  kasan_atomics+0x95/0x310
[   25.269137]  kunit_try_run_case+0x1a5/0x480
[   25.269347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.269540]  kthread+0x337/0x6f0
[   25.269658]  ret_from_fork+0x116/0x1d0
[   25.269785]  ret_from_fork_asm+0x1a/0x30
[   25.269919] 
[   25.269985] The buggy address belongs to the object at ffff888100aaa000
[   25.269985]  which belongs to the cache kmalloc-64 of size 64
[   25.270559] The buggy address is located 0 bytes to the right of
[   25.270559]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.271322] 
[   25.271425] The buggy address belongs to the physical page:
[   25.271666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.272017] flags: 0x200000000000000(node=0|zone=2)
[   25.272212] page_type: f5(slab)
[   25.272343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.272567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.272909] page dumped because: kasan: bad access detected
[   25.273382] 
[   25.273462] Memory state around the buggy address:
[   25.273655]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.273961]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.274317] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.274570]                                      ^
[   25.274807]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.275118]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.275334] ==================================================================
[   25.866967] ==================================================================
[   25.867347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   25.867672] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.867948] 
[   25.868032] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.868081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.868094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.868118] Call Trace:
[   25.868138]  <TASK>
[   25.868158]  dump_stack_lvl+0x73/0xb0
[   25.868186]  print_report+0xd1/0x650
[   25.868209]  ? __virt_addr_valid+0x1db/0x2d0
[   25.868247]  ? kasan_atomics_helper+0x218a/0x5450
[   25.868269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.868295]  ? kasan_atomics_helper+0x218a/0x5450
[   25.868317]  kasan_report+0x141/0x180
[   25.868341]  ? kasan_atomics_helper+0x218a/0x5450
[   25.868367]  kasan_check_range+0x10c/0x1c0
[   25.868391]  __kasan_check_write+0x18/0x20
[   25.868416]  kasan_atomics_helper+0x218a/0x5450
[   25.868439]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.868465]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.868491]  ? kasan_atomics+0x152/0x310
[   25.868518]  kasan_atomics+0x1dc/0x310
[   25.868541]  ? __pfx_kasan_atomics+0x10/0x10
[   25.868564]  ? trace_hardirqs_on+0x37/0xe0
[   25.868588]  ? __pfx_read_tsc+0x10/0x10
[   25.868612]  ? ktime_get_ts64+0x86/0x230
[   25.868638]  kunit_try_run_case+0x1a5/0x480
[   25.868664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.868689]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.868717]  ? __kthread_parkme+0x82/0x180
[   25.868739]  ? preempt_count_sub+0x50/0x80
[   25.868764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.868789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.868813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.868838]  kthread+0x337/0x6f0
[   25.868859]  ? trace_preempt_on+0x20/0xc0
[   25.868882]  ? __pfx_kthread+0x10/0x10
[   25.868904]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.868929]  ? calculate_sigpending+0x7b/0xa0
[   25.868954]  ? __pfx_kthread+0x10/0x10
[   25.868977]  ret_from_fork+0x116/0x1d0
[   25.868996]  ? __pfx_kthread+0x10/0x10
[   25.869017]  ret_from_fork_asm+0x1a/0x30
[   25.869059]  </TASK>
[   25.869071] 
[   25.876403] Allocated by task 294:
[   25.876544]  kasan_save_stack+0x45/0x70
[   25.876747]  kasan_save_track+0x18/0x40
[   25.876911]  kasan_save_alloc_info+0x3b/0x50
[   25.877129]  __kasan_kmalloc+0xb7/0xc0
[   25.877296]  __kmalloc_cache_noprof+0x189/0x420
[   25.877481]  kasan_atomics+0x95/0x310
[   25.877636]  kunit_try_run_case+0x1a5/0x480
[   25.877823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.878046]  kthread+0x337/0x6f0
[   25.878174]  ret_from_fork+0x116/0x1d0
[   25.878313]  ret_from_fork_asm+0x1a/0x30
[   25.878450] 
[   25.878515] The buggy address belongs to the object at ffff888100aaa000
[   25.878515]  which belongs to the cache kmalloc-64 of size 64
[   25.878860] The buggy address is located 0 bytes to the right of
[   25.878860]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.879508] 
[   25.879606] The buggy address belongs to the physical page:
[   25.879859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.880204] flags: 0x200000000000000(node=0|zone=2)
[   25.880442] page_type: f5(slab)
[   25.880561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.880786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.881007] page dumped because: kasan: bad access detected
[   25.881175] 
[   25.881249] Memory state around the buggy address:
[   25.881482]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.881799]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.882197] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.882522]                                      ^
[   25.882756]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.883131]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.883455] ==================================================================
[   25.884243] ==================================================================
[   25.884563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   25.884851] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.885201] 
[   25.885327] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.885378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.885391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.885418] Call Trace:
[   25.885440]  <TASK>
[   25.885461]  dump_stack_lvl+0x73/0xb0
[   25.885490]  print_report+0xd1/0x650
[   25.885513]  ? __virt_addr_valid+0x1db/0x2d0
[   25.885538]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.885560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.885587]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.885609]  kasan_report+0x141/0x180
[   25.885632]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.885658]  __asan_report_load8_noabort+0x18/0x20
[   25.885683]  kasan_atomics_helper+0x4fa5/0x5450
[   25.885706]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.885732]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.885758]  ? kasan_atomics+0x152/0x310
[   25.885785]  kasan_atomics+0x1dc/0x310
[   25.885809]  ? __pfx_kasan_atomics+0x10/0x10
[   25.885831]  ? trace_hardirqs_on+0x37/0xe0
[   25.885855]  ? __pfx_read_tsc+0x10/0x10
[   25.885878]  ? ktime_get_ts64+0x86/0x230
[   25.885904]  kunit_try_run_case+0x1a5/0x480
[   25.885930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.885956]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.885984]  ? __kthread_parkme+0x82/0x180
[   25.886006]  ? preempt_count_sub+0x50/0x80
[   25.886030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.886055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.886080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.886104]  kthread+0x337/0x6f0
[   25.886125]  ? trace_preempt_on+0x20/0xc0
[   25.886147]  ? __pfx_kthread+0x10/0x10
[   25.886169]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.886194]  ? calculate_sigpending+0x7b/0xa0
[   25.886230]  ? __pfx_kthread+0x10/0x10
[   25.886256]  ret_from_fork+0x116/0x1d0
[   25.886278]  ? __pfx_kthread+0x10/0x10
[   25.886298]  ret_from_fork_asm+0x1a/0x30
[   25.886331]  </TASK>
[   25.886343] 
[   25.893460] Allocated by task 294:
[   25.893591]  kasan_save_stack+0x45/0x70
[   25.893730]  kasan_save_track+0x18/0x40
[   25.893869]  kasan_save_alloc_info+0x3b/0x50
[   25.894120]  __kasan_kmalloc+0xb7/0xc0
[   25.894314]  __kmalloc_cache_noprof+0x189/0x420
[   25.894533]  kasan_atomics+0x95/0x310
[   25.894723]  kunit_try_run_case+0x1a5/0x480
[   25.894907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.895260]  kthread+0x337/0x6f0
[   25.895396]  ret_from_fork+0x116/0x1d0
[   25.895524]  ret_from_fork_asm+0x1a/0x30
[   25.895657] 
[   25.895723] The buggy address belongs to the object at ffff888100aaa000
[   25.895723]  which belongs to the cache kmalloc-64 of size 64
[   25.896195] The buggy address is located 0 bytes to the right of
[   25.896195]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.896759] 
[   25.896856] The buggy address belongs to the physical page:
[   25.897204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.897509] flags: 0x200000000000000(node=0|zone=2)
[   25.897671] page_type: f5(slab)
[   25.897796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.898026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.898381] page dumped because: kasan: bad access detected
[   25.898637] 
[   25.898725] Memory state around the buggy address:
[   25.898951]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.899439]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.899695] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.899984]                                      ^
[   25.900237]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.900504]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.900763] ==================================================================
[   25.239385] ==================================================================
[   25.239977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   25.240703] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.241105] 
[   25.241191] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.241250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.241275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.241300] Call Trace:
[   25.241321]  <TASK>
[   25.241349]  dump_stack_lvl+0x73/0xb0
[   25.241380]  print_report+0xd1/0x650
[   25.241403]  ? __virt_addr_valid+0x1db/0x2d0
[   25.241427]  ? kasan_atomics_helper+0x49e8/0x5450
[   25.241448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.241475]  ? kasan_atomics_helper+0x49e8/0x5450
[   25.241496]  kasan_report+0x141/0x180
[   25.241519]  ? kasan_atomics_helper+0x49e8/0x5450
[   25.241545]  __asan_report_load4_noabort+0x18/0x20
[   25.241570]  kasan_atomics_helper+0x49e8/0x5450
[   25.241593]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.241619]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.241644]  ? kasan_atomics+0x152/0x310
[   25.241671]  kasan_atomics+0x1dc/0x310
[   25.241696]  ? __pfx_kasan_atomics+0x10/0x10
[   25.241718]  ? trace_hardirqs_on+0x37/0xe0
[   25.241743]  ? __pfx_read_tsc+0x10/0x10
[   25.241765]  ? ktime_get_ts64+0x86/0x230
[   25.241790]  kunit_try_run_case+0x1a5/0x480
[   25.241816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.241841]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.241868]  ? __kthread_parkme+0x82/0x180
[   25.241889]  ? preempt_count_sub+0x50/0x80
[   25.241915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.241939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.241964]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.241989]  kthread+0x337/0x6f0
[   25.242009]  ? trace_preempt_on+0x20/0xc0
[   25.242043]  ? __pfx_kthread+0x10/0x10
[   25.242074]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.242099]  ? calculate_sigpending+0x7b/0xa0
[   25.242124]  ? __pfx_kthread+0x10/0x10
[   25.242164]  ret_from_fork+0x116/0x1d0
[   25.242185]  ? __pfx_kthread+0x10/0x10
[   25.242206]  ret_from_fork_asm+0x1a/0x30
[   25.242255]  </TASK>
[   25.242267] 
[   25.249345] Allocated by task 294:
[   25.249513]  kasan_save_stack+0x45/0x70
[   25.249671]  kasan_save_track+0x18/0x40
[   25.249848]  kasan_save_alloc_info+0x3b/0x50
[   25.250046]  __kasan_kmalloc+0xb7/0xc0
[   25.250243]  __kmalloc_cache_noprof+0x189/0x420
[   25.250463]  kasan_atomics+0x95/0x310
[   25.250664]  kunit_try_run_case+0x1a5/0x480
[   25.250828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.250999]  kthread+0x337/0x6f0
[   25.251179]  ret_from_fork+0x116/0x1d0
[   25.251373]  ret_from_fork_asm+0x1a/0x30
[   25.251595] 
[   25.251685] The buggy address belongs to the object at ffff888100aaa000
[   25.251685]  which belongs to the cache kmalloc-64 of size 64
[   25.252230] The buggy address is located 0 bytes to the right of
[   25.252230]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.252671] 
[   25.252764] The buggy address belongs to the physical page:
[   25.253044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.253370] flags: 0x200000000000000(node=0|zone=2)
[   25.253622] page_type: f5(slab)
[   25.253788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.254198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.254514] page dumped because: kasan: bad access detected
[   25.254763] 
[   25.254862] Memory state around the buggy address:
[   25.255130]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.255435]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.255655] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.255865]                                      ^
[   25.256013]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.256327]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.256779] ==================================================================
[   24.746544] ==================================================================
[   24.747216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   24.747595] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.747822] 
[   24.747906] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.747954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.747969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.747992] Call Trace:
[   24.748012]  <TASK>
[   24.748040]  dump_stack_lvl+0x73/0xb0
[   24.748070]  print_report+0xd1/0x650
[   24.748129]  ? __virt_addr_valid+0x1db/0x2d0
[   24.748154]  ? kasan_atomics_helper+0x4b3a/0x5450
[   24.748188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.748215]  ? kasan_atomics_helper+0x4b3a/0x5450
[   24.748247]  kasan_report+0x141/0x180
[   24.748270]  ? kasan_atomics_helper+0x4b3a/0x5450
[   24.748296]  __asan_report_store4_noabort+0x1b/0x30
[   24.748321]  kasan_atomics_helper+0x4b3a/0x5450
[   24.748345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.748372]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.748425]  ? kasan_atomics+0x152/0x310
[   24.748454]  kasan_atomics+0x1dc/0x310
[   24.748477]  ? __pfx_kasan_atomics+0x10/0x10
[   24.748511]  ? trace_hardirqs_on+0x37/0xe0
[   24.748535]  ? __pfx_read_tsc+0x10/0x10
[   24.748558]  ? ktime_get_ts64+0x86/0x230
[   24.748583]  kunit_try_run_case+0x1a5/0x480
[   24.748610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.748635]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.748662]  ? __kthread_parkme+0x82/0x180
[   24.748684]  ? preempt_count_sub+0x50/0x80
[   24.748708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.748733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.748758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.748783]  kthread+0x337/0x6f0
[   24.748804]  ? trace_preempt_on+0x20/0xc0
[   24.748857]  ? __pfx_kthread+0x10/0x10
[   24.748878]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.748925]  ? calculate_sigpending+0x7b/0xa0
[   24.748951]  ? __pfx_kthread+0x10/0x10
[   24.748973]  ret_from_fork+0x116/0x1d0
[   24.748994]  ? __pfx_kthread+0x10/0x10
[   24.749015]  ret_from_fork_asm+0x1a/0x30
[   24.749047]  </TASK>
[   24.749059] 
[   24.758631] Allocated by task 294:
[   24.758940]  kasan_save_stack+0x45/0x70
[   24.759188]  kasan_save_track+0x18/0x40
[   24.759355]  kasan_save_alloc_info+0x3b/0x50
[   24.759570]  __kasan_kmalloc+0xb7/0xc0
[   24.759734]  __kmalloc_cache_noprof+0x189/0x420
[   24.759950]  kasan_atomics+0x95/0x310
[   24.760537]  kunit_try_run_case+0x1a5/0x480
[   24.760754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.761134]  kthread+0x337/0x6f0
[   24.761321]  ret_from_fork+0x116/0x1d0
[   24.761490]  ret_from_fork_asm+0x1a/0x30
[   24.761688] 
[   24.761760] The buggy address belongs to the object at ffff888100aaa000
[   24.761760]  which belongs to the cache kmalloc-64 of size 64
[   24.762657] The buggy address is located 0 bytes to the right of
[   24.762657]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.763491] 
[   24.763587] The buggy address belongs to the physical page:
[   24.763910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.764436] flags: 0x200000000000000(node=0|zone=2)
[   24.764682] page_type: f5(slab)
[   24.764843] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.765406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.765742] page dumped because: kasan: bad access detected
[   24.765974] 
[   24.766053] Memory state around the buggy address:
[   24.766279]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.766584]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.766890] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.767227]                                      ^
[   24.767438]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.767751]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.768055] ==================================================================
[   25.166202] ==================================================================
[   25.166498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   25.166817] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.167171] 
[   25.167306] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.167357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.167381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.167406] Call Trace:
[   25.167428]  <TASK>
[   25.167468]  dump_stack_lvl+0x73/0xb0
[   25.167498]  print_report+0xd1/0x650
[   25.167523]  ? __virt_addr_valid+0x1db/0x2d0
[   25.167559]  ? kasan_atomics_helper+0x4a1c/0x5450
[   25.167581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.167608]  ? kasan_atomics_helper+0x4a1c/0x5450
[   25.167629]  kasan_report+0x141/0x180
[   25.167653]  ? kasan_atomics_helper+0x4a1c/0x5450
[   25.167680]  __asan_report_load4_noabort+0x18/0x20
[   25.167714]  kasan_atomics_helper+0x4a1c/0x5450
[   25.167737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.167765]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.167802]  ? kasan_atomics+0x152/0x310
[   25.167829]  kasan_atomics+0x1dc/0x310
[   25.167852]  ? __pfx_kasan_atomics+0x10/0x10
[   25.167875]  ? trace_hardirqs_on+0x37/0xe0
[   25.167899]  ? __pfx_read_tsc+0x10/0x10
[   25.167923]  ? ktime_get_ts64+0x86/0x230
[   25.167949]  kunit_try_run_case+0x1a5/0x480
[   25.167974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.168008]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.168036]  ? __kthread_parkme+0x82/0x180
[   25.168058]  ? preempt_count_sub+0x50/0x80
[   25.168093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.168128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.168154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.168178]  kthread+0x337/0x6f0
[   25.168199]  ? trace_preempt_on+0x20/0xc0
[   25.168232]  ? __pfx_kthread+0x10/0x10
[   25.168253]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.168279]  ? calculate_sigpending+0x7b/0xa0
[   25.168305]  ? __pfx_kthread+0x10/0x10
[   25.168327]  ret_from_fork+0x116/0x1d0
[   25.168348]  ? __pfx_kthread+0x10/0x10
[   25.168369]  ret_from_fork_asm+0x1a/0x30
[   25.168401]  </TASK>
[   25.168415] 
[   25.175750] Allocated by task 294:
[   25.175884]  kasan_save_stack+0x45/0x70
[   25.176143]  kasan_save_track+0x18/0x40
[   25.176383]  kasan_save_alloc_info+0x3b/0x50
[   25.176569]  __kasan_kmalloc+0xb7/0xc0
[   25.176738]  __kmalloc_cache_noprof+0x189/0x420
[   25.176924]  kasan_atomics+0x95/0x310
[   25.177124]  kunit_try_run_case+0x1a5/0x480
[   25.177373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.177580]  kthread+0x337/0x6f0
[   25.177745]  ret_from_fork+0x116/0x1d0
[   25.177893]  ret_from_fork_asm+0x1a/0x30
[   25.178075] 
[   25.178147] The buggy address belongs to the object at ffff888100aaa000
[   25.178147]  which belongs to the cache kmalloc-64 of size 64
[   25.178741] The buggy address is located 0 bytes to the right of
[   25.178741]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.179284] 
[   25.179403] The buggy address belongs to the physical page:
[   25.179643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.179992] flags: 0x200000000000000(node=0|zone=2)
[   25.180211] page_type: f5(slab)
[   25.180406] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.180694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.181003] page dumped because: kasan: bad access detected
[   25.181172] 
[   25.181247] Memory state around the buggy address:
[   25.181397]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.181606]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.181874] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.182277]                                      ^
[   25.182522]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.182800]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.183007] ==================================================================
[   25.683242] ==================================================================
[   25.683593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   25.684146] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.684488] 
[   25.684600] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.684652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.684667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.684692] Call Trace:
[   25.684714]  <TASK>
[   25.684736]  dump_stack_lvl+0x73/0xb0
[   25.684766]  print_report+0xd1/0x650
[   25.684790]  ? __virt_addr_valid+0x1db/0x2d0
[   25.684814]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.684836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.684863]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.684886]  kasan_report+0x141/0x180
[   25.684908]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.684935]  kasan_check_range+0x10c/0x1c0
[   25.684959]  __kasan_check_write+0x18/0x20
[   25.684983]  kasan_atomics_helper+0x1d7a/0x5450
[   25.685006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.685032]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.685058]  ? kasan_atomics+0x152/0x310
[   25.685086]  kasan_atomics+0x1dc/0x310
[   25.685109]  ? __pfx_kasan_atomics+0x10/0x10
[   25.685135]  ? trace_hardirqs_on+0x37/0xe0
[   25.685159]  ? __pfx_read_tsc+0x10/0x10
[   25.685182]  ? ktime_get_ts64+0x86/0x230
[   25.685208]  kunit_try_run_case+0x1a5/0x480
[   25.685245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.685270]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.685297]  ? __kthread_parkme+0x82/0x180
[   25.685319]  ? preempt_count_sub+0x50/0x80
[   25.685344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.685369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.685394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.685418]  kthread+0x337/0x6f0
[   25.685440]  ? trace_preempt_on+0x20/0xc0
[   25.685462]  ? __pfx_kthread+0x10/0x10
[   25.685484]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.685509]  ? calculate_sigpending+0x7b/0xa0
[   25.685534]  ? __pfx_kthread+0x10/0x10
[   25.685556]  ret_from_fork+0x116/0x1d0
[   25.685577]  ? __pfx_kthread+0x10/0x10
[   25.685598]  ret_from_fork_asm+0x1a/0x30
[   25.685630]  </TASK>
[   25.685642] 
[   25.693050] Allocated by task 294:
[   25.693189]  kasan_save_stack+0x45/0x70
[   25.693337]  kasan_save_track+0x18/0x40
[   25.693464]  kasan_save_alloc_info+0x3b/0x50
[   25.693651]  __kasan_kmalloc+0xb7/0xc0
[   25.693831]  __kmalloc_cache_noprof+0x189/0x420
[   25.694044]  kasan_atomics+0x95/0x310
[   25.694240]  kunit_try_run_case+0x1a5/0x480
[   25.694440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.694645]  kthread+0x337/0x6f0
[   25.694760]  ret_from_fork+0x116/0x1d0
[   25.694966]  ret_from_fork_asm+0x1a/0x30
[   25.695363] 
[   25.695454] The buggy address belongs to the object at ffff888100aaa000
[   25.695454]  which belongs to the cache kmalloc-64 of size 64
[   25.695912] The buggy address is located 0 bytes to the right of
[   25.695912]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.696342] 
[   25.696412] The buggy address belongs to the physical page:
[   25.696580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.696813] flags: 0x200000000000000(node=0|zone=2)
[   25.696972] page_type: f5(slab)
[   25.697088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.697379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.697714] page dumped because: kasan: bad access detected
[   25.698170] 
[   25.698267] Memory state around the buggy address:
[   25.698485]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.698709]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.698918] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.699128]                                      ^
[   25.699285]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.699494]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.699699] ==================================================================
[   25.221283] ==================================================================
[   25.221864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   25.222250] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.222606] 
[   25.222696] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.222749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.222763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.222789] Call Trace:
[   25.222811]  <TASK>
[   25.222835]  dump_stack_lvl+0x73/0xb0
[   25.222865]  print_report+0xd1/0x650
[   25.222889]  ? __virt_addr_valid+0x1db/0x2d0
[   25.222915]  ? kasan_atomics_helper+0x1217/0x5450
[   25.222937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.222964]  ? kasan_atomics_helper+0x1217/0x5450
[   25.222985]  kasan_report+0x141/0x180
[   25.223008]  ? kasan_atomics_helper+0x1217/0x5450
[   25.223042]  kasan_check_range+0x10c/0x1c0
[   25.223066]  __kasan_check_write+0x18/0x20
[   25.223090]  kasan_atomics_helper+0x1217/0x5450
[   25.223121]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.223148]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.223174]  ? kasan_atomics+0x152/0x310
[   25.223201]  kasan_atomics+0x1dc/0x310
[   25.223235]  ? __pfx_kasan_atomics+0x10/0x10
[   25.223258]  ? trace_hardirqs_on+0x37/0xe0
[   25.223282]  ? __pfx_read_tsc+0x10/0x10
[   25.223305]  ? ktime_get_ts64+0x86/0x230
[   25.223331]  kunit_try_run_case+0x1a5/0x480
[   25.223358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.223383]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.223410]  ? __kthread_parkme+0x82/0x180
[   25.223432]  ? preempt_count_sub+0x50/0x80
[   25.223467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.223493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.223518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.223563]  kthread+0x337/0x6f0
[   25.223584]  ? trace_preempt_on+0x20/0xc0
[   25.223607]  ? __pfx_kthread+0x10/0x10
[   25.223639]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.223664]  ? calculate_sigpending+0x7b/0xa0
[   25.223698]  ? __pfx_kthread+0x10/0x10
[   25.223719]  ret_from_fork+0x116/0x1d0
[   25.223740]  ? __pfx_kthread+0x10/0x10
[   25.223772]  ret_from_fork_asm+0x1a/0x30
[   25.223805]  </TASK>
[   25.223817] 
[   25.231844] Allocated by task 294:
[   25.232042]  kasan_save_stack+0x45/0x70
[   25.232239]  kasan_save_track+0x18/0x40
[   25.232428]  kasan_save_alloc_info+0x3b/0x50
[   25.232634]  __kasan_kmalloc+0xb7/0xc0
[   25.232798]  __kmalloc_cache_noprof+0x189/0x420
[   25.233003]  kasan_atomics+0x95/0x310
[   25.233189]  kunit_try_run_case+0x1a5/0x480
[   25.233379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.233550]  kthread+0x337/0x6f0
[   25.233664]  ret_from_fork+0x116/0x1d0
[   25.233790]  ret_from_fork_asm+0x1a/0x30
[   25.233923] 
[   25.233989] The buggy address belongs to the object at ffff888100aaa000
[   25.233989]  which belongs to the cache kmalloc-64 of size 64
[   25.234345] The buggy address is located 0 bytes to the right of
[   25.234345]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.234758] 
[   25.234875] The buggy address belongs to the physical page:
[   25.235282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.235635] flags: 0x200000000000000(node=0|zone=2)
[   25.235867] page_type: f5(slab)
[   25.236027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.236372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.236701] page dumped because: kasan: bad access detected
[   25.236947] 
[   25.237046] Memory state around the buggy address:
[   25.237279]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.237596]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.237908] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.238233]                                      ^
[   25.238424]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.238636]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.238842] ==================================================================
[   25.203520] ==================================================================
[   25.203926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   25.204385] Read of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.204698] 
[   25.204806] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.204854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.204878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.204901] Call Trace:
[   25.204919]  <TASK>
[   25.204949]  dump_stack_lvl+0x73/0xb0
[   25.204978]  print_report+0xd1/0x650
[   25.205000]  ? __virt_addr_valid+0x1db/0x2d0
[   25.205039]  ? kasan_atomics_helper+0x4a02/0x5450
[   25.205062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.205089]  ? kasan_atomics_helper+0x4a02/0x5450
[   25.205121]  kasan_report+0x141/0x180
[   25.205144]  ? kasan_atomics_helper+0x4a02/0x5450
[   25.205182]  __asan_report_load4_noabort+0x18/0x20
[   25.205208]  kasan_atomics_helper+0x4a02/0x5450
[   25.205241]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.205268]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.205305]  ? kasan_atomics+0x152/0x310
[   25.205332]  kasan_atomics+0x1dc/0x310
[   25.205356]  ? __pfx_kasan_atomics+0x10/0x10
[   25.205390]  ? trace_hardirqs_on+0x37/0xe0
[   25.205415]  ? __pfx_read_tsc+0x10/0x10
[   25.205439]  ? ktime_get_ts64+0x86/0x230
[   25.205473]  kunit_try_run_case+0x1a5/0x480
[   25.205500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.205525]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.205563]  ? __kthread_parkme+0x82/0x180
[   25.205585]  ? preempt_count_sub+0x50/0x80
[   25.205610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.205634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.205668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.205693]  kthread+0x337/0x6f0
[   25.205715]  ? trace_preempt_on+0x20/0xc0
[   25.205749]  ? __pfx_kthread+0x10/0x10
[   25.205771]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.205796]  ? calculate_sigpending+0x7b/0xa0
[   25.205821]  ? __pfx_kthread+0x10/0x10
[   25.205843]  ret_from_fork+0x116/0x1d0
[   25.205863]  ? __pfx_kthread+0x10/0x10
[   25.205885]  ret_from_fork_asm+0x1a/0x30
[   25.205917]  </TASK>
[   25.205929] 
[   25.213103] Allocated by task 294:
[   25.213264]  kasan_save_stack+0x45/0x70
[   25.213484]  kasan_save_track+0x18/0x40
[   25.213614]  kasan_save_alloc_info+0x3b/0x50
[   25.213756]  __kasan_kmalloc+0xb7/0xc0
[   25.213881]  __kmalloc_cache_noprof+0x189/0x420
[   25.214040]  kasan_atomics+0x95/0x310
[   25.214233]  kunit_try_run_case+0x1a5/0x480
[   25.214439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.214689]  kthread+0x337/0x6f0
[   25.215019]  ret_from_fork+0x116/0x1d0
[   25.215217]  ret_from_fork_asm+0x1a/0x30
[   25.215457] 
[   25.215563] The buggy address belongs to the object at ffff888100aaa000
[   25.215563]  which belongs to the cache kmalloc-64 of size 64
[   25.216186] The buggy address is located 0 bytes to the right of
[   25.216186]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.216560] 
[   25.216628] The buggy address belongs to the physical page:
[   25.216798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.217142] flags: 0x200000000000000(node=0|zone=2)
[   25.217386] page_type: f5(slab)
[   25.217598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.217932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.218331] page dumped because: kasan: bad access detected
[   25.218508] 
[   25.218572] Memory state around the buggy address:
[   25.218722]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.218933]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.219149] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.219366]                                      ^
[   25.219538]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.219993]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.220454] ==================================================================
[   25.805006] ==================================================================
[   25.805335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   25.805679] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.805998] 
[   25.806101] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.806148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.806161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.806184] Call Trace:
[   25.806201]  <TASK>
[   25.806230]  dump_stack_lvl+0x73/0xb0
[   25.806257]  print_report+0xd1/0x650
[   25.806279]  ? __virt_addr_valid+0x1db/0x2d0
[   25.806303]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.806324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.806351]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.806373]  kasan_report+0x141/0x180
[   25.806395]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.806421]  __asan_report_load8_noabort+0x18/0x20
[   25.806447]  kasan_atomics_helper+0x4f98/0x5450
[   25.806470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.806497]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.806522]  ? kasan_atomics+0x152/0x310
[   25.806548]  kasan_atomics+0x1dc/0x310
[   25.806572]  ? __pfx_kasan_atomics+0x10/0x10
[   25.806594]  ? trace_hardirqs_on+0x37/0xe0
[   25.806617]  ? __pfx_read_tsc+0x10/0x10
[   25.806640]  ? ktime_get_ts64+0x86/0x230
[   25.806664]  kunit_try_run_case+0x1a5/0x480
[   25.806690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.806715]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.806743]  ? __kthread_parkme+0x82/0x180
[   25.806764]  ? preempt_count_sub+0x50/0x80
[   25.806788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.806812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.806835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.806859]  kthread+0x337/0x6f0
[   25.806879]  ? trace_preempt_on+0x20/0xc0
[   25.806902]  ? __pfx_kthread+0x10/0x10
[   25.806923]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.806947]  ? calculate_sigpending+0x7b/0xa0
[   25.806971]  ? __pfx_kthread+0x10/0x10
[   25.806993]  ret_from_fork+0x116/0x1d0
[   25.807013]  ? __pfx_kthread+0x10/0x10
[   25.807043]  ret_from_fork_asm+0x1a/0x30
[   25.807073]  </TASK>
[   25.807085] 
[   25.818697] Allocated by task 294:
[   25.818870]  kasan_save_stack+0x45/0x70
[   25.819440]  kasan_save_track+0x18/0x40
[   25.819708]  kasan_save_alloc_info+0x3b/0x50
[   25.819999]  __kasan_kmalloc+0xb7/0xc0
[   25.820396]  __kmalloc_cache_noprof+0x189/0x420
[   25.820663]  kasan_atomics+0x95/0x310
[   25.820944]  kunit_try_run_case+0x1a5/0x480
[   25.821379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.821725]  kthread+0x337/0x6f0
[   25.821995]  ret_from_fork+0x116/0x1d0
[   25.822160]  ret_from_fork_asm+0x1a/0x30
[   25.822352] 
[   25.822437] The buggy address belongs to the object at ffff888100aaa000
[   25.822437]  which belongs to the cache kmalloc-64 of size 64
[   25.822900] The buggy address is located 0 bytes to the right of
[   25.822900]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.823849] 
[   25.823952] The buggy address belongs to the physical page:
[   25.824417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.824978] flags: 0x200000000000000(node=0|zone=2)
[   25.825341] page_type: f5(slab)
[   25.825500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.825787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.826281] page dumped because: kasan: bad access detected
[   25.826744] 
[   25.826846] Memory state around the buggy address:
[   25.827249]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.827667]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.827964] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.828608]                                      ^
[   25.828945]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.829539]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.829954] ==================================================================
[   25.639913] ==================================================================
[   25.640312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   25.640557] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.641155] 
[   25.641365] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.641423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.641438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.641463] Call Trace:
[   25.641487]  <TASK>
[   25.641509]  dump_stack_lvl+0x73/0xb0
[   25.641541]  print_report+0xd1/0x650
[   25.641564]  ? __virt_addr_valid+0x1db/0x2d0
[   25.641589]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.641611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.641638]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.641660]  kasan_report+0x141/0x180
[   25.641682]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.641708]  __asan_report_load8_noabort+0x18/0x20
[   25.641734]  kasan_atomics_helper+0x4f30/0x5450
[   25.641756]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.641782]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.641808]  ? kasan_atomics+0x152/0x310
[   25.641836]  kasan_atomics+0x1dc/0x310
[   25.641860]  ? __pfx_kasan_atomics+0x10/0x10
[   25.641882]  ? trace_hardirqs_on+0x37/0xe0
[   25.641906]  ? __pfx_read_tsc+0x10/0x10
[   25.641929]  ? ktime_get_ts64+0x86/0x230
[   25.641954]  kunit_try_run_case+0x1a5/0x480
[   25.641980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.642006]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.642033]  ? __kthread_parkme+0x82/0x180
[   25.642054]  ? preempt_count_sub+0x50/0x80
[   25.642079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.642103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.642127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.642152]  kthread+0x337/0x6f0
[   25.642173]  ? trace_preempt_on+0x20/0xc0
[   25.642195]  ? __pfx_kthread+0x10/0x10
[   25.642215]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.642251]  ? calculate_sigpending+0x7b/0xa0
[   25.642276]  ? __pfx_kthread+0x10/0x10
[   25.642297]  ret_from_fork+0x116/0x1d0
[   25.642317]  ? __pfx_kthread+0x10/0x10
[   25.642340]  ret_from_fork_asm+0x1a/0x30
[   25.642373]  </TASK>
[   25.642386] 
[   25.653403] Allocated by task 294:
[   25.653731]  kasan_save_stack+0x45/0x70
[   25.654091]  kasan_save_track+0x18/0x40
[   25.654434]  kasan_save_alloc_info+0x3b/0x50
[   25.654581]  __kasan_kmalloc+0xb7/0xc0
[   25.654705]  __kmalloc_cache_noprof+0x189/0x420
[   25.654854]  kasan_atomics+0x95/0x310
[   25.654978]  kunit_try_run_case+0x1a5/0x480
[   25.655375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.655832]  kthread+0x337/0x6f0
[   25.656136]  ret_from_fork+0x116/0x1d0
[   25.656475]  ret_from_fork_asm+0x1a/0x30
[   25.656819] 
[   25.656967] The buggy address belongs to the object at ffff888100aaa000
[   25.656967]  which belongs to the cache kmalloc-64 of size 64
[   25.658184] The buggy address is located 0 bytes to the right of
[   25.658184]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.659317] 
[   25.659478] The buggy address belongs to the physical page:
[   25.659710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.659946] flags: 0x200000000000000(node=0|zone=2)
[   25.660306] page_type: f5(slab)
[   25.660599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.661301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.662012] page dumped because: kasan: bad access detected
[   25.662497] 
[   25.662653] Memory state around the buggy address:
[   25.663078]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.663379]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.663590] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.663795]                                      ^
[   25.663943]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.664194]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.664561] ==================================================================
[   25.028944] ==================================================================
[   25.029318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   25.029617] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.029937] 
[   25.030068] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.030122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.030136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.030161] Call Trace:
[   25.030184]  <TASK>
[   25.030205]  dump_stack_lvl+0x73/0xb0
[   25.030245]  print_report+0xd1/0x650
[   25.030269]  ? __virt_addr_valid+0x1db/0x2d0
[   25.030295]  ? kasan_atomics_helper+0xde0/0x5450
[   25.030316]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.030344]  ? kasan_atomics_helper+0xde0/0x5450
[   25.030366]  kasan_report+0x141/0x180
[   25.030389]  ? kasan_atomics_helper+0xde0/0x5450
[   25.030415]  kasan_check_range+0x10c/0x1c0
[   25.030440]  __kasan_check_write+0x18/0x20
[   25.030464]  kasan_atomics_helper+0xde0/0x5450
[   25.030487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.030514]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.030540]  ? kasan_atomics+0x152/0x310
[   25.030568]  kasan_atomics+0x1dc/0x310
[   25.030591]  ? __pfx_kasan_atomics+0x10/0x10
[   25.030614]  ? trace_hardirqs_on+0x37/0xe0
[   25.030638]  ? __pfx_read_tsc+0x10/0x10
[   25.030662]  ? ktime_get_ts64+0x86/0x230
[   25.030687]  kunit_try_run_case+0x1a5/0x480
[   25.030714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.030739]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.030768]  ? __kthread_parkme+0x82/0x180
[   25.030790]  ? preempt_count_sub+0x50/0x80
[   25.030813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.030838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.030863]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.030889]  kthread+0x337/0x6f0
[   25.030909]  ? trace_preempt_on+0x20/0xc0
[   25.030932]  ? __pfx_kthread+0x10/0x10
[   25.030953]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.030978]  ? calculate_sigpending+0x7b/0xa0
[   25.031030]  ? __pfx_kthread+0x10/0x10
[   25.031054]  ret_from_fork+0x116/0x1d0
[   25.031074]  ? __pfx_kthread+0x10/0x10
[   25.031095]  ret_from_fork_asm+0x1a/0x30
[   25.031127]  </TASK>
[   25.031140] 
[   25.037709] Allocated by task 294:
[   25.037833]  kasan_save_stack+0x45/0x70
[   25.037969]  kasan_save_track+0x18/0x40
[   25.038135]  kasan_save_alloc_info+0x3b/0x50
[   25.038354]  __kasan_kmalloc+0xb7/0xc0
[   25.038539]  __kmalloc_cache_noprof+0x189/0x420
[   25.038751]  kasan_atomics+0x95/0x310
[   25.038931]  kunit_try_run_case+0x1a5/0x480
[   25.039168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.039431]  kthread+0x337/0x6f0
[   25.039603]  ret_from_fork+0x116/0x1d0
[   25.039786]  ret_from_fork_asm+0x1a/0x30
[   25.039983] 
[   25.040101] The buggy address belongs to the object at ffff888100aaa000
[   25.040101]  which belongs to the cache kmalloc-64 of size 64
[   25.040637] The buggy address is located 0 bytes to the right of
[   25.040637]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.041203] 
[   25.041305] The buggy address belongs to the physical page:
[   25.041472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.041828] flags: 0x200000000000000(node=0|zone=2)
[   25.042056] page_type: f5(slab)
[   25.042236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.042524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.042811] page dumped because: kasan: bad access detected
[   25.043059] 
[   25.043131] Memory state around the buggy address:
[   25.043321]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.043604]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.043879] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.044112]                                      ^
[   25.044269]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.044475]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.044674] ==================================================================
[   24.976361] ==================================================================
[   24.976729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   24.977167] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.977469] 
[   24.977565] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.977617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.977632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.977656] Call Trace:
[   24.977679]  <TASK>
[   24.977701]  dump_stack_lvl+0x73/0xb0
[   24.977729]  print_report+0xd1/0x650
[   24.977754]  ? __virt_addr_valid+0x1db/0x2d0
[   24.977779]  ? kasan_atomics_helper+0xc70/0x5450
[   24.977801]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.977828]  ? kasan_atomics_helper+0xc70/0x5450
[   24.977850]  kasan_report+0x141/0x180
[   24.977874]  ? kasan_atomics_helper+0xc70/0x5450
[   24.977900]  kasan_check_range+0x10c/0x1c0
[   24.977924]  __kasan_check_write+0x18/0x20
[   24.977948]  kasan_atomics_helper+0xc70/0x5450
[   24.977971]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.977997]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.978023]  ? kasan_atomics+0x152/0x310
[   24.978050]  kasan_atomics+0x1dc/0x310
[   24.978074]  ? __pfx_kasan_atomics+0x10/0x10
[   24.978096]  ? trace_hardirqs_on+0x37/0xe0
[   24.978121]  ? __pfx_read_tsc+0x10/0x10
[   24.978143]  ? ktime_get_ts64+0x86/0x230
[   24.978170]  kunit_try_run_case+0x1a5/0x480
[   24.978196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.978232]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.978259]  ? __kthread_parkme+0x82/0x180
[   24.978281]  ? preempt_count_sub+0x50/0x80
[   24.978306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.978330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.978355]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.978380]  kthread+0x337/0x6f0
[   24.978402]  ? trace_preempt_on+0x20/0xc0
[   24.978425]  ? __pfx_kthread+0x10/0x10
[   24.978446]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.978470]  ? calculate_sigpending+0x7b/0xa0
[   24.978496]  ? __pfx_kthread+0x10/0x10
[   24.978518]  ret_from_fork+0x116/0x1d0
[   24.978538]  ? __pfx_kthread+0x10/0x10
[   24.978560]  ret_from_fork_asm+0x1a/0x30
[   24.978592]  </TASK>
[   24.978606] 
[   24.985666] Allocated by task 294:
[   24.985848]  kasan_save_stack+0x45/0x70
[   24.986039]  kasan_save_track+0x18/0x40
[   24.986234]  kasan_save_alloc_info+0x3b/0x50
[   24.986438]  __kasan_kmalloc+0xb7/0xc0
[   24.986619]  __kmalloc_cache_noprof+0x189/0x420
[   24.986834]  kasan_atomics+0x95/0x310
[   24.987017]  kunit_try_run_case+0x1a5/0x480
[   24.987227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.987400]  kthread+0x337/0x6f0
[   24.987515]  ret_from_fork+0x116/0x1d0
[   24.987642]  ret_from_fork_asm+0x1a/0x30
[   24.987776] 
[   24.987842] The buggy address belongs to the object at ffff888100aaa000
[   24.987842]  which belongs to the cache kmalloc-64 of size 64
[   24.988303] The buggy address is located 0 bytes to the right of
[   24.988303]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.988931] 
[   24.989021] The buggy address belongs to the physical page:
[   24.989288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.989645] flags: 0x200000000000000(node=0|zone=2)
[   24.989882] page_type: f5(slab)
[   24.990051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.990359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.990582] page dumped because: kasan: bad access detected
[   24.990746] 
[   24.990809] Memory state around the buggy address:
[   24.990961]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.991177]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.991502] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.992187]                                      ^
[   24.992363]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.992575]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.992783] ==================================================================
[   25.331191] ==================================================================
[   25.331599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   25.331888] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.332346] 
[   25.332435] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.332488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.332502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.332527] Call Trace:
[   25.332549]  <TASK>
[   25.332571]  dump_stack_lvl+0x73/0xb0
[   25.332600]  print_report+0xd1/0x650
[   25.332624]  ? __virt_addr_valid+0x1db/0x2d0
[   25.332649]  ? kasan_atomics_helper+0x1467/0x5450
[   25.332671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.332710]  ? kasan_atomics_helper+0x1467/0x5450
[   25.332744]  kasan_report+0x141/0x180
[   25.332768]  ? kasan_atomics_helper+0x1467/0x5450
[   25.332794]  kasan_check_range+0x10c/0x1c0
[   25.332830]  __kasan_check_write+0x18/0x20
[   25.332854]  kasan_atomics_helper+0x1467/0x5450
[   25.332876]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.332903]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.332930]  ? kasan_atomics+0x152/0x310
[   25.332957]  kasan_atomics+0x1dc/0x310
[   25.332981]  ? __pfx_kasan_atomics+0x10/0x10
[   25.333004]  ? trace_hardirqs_on+0x37/0xe0
[   25.333028]  ? __pfx_read_tsc+0x10/0x10
[   25.333052]  ? ktime_get_ts64+0x86/0x230
[   25.333079]  kunit_try_run_case+0x1a5/0x480
[   25.333106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.333131]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.333159]  ? __kthread_parkme+0x82/0x180
[   25.333182]  ? preempt_count_sub+0x50/0x80
[   25.333206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.333241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.333266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.333291]  kthread+0x337/0x6f0
[   25.333312]  ? trace_preempt_on+0x20/0xc0
[   25.333335]  ? __pfx_kthread+0x10/0x10
[   25.333356]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.333382]  ? calculate_sigpending+0x7b/0xa0
[   25.333407]  ? __pfx_kthread+0x10/0x10
[   25.333430]  ret_from_fork+0x116/0x1d0
[   25.333449]  ? __pfx_kthread+0x10/0x10
[   25.333471]  ret_from_fork_asm+0x1a/0x30
[   25.333504]  </TASK>
[   25.333517] 
[   25.341469] Allocated by task 294:
[   25.341677]  kasan_save_stack+0x45/0x70
[   25.341915]  kasan_save_track+0x18/0x40
[   25.342142]  kasan_save_alloc_info+0x3b/0x50
[   25.342315]  __kasan_kmalloc+0xb7/0xc0
[   25.342458]  __kmalloc_cache_noprof+0x189/0x420
[   25.342693]  kasan_atomics+0x95/0x310
[   25.342876]  kunit_try_run_case+0x1a5/0x480
[   25.343030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.343293]  kthread+0x337/0x6f0
[   25.343431]  ret_from_fork+0x116/0x1d0
[   25.343636]  ret_from_fork_asm+0x1a/0x30
[   25.343773] 
[   25.343838] The buggy address belongs to the object at ffff888100aaa000
[   25.343838]  which belongs to the cache kmalloc-64 of size 64
[   25.344577] The buggy address is located 0 bytes to the right of
[   25.344577]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.345177] 
[   25.345289] The buggy address belongs to the physical page:
[   25.345527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.345867] flags: 0x200000000000000(node=0|zone=2)
[   25.346081] page_type: f5(slab)
[   25.346263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.346581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.346883] page dumped because: kasan: bad access detected
[   25.347135] 
[   25.347234] Memory state around the buggy address:
[   25.347443]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.347755]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.348097] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.348375]                                      ^
[   25.348527]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.348738]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.348998] ==================================================================
[   25.930943] ==================================================================
[   25.931438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   25.932110] Read of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.932715] 
[   25.932887] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.932939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.932953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.932978] Call Trace:
[   25.933000]  <TASK>
[   25.933023]  dump_stack_lvl+0x73/0xb0
[   25.933053]  print_report+0xd1/0x650
[   25.933077]  ? __virt_addr_valid+0x1db/0x2d0
[   25.933104]  ? kasan_atomics_helper+0x5115/0x5450
[   25.933126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.933152]  ? kasan_atomics_helper+0x5115/0x5450
[   25.933174]  kasan_report+0x141/0x180
[   25.933197]  ? kasan_atomics_helper+0x5115/0x5450
[   25.933235]  __asan_report_load8_noabort+0x18/0x20
[   25.933260]  kasan_atomics_helper+0x5115/0x5450
[   25.933283]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.933308]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.933335]  ? kasan_atomics+0x152/0x310
[   25.933363]  kasan_atomics+0x1dc/0x310
[   25.933386]  ? __pfx_kasan_atomics+0x10/0x10
[   25.933408]  ? trace_hardirqs_on+0x37/0xe0
[   25.933432]  ? __pfx_read_tsc+0x10/0x10
[   25.933456]  ? ktime_get_ts64+0x86/0x230
[   25.933482]  kunit_try_run_case+0x1a5/0x480
[   25.933508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.933534]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.933561]  ? __kthread_parkme+0x82/0x180
[   25.933583]  ? preempt_count_sub+0x50/0x80
[   25.933607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.933632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.933656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.933681]  kthread+0x337/0x6f0
[   25.933702]  ? trace_preempt_on+0x20/0xc0
[   25.933725]  ? __pfx_kthread+0x10/0x10
[   25.933746]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.933771]  ? calculate_sigpending+0x7b/0xa0
[   25.933796]  ? __pfx_kthread+0x10/0x10
[   25.933818]  ret_from_fork+0x116/0x1d0
[   25.933837]  ? __pfx_kthread+0x10/0x10
[   25.933858]  ret_from_fork_asm+0x1a/0x30
[   25.933890]  </TASK>
[   25.933902] 
[   25.944675] Allocated by task 294:
[   25.944808]  kasan_save_stack+0x45/0x70
[   25.944947]  kasan_save_track+0x18/0x40
[   25.945207]  kasan_save_alloc_info+0x3b/0x50
[   25.945593]  __kasan_kmalloc+0xb7/0xc0
[   25.945928]  __kmalloc_cache_noprof+0x189/0x420
[   25.946435]  kasan_atomics+0x95/0x310
[   25.946832]  kunit_try_run_case+0x1a5/0x480
[   25.947249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.947712]  kthread+0x337/0x6f0
[   25.947889]  ret_from_fork+0x116/0x1d0
[   25.948018]  ret_from_fork_asm+0x1a/0x30
[   25.948372] 
[   25.948525] The buggy address belongs to the object at ffff888100aaa000
[   25.948525]  which belongs to the cache kmalloc-64 of size 64
[   25.949564] The buggy address is located 0 bytes to the right of
[   25.949564]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.949974] 
[   25.950069] The buggy address belongs to the physical page:
[   25.950552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.951259] flags: 0x200000000000000(node=0|zone=2)
[   25.951693] page_type: f5(slab)
[   25.951992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.952679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.952939] page dumped because: kasan: bad access detected
[   25.953332] 
[   25.953486] Memory state around the buggy address:
[   25.953910]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.954513]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.954935] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.955188]                                      ^
[   25.955353]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.955569]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.955778] ==================================================================
[   24.923443] ==================================================================
[   24.923812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   24.924297] Write of size 4 at addr ffff888100aaa030 by task kunit_try_catch/294
[   24.924629] 
[   24.924738] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   24.924791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.924804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.924830] Call Trace:
[   24.924852]  <TASK>
[   24.924874]  dump_stack_lvl+0x73/0xb0
[   24.924903]  print_report+0xd1/0x650
[   24.924927]  ? __virt_addr_valid+0x1db/0x2d0
[   24.924953]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.924974]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.925001]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.925034]  kasan_report+0x141/0x180
[   24.925057]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.925083]  kasan_check_range+0x10c/0x1c0
[   24.925108]  __kasan_check_write+0x18/0x20
[   24.925132]  kasan_atomics_helper+0xa2b/0x5450
[   24.925155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.925182]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.925208]  ? kasan_atomics+0x152/0x310
[   24.925247]  kasan_atomics+0x1dc/0x310
[   24.925271]  ? __pfx_kasan_atomics+0x10/0x10
[   24.925297]  ? trace_hardirqs_on+0x37/0xe0
[   24.925322]  ? __pfx_read_tsc+0x10/0x10
[   24.925347]  ? ktime_get_ts64+0x86/0x230
[   24.925372]  kunit_try_run_case+0x1a5/0x480
[   24.925400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.925426]  ? queued_spin_lock_slowpath+0x116/0xb40
[   24.925453]  ? __kthread_parkme+0x82/0x180
[   24.925475]  ? preempt_count_sub+0x50/0x80
[   24.925501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.925527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.925552]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.925577]  kthread+0x337/0x6f0
[   24.925598]  ? trace_preempt_on+0x20/0xc0
[   24.925621]  ? __pfx_kthread+0x10/0x10
[   24.925643]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.925668]  ? calculate_sigpending+0x7b/0xa0
[   24.925693]  ? __pfx_kthread+0x10/0x10
[   24.925715]  ret_from_fork+0x116/0x1d0
[   24.925736]  ? __pfx_kthread+0x10/0x10
[   24.925757]  ret_from_fork_asm+0x1a/0x30
[   24.925790]  </TASK>
[   24.925803] 
[   24.933016] Allocated by task 294:
[   24.933208]  kasan_save_stack+0x45/0x70
[   24.933422]  kasan_save_track+0x18/0x40
[   24.933614]  kasan_save_alloc_info+0x3b/0x50
[   24.933821]  __kasan_kmalloc+0xb7/0xc0
[   24.933987]  __kmalloc_cache_noprof+0x189/0x420
[   24.934189]  kasan_atomics+0x95/0x310
[   24.934337]  kunit_try_run_case+0x1a5/0x480
[   24.934480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.934652]  kthread+0x337/0x6f0
[   24.934771]  ret_from_fork+0x116/0x1d0
[   24.934903]  ret_from_fork_asm+0x1a/0x30
[   24.935040] 
[   24.935107] The buggy address belongs to the object at ffff888100aaa000
[   24.935107]  which belongs to the cache kmalloc-64 of size 64
[   24.935467] The buggy address is located 0 bytes to the right of
[   24.935467]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   24.935833] 
[   24.935901] The buggy address belongs to the physical page:
[   24.936070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   24.936431] flags: 0x200000000000000(node=0|zone=2)
[   24.936666] page_type: f5(slab)
[   24.936833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.937382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.937722] page dumped because: kasan: bad access detected
[   24.937976] 
[   24.938114] Memory state around the buggy address:
[   24.938349]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.938671]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.938882] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.939294]                                      ^
[   24.939524]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.939813]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.940086] ==================================================================
[   25.426297] ==================================================================
[   25.426534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   25.426990] Write of size 8 at addr ffff888100aaa030 by task kunit_try_catch/294
[   25.427342] 
[   25.427452] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   25.427502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.427516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.427539] Call Trace:
[   25.427558]  <TASK>
[   25.427579]  dump_stack_lvl+0x73/0xb0
[   25.427607]  print_report+0xd1/0x650
[   25.427630]  ? __virt_addr_valid+0x1db/0x2d0
[   25.427655]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.427677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.427705]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.427727]  kasan_report+0x141/0x180
[   25.427750]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.427776]  kasan_check_range+0x10c/0x1c0
[   25.427800]  __kasan_check_write+0x18/0x20
[   25.427825]  kasan_atomics_helper+0x16e7/0x5450
[   25.427849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.427877]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.427902]  ? kasan_atomics+0x152/0x310
[   25.427930]  kasan_atomics+0x1dc/0x310
[   25.427953]  ? __pfx_kasan_atomics+0x10/0x10
[   25.427976]  ? trace_hardirqs_on+0x37/0xe0
[   25.428000]  ? __pfx_read_tsc+0x10/0x10
[   25.428023]  ? ktime_get_ts64+0x86/0x230
[   25.428049]  kunit_try_run_case+0x1a5/0x480
[   25.428074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.428100]  ? queued_spin_lock_slowpath+0x116/0xb40
[   25.428127]  ? __kthread_parkme+0x82/0x180
[   25.428159]  ? preempt_count_sub+0x50/0x80
[   25.428184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.428209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.428244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.428269]  kthread+0x337/0x6f0
[   25.428290]  ? trace_preempt_on+0x20/0xc0
[   25.428313]  ? __pfx_kthread+0x10/0x10
[   25.428334]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.428359]  ? calculate_sigpending+0x7b/0xa0
[   25.428384]  ? __pfx_kthread+0x10/0x10
[   25.428407]  ret_from_fork+0x116/0x1d0
[   25.428428]  ? __pfx_kthread+0x10/0x10
[   25.428450]  ret_from_fork_asm+0x1a/0x30
[   25.428482]  </TASK>
[   25.428495] 
[   25.436022] Allocated by task 294:
[   25.436207]  kasan_save_stack+0x45/0x70
[   25.436419]  kasan_save_track+0x18/0x40
[   25.436608]  kasan_save_alloc_info+0x3b/0x50
[   25.436823]  __kasan_kmalloc+0xb7/0xc0
[   25.437008]  __kmalloc_cache_noprof+0x189/0x420
[   25.437283]  kasan_atomics+0x95/0x310
[   25.437450]  kunit_try_run_case+0x1a5/0x480
[   25.437626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.437847]  kthread+0x337/0x6f0
[   25.437980]  ret_from_fork+0x116/0x1d0
[   25.438252]  ret_from_fork_asm+0x1a/0x30
[   25.438433] 
[   25.438526] The buggy address belongs to the object at ffff888100aaa000
[   25.438526]  which belongs to the cache kmalloc-64 of size 64
[   25.438989] The buggy address is located 0 bytes to the right of
[   25.438989]  allocated 48-byte region [ffff888100aaa000, ffff888100aaa030)
[   25.439551] 
[   25.439623] The buggy address belongs to the physical page:
[   25.439792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   25.440029] flags: 0x200000000000000(node=0|zone=2)
[   25.440199] page_type: f5(slab)
[   25.440375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.440713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.441049] page dumped because: kasan: bad access detected
[   25.441351] 
[   25.441417] Memory state around the buggy address:
[   25.441566]  ffff888100aa9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.441775]  ffff888100aa9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.442235] >ffff888100aaa000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.442555]                                      ^
[   25.442774]  ffff888100aaa080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.443160]  ffff888100aaa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.443444] ==================================================================