Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   56.031314] ==================================================================
[   56.038257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   56.045631] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   56.052923] 
[   56.054406] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   56.054457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.054471] Hardware name: WinLink E850-96 board (DT)
[   56.054490] Call trace:
[   56.054503]  show_stack+0x20/0x38 (C)
[   56.054536]  dump_stack_lvl+0x8c/0xd0
[   56.054567]  print_report+0x118/0x608
[   56.054599]  kasan_report+0xdc/0x128
[   56.054630]  __asan_report_load8_noabort+0x20/0x30
[   56.054666]  kasan_atomics_helper+0x3f58/0x4858
[   56.054699]  kasan_atomics+0x198/0x2e0
[   56.054729]  kunit_try_run_case+0x170/0x3f0
[   56.054762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.054798]  kthread+0x328/0x630
[   56.054830]  ret_from_fork+0x10/0x20
[   56.054863] 
[   56.122539] Allocated by task 310:
[   56.125928]  kasan_save_stack+0x3c/0x68
[   56.129744]  kasan_save_track+0x20/0x40
[   56.133564]  kasan_save_alloc_info+0x40/0x58
[   56.137817]  __kasan_kmalloc+0xd4/0xd8
[   56.141550]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.146063]  kasan_atomics+0xb8/0x2e0
[   56.149709]  kunit_try_run_case+0x170/0x3f0
[   56.153876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.159345]  kthread+0x328/0x630
[   56.162556]  ret_from_fork+0x10/0x20
[   56.166115] 
[   56.167592] The buggy address belongs to the object at ffff00080243ed00
[   56.167592]  which belongs to the cache kmalloc-64 of size 64
[   56.179919] The buggy address is located 0 bytes to the right of
[   56.179919]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   56.192764] 
[   56.194240] The buggy address belongs to the physical page:
[   56.199798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   56.207783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.214293] page_type: f5(slab)
[   56.217426] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.225149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.232868] page dumped because: kasan: bad access detected
[   56.238423] 
[   56.239899] Memory state around the buggy address:
[   56.244678]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.251882]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.259088] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.266287]                                      ^
[   56.271065]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.278272]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.285471] ==================================================================
[   60.261671] ==================================================================
[   60.268746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   60.276123] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   60.283502] 
[   60.284984] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   60.285033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.285048] Hardware name: WinLink E850-96 board (DT)
[   60.285067] Call trace:
[   60.285081]  show_stack+0x20/0x38 (C)
[   60.285114]  dump_stack_lvl+0x8c/0xd0
[   60.285146]  print_report+0x118/0x608
[   60.285179]  kasan_report+0xdc/0x128
[   60.285210]  kasan_check_range+0x100/0x1a8
[   60.285241]  __kasan_check_write+0x20/0x30
[   60.285276]  kasan_atomics_helper+0x1414/0x4858
[   60.285308]  kasan_atomics+0x198/0x2e0
[   60.285339]  kunit_try_run_case+0x170/0x3f0
[   60.285370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.285405]  kthread+0x328/0x630
[   60.285437]  ret_from_fork+0x10/0x20
[   60.285469] 
[   60.356503] Allocated by task 310:
[   60.359891]  kasan_save_stack+0x3c/0x68
[   60.363709]  kasan_save_track+0x20/0x40
[   60.367528]  kasan_save_alloc_info+0x40/0x58
[   60.371781]  __kasan_kmalloc+0xd4/0xd8
[   60.375514]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.380028]  kasan_atomics+0xb8/0x2e0
[   60.383673]  kunit_try_run_case+0x170/0x3f0
[   60.387840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.393309]  kthread+0x328/0x630
[   60.396520]  ret_from_fork+0x10/0x20
[   60.400080] 
[   60.401556] The buggy address belongs to the object at ffff00080243ed00
[   60.401556]  which belongs to the cache kmalloc-64 of size 64
[   60.413883] The buggy address is located 0 bytes to the right of
[   60.413883]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   60.426728] 
[   60.428204] The buggy address belongs to the physical page:
[   60.433763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   60.441748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.448257] page_type: f5(slab)
[   60.451389] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.459113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.466832] page dumped because: kasan: bad access detected
[   60.472387] 
[   60.473863] Memory state around the buggy address:
[   60.478644]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.485846]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.493052] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.500251]                                      ^
[   60.505029]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.512236]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.519435] ==================================================================
[   56.557759] ==================================================================
[   56.564810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   56.572186] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   56.579564] 
[   56.581046] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   56.581095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.581112] Hardware name: WinLink E850-96 board (DT)
[   56.581134] Call trace:
[   56.581149]  show_stack+0x20/0x38 (C)
[   56.581183]  dump_stack_lvl+0x8c/0xd0
[   56.581216]  print_report+0x118/0x608
[   56.581246]  kasan_report+0xdc/0x128
[   56.581278]  __asan_report_store8_noabort+0x20/0x30
[   56.581315]  kasan_atomics_helper+0x3e5c/0x4858
[   56.581348]  kasan_atomics+0x198/0x2e0
[   56.581377]  kunit_try_run_case+0x170/0x3f0
[   56.581407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.581443]  kthread+0x328/0x630
[   56.581473]  ret_from_fork+0x10/0x20
[   56.581508] 
[   56.649268] Allocated by task 310:
[   56.652656]  kasan_save_stack+0x3c/0x68
[   56.656473]  kasan_save_track+0x20/0x40
[   56.660292]  kasan_save_alloc_info+0x40/0x58
[   56.664545]  __kasan_kmalloc+0xd4/0xd8
[   56.668278]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.672792]  kasan_atomics+0xb8/0x2e0
[   56.676437]  kunit_try_run_case+0x170/0x3f0
[   56.680604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.686073]  kthread+0x328/0x630
[   56.689285]  ret_from_fork+0x10/0x20
[   56.692843] 
[   56.694321] The buggy address belongs to the object at ffff00080243ed00
[   56.694321]  which belongs to the cache kmalloc-64 of size 64
[   56.706647] The buggy address is located 0 bytes to the right of
[   56.706647]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   56.719492] 
[   56.720968] The buggy address belongs to the physical page:
[   56.726527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   56.734511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.741021] page_type: f5(slab)
[   56.744153] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.751877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.759596] page dumped because: kasan: bad access detected
[   56.765151] 
[   56.766627] Memory state around the buggy address:
[   56.771405]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.778610]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.785816] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.793015]                                      ^
[   56.797794]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.805000]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.812199] ==================================================================
[   49.692931] ==================================================================
[   49.699984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   49.707272] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   49.714650] 
[   49.716131] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   49.716180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.716196] Hardware name: WinLink E850-96 board (DT)
[   49.716216] Call trace:
[   49.716231]  show_stack+0x20/0x38 (C)
[   49.716263]  dump_stack_lvl+0x8c/0xd0
[   49.716295]  print_report+0x118/0x608
[   49.716326]  kasan_report+0xdc/0x128
[   49.716355]  kasan_check_range+0x100/0x1a8
[   49.716389]  __kasan_check_write+0x20/0x30
[   49.716425]  kasan_atomics_helper+0x54c/0x4858
[   49.716457]  kasan_atomics+0x198/0x2e0
[   49.716487]  kunit_try_run_case+0x170/0x3f0
[   49.716519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.716553]  kthread+0x328/0x630
[   49.716584]  ret_from_fork+0x10/0x20
[   49.716615] 
[   49.787565] Allocated by task 310:
[   49.790953]  kasan_save_stack+0x3c/0x68
[   49.794770]  kasan_save_track+0x20/0x40
[   49.798589]  kasan_save_alloc_info+0x40/0x58
[   49.802843]  __kasan_kmalloc+0xd4/0xd8
[   49.806575]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.811089]  kasan_atomics+0xb8/0x2e0
[   49.814735]  kunit_try_run_case+0x170/0x3f0
[   49.818901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.824370]  kthread+0x328/0x630
[   49.827582]  ret_from_fork+0x10/0x20
[   49.831141] 
[   49.832616] The buggy address belongs to the object at ffff00080243ed00
[   49.832616]  which belongs to the cache kmalloc-64 of size 64
[   49.844945] The buggy address is located 0 bytes to the right of
[   49.844945]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   49.857790] 
[   49.859266] The buggy address belongs to the physical page:
[   49.864825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   49.872809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.879317] page_type: f5(slab)
[   49.882450] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.890175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.897893] page dumped because: kasan: bad access detected
[   49.903448] 
[   49.904924] Memory state around the buggy address:
[   49.909703]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.916907]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.924112] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.931313]                                      ^
[   49.936091]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.943296]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.950496] ==================================================================
[   51.282498] ==================================================================
[   51.289542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   51.296831] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   51.304209] 
[   51.305692] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.305740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.305756] Hardware name: WinLink E850-96 board (DT)
[   51.305776] Call trace:
[   51.305789]  show_stack+0x20/0x38 (C)
[   51.305822]  dump_stack_lvl+0x8c/0xd0
[   51.305851]  print_report+0x118/0x608
[   51.305881]  kasan_report+0xdc/0x128
[   51.305911]  kasan_check_range+0x100/0x1a8
[   51.305944]  __kasan_check_write+0x20/0x30
[   51.305976]  kasan_atomics_helper+0x7cc/0x4858
[   51.306008]  kasan_atomics+0x198/0x2e0
[   51.306036]  kunit_try_run_case+0x170/0x3f0
[   51.306069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.306105]  kthread+0x328/0x630
[   51.306135]  ret_from_fork+0x10/0x20
[   51.306166] 
[   51.377124] Allocated by task 310:
[   51.380512]  kasan_save_stack+0x3c/0x68
[   51.384329]  kasan_save_track+0x20/0x40
[   51.388149]  kasan_save_alloc_info+0x40/0x58
[   51.392402]  __kasan_kmalloc+0xd4/0xd8
[   51.396135]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.400648]  kasan_atomics+0xb8/0x2e0
[   51.404294]  kunit_try_run_case+0x170/0x3f0
[   51.408461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.413930]  kthread+0x328/0x630
[   51.417141]  ret_from_fork+0x10/0x20
[   51.420700] 
[   51.422176] The buggy address belongs to the object at ffff00080243ed00
[   51.422176]  which belongs to the cache kmalloc-64 of size 64
[   51.434502] The buggy address is located 0 bytes to the right of
[   51.434502]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   51.447349] 
[   51.448825] The buggy address belongs to the physical page:
[   51.454384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   51.462368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.468878] page_type: f5(slab)
[   51.472009] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.479734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.487453] page dumped because: kasan: bad access detected
[   51.493008] 
[   51.494484] Memory state around the buggy address:
[   51.499263]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.506467]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.513671] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.520873]                                      ^
[   51.525651]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.532857]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.540056] ==================================================================
[   47.315147] ==================================================================
[   47.322240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   47.329530] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   47.336908] 
[   47.338390] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   47.338443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.338460] Hardware name: WinLink E850-96 board (DT)
[   47.338479] Call trace:
[   47.338495]  show_stack+0x20/0x38 (C)
[   47.338530]  dump_stack_lvl+0x8c/0xd0
[   47.338561]  print_report+0x118/0x608
[   47.338594]  kasan_report+0xdc/0x128
[   47.338627]  kasan_check_range+0x100/0x1a8
[   47.338658]  __kasan_check_write+0x20/0x30
[   47.338693]  kasan_atomics_helper+0x24c/0x4858
[   47.338725]  kasan_atomics+0x198/0x2e0
[   47.338754]  kunit_try_run_case+0x170/0x3f0
[   47.338789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.338824]  kthread+0x328/0x630
[   47.338856]  ret_from_fork+0x10/0x20
[   47.338887] 
[   47.409823] Allocated by task 310:
[   47.413210]  kasan_save_stack+0x3c/0x68
[   47.417028]  kasan_save_track+0x20/0x40
[   47.420847]  kasan_save_alloc_info+0x40/0x58
[   47.425101]  __kasan_kmalloc+0xd4/0xd8
[   47.428834]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.433347]  kasan_atomics+0xb8/0x2e0
[   47.436993]  kunit_try_run_case+0x170/0x3f0
[   47.441160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.446628]  kthread+0x328/0x630
[   47.449840]  ret_from_fork+0x10/0x20
[   47.453399] 
[   47.454876] The buggy address belongs to the object at ffff00080243ed00
[   47.454876]  which belongs to the cache kmalloc-64 of size 64
[   47.467203] The buggy address is located 0 bytes to the right of
[   47.467203]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   47.480048] 
[   47.481524] The buggy address belongs to the physical page:
[   47.487083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   47.495067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.501577] page_type: f5(slab)
[   47.504708] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.512432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.520151] page dumped because: kasan: bad access detected
[   47.525707] 
[   47.527182] Memory state around the buggy address:
[   47.531962]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.539165]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.546370] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.553571]                                      ^
[   47.558349]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.565555]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.572755] ==================================================================
[   48.371488] ==================================================================
[   48.378475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   48.385850] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   48.393229] 
[   48.394710] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   48.394763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.394777] Hardware name: WinLink E850-96 board (DT)
[   48.394796] Call trace:
[   48.394811]  show_stack+0x20/0x38 (C)
[   48.394842]  dump_stack_lvl+0x8c/0xd0
[   48.394875]  print_report+0x118/0x608
[   48.394905]  kasan_report+0xdc/0x128
[   48.394938]  __asan_report_store4_noabort+0x20/0x30
[   48.394978]  kasan_atomics_helper+0x3f94/0x4858
[   48.395009]  kasan_atomics+0x198/0x2e0
[   48.395037]  kunit_try_run_case+0x170/0x3f0
[   48.395067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.395101]  kthread+0x328/0x630
[   48.395133]  ret_from_fork+0x10/0x20
[   48.395166] 
[   48.462932] Allocated by task 310:
[   48.466320]  kasan_save_stack+0x3c/0x68
[   48.470137]  kasan_save_track+0x20/0x40
[   48.473957]  kasan_save_alloc_info+0x40/0x58
[   48.478210]  __kasan_kmalloc+0xd4/0xd8
[   48.481942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.486456]  kasan_atomics+0xb8/0x2e0
[   48.490102]  kunit_try_run_case+0x170/0x3f0
[   48.494268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.499737]  kthread+0x328/0x630
[   48.502949]  ret_from_fork+0x10/0x20
[   48.506508] 
[   48.507985] The buggy address belongs to the object at ffff00080243ed00
[   48.507985]  which belongs to the cache kmalloc-64 of size 64
[   48.520310] The buggy address is located 0 bytes to the right of
[   48.520310]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   48.533157] 
[   48.534633] The buggy address belongs to the physical page:
[   48.540191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   48.548176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.554686] page_type: f5(slab)
[   48.557817] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.565542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.573261] page dumped because: kasan: bad access detected
[   48.578816] 
[   48.580291] Memory state around the buggy address:
[   48.585070]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.592274]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.599479] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.606680]                                      ^
[   48.611458]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.618664]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.625864] ==================================================================
[   51.017638] ==================================================================
[   51.024616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   51.031905] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   51.039283] 
[   51.040765] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.040817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.040833] Hardware name: WinLink E850-96 board (DT)
[   51.040854] Call trace:
[   51.040867]  show_stack+0x20/0x38 (C)
[   51.040902]  dump_stack_lvl+0x8c/0xd0
[   51.040933]  print_report+0x118/0x608
[   51.040966]  kasan_report+0xdc/0x128
[   51.040998]  kasan_check_range+0x100/0x1a8
[   51.041030]  __kasan_check_write+0x20/0x30
[   51.041066]  kasan_atomics_helper+0x760/0x4858
[   51.041096]  kasan_atomics+0x198/0x2e0
[   51.041126]  kunit_try_run_case+0x170/0x3f0
[   51.041157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.041192]  kthread+0x328/0x630
[   51.041226]  ret_from_fork+0x10/0x20
[   51.041256] 
[   51.112197] Allocated by task 310:
[   51.115585]  kasan_save_stack+0x3c/0x68
[   51.119403]  kasan_save_track+0x20/0x40
[   51.123222]  kasan_save_alloc_info+0x40/0x58
[   51.127476]  __kasan_kmalloc+0xd4/0xd8
[   51.131208]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.135722]  kasan_atomics+0xb8/0x2e0
[   51.139368]  kunit_try_run_case+0x170/0x3f0
[   51.143534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.149003]  kthread+0x328/0x630
[   51.152215]  ret_from_fork+0x10/0x20
[   51.155773] 
[   51.157251] The buggy address belongs to the object at ffff00080243ed00
[   51.157251]  which belongs to the cache kmalloc-64 of size 64
[   51.169578] The buggy address is located 0 bytes to the right of
[   51.169578]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   51.182423] 
[   51.183899] The buggy address belongs to the physical page:
[   51.189457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   51.197442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.203951] page_type: f5(slab)
[   51.207083] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.214807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.222526] page dumped because: kasan: bad access detected
[   51.228082] 
[   51.229557] Memory state around the buggy address:
[   51.234337]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.241540]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.248745] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.255946]                                      ^
[   51.260724]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.267930]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.275130] ==================================================================
[   50.222786] ==================================================================
[   50.229837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   50.237125] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   50.244503] 
[   50.245984] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   50.246035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.246052] Hardware name: WinLink E850-96 board (DT)
[   50.246072] Call trace:
[   50.246086]  show_stack+0x20/0x38 (C)
[   50.246116]  dump_stack_lvl+0x8c/0xd0
[   50.246147]  print_report+0x118/0x608
[   50.246177]  kasan_report+0xdc/0x128
[   50.246206]  kasan_check_range+0x100/0x1a8
[   50.246240]  __kasan_check_write+0x20/0x30
[   50.246274]  kasan_atomics_helper+0x61c/0x4858
[   50.246307]  kasan_atomics+0x198/0x2e0
[   50.246335]  kunit_try_run_case+0x170/0x3f0
[   50.246369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.246404]  kthread+0x328/0x630
[   50.246435]  ret_from_fork+0x10/0x20
[   50.246465] 
[   50.317418] Allocated by task 310:
[   50.320804]  kasan_save_stack+0x3c/0x68
[   50.324623]  kasan_save_track+0x20/0x40
[   50.328443]  kasan_save_alloc_info+0x40/0x58
[   50.332696]  __kasan_kmalloc+0xd4/0xd8
[   50.336429]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.340942]  kasan_atomics+0xb8/0x2e0
[   50.344588]  kunit_try_run_case+0x170/0x3f0
[   50.348755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.354223]  kthread+0x328/0x630
[   50.357435]  ret_from_fork+0x10/0x20
[   50.360994] 
[   50.362471] The buggy address belongs to the object at ffff00080243ed00
[   50.362471]  which belongs to the cache kmalloc-64 of size 64
[   50.374798] The buggy address is located 0 bytes to the right of
[   50.374798]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   50.387643] 
[   50.389119] The buggy address belongs to the physical page:
[   50.394678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   50.402662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.409172] page_type: f5(slab)
[   50.412303] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.420028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.427746] page dumped because: kasan: bad access detected
[   50.433302] 
[   50.434777] Memory state around the buggy address:
[   50.439555]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.446760]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.453965] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.461166]                                      ^
[   50.465944]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.473150]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.480350] ==================================================================
[   54.978375] ==================================================================
[   54.985322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   54.992695] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   54.999987] 
[   55.001470] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   55.001521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.001537] Hardware name: WinLink E850-96 board (DT)
[   55.001558] Call trace:
[   55.001573]  show_stack+0x20/0x38 (C)
[   55.001607]  dump_stack_lvl+0x8c/0xd0
[   55.001639]  print_report+0x118/0x608
[   55.001672]  kasan_report+0xdc/0x128
[   55.001703]  __asan_report_load4_noabort+0x20/0x30
[   55.001740]  kasan_atomics_helper+0x3dd8/0x4858
[   55.001773]  kasan_atomics+0x198/0x2e0
[   55.001803]  kunit_try_run_case+0x170/0x3f0
[   55.001836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.001872]  kthread+0x328/0x630
[   55.001903]  ret_from_fork+0x10/0x20
[   55.001935] 
[   55.069605] Allocated by task 310:
[   55.072991]  kasan_save_stack+0x3c/0x68
[   55.076808]  kasan_save_track+0x20/0x40
[   55.080628]  kasan_save_alloc_info+0x40/0x58
[   55.084882]  __kasan_kmalloc+0xd4/0xd8
[   55.088614]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.093128]  kasan_atomics+0xb8/0x2e0
[   55.096774]  kunit_try_run_case+0x170/0x3f0
[   55.100940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.106409]  kthread+0x328/0x630
[   55.109621]  ret_from_fork+0x10/0x20
[   55.113180] 
[   55.114655] The buggy address belongs to the object at ffff00080243ed00
[   55.114655]  which belongs to the cache kmalloc-64 of size 64
[   55.126983] The buggy address is located 0 bytes to the right of
[   55.126983]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   55.139828] 
[   55.141305] The buggy address belongs to the physical page:
[   55.146864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   55.154847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.161356] page_type: f5(slab)
[   55.164489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.172213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.179932] page dumped because: kasan: bad access detected
[   55.185487] 
[   55.186963] Memory state around the buggy address:
[   55.191745]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.198946]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.206151] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.213352]                                      ^
[   55.218130]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.225336]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.232536] ==================================================================
[   59.469895] ==================================================================
[   59.476922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   59.484295] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   59.491673] 
[   59.493155] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   59.493204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.493219] Hardware name: WinLink E850-96 board (DT)
[   59.493237] Call trace:
[   59.493252]  show_stack+0x20/0x38 (C)
[   59.493285]  dump_stack_lvl+0x8c/0xd0
[   59.493318]  print_report+0x118/0x608
[   59.493348]  kasan_report+0xdc/0x128
[   59.493379]  kasan_check_range+0x100/0x1a8
[   59.493412]  __kasan_check_write+0x20/0x30
[   59.493449]  kasan_atomics_helper+0x12d8/0x4858
[   59.493480]  kasan_atomics+0x198/0x2e0
[   59.493509]  kunit_try_run_case+0x170/0x3f0
[   59.493540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.493575]  kthread+0x328/0x630
[   59.493605]  ret_from_fork+0x10/0x20
[   59.493638] 
[   59.564675] Allocated by task 310:
[   59.568062]  kasan_save_stack+0x3c/0x68
[   59.571880]  kasan_save_track+0x20/0x40
[   59.575700]  kasan_save_alloc_info+0x40/0x58
[   59.579953]  __kasan_kmalloc+0xd4/0xd8
[   59.583686]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.588199]  kasan_atomics+0xb8/0x2e0
[   59.591845]  kunit_try_run_case+0x170/0x3f0
[   59.596012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.601480]  kthread+0x328/0x630
[   59.604692]  ret_from_fork+0x10/0x20
[   59.608251] 
[   59.609728] The buggy address belongs to the object at ffff00080243ed00
[   59.609728]  which belongs to the cache kmalloc-64 of size 64
[   59.622056] The buggy address is located 0 bytes to the right of
[   59.622056]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   59.634900] 
[   59.636376] The buggy address belongs to the physical page:
[   59.641935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   59.649920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.656427] page_type: f5(slab)
[   59.659562] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.667284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.675004] page dumped because: kasan: bad access detected
[   59.680559] 
[   59.682034] Memory state around the buggy address:
[   59.686814]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.694017]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.701222] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.708423]                                      ^
[   59.713201]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.720408]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.727607] ==================================================================
[   57.084535] ==================================================================
[   57.091539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   57.098827] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   57.106205] 
[   57.107688] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   57.107738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.107755] Hardware name: WinLink E850-96 board (DT)
[   57.107774] Call trace:
[   57.107789]  show_stack+0x20/0x38 (C)
[   57.107821]  dump_stack_lvl+0x8c/0xd0
[   57.107851]  print_report+0x118/0x608
[   57.107883]  kasan_report+0xdc/0x128
[   57.107915]  kasan_check_range+0x100/0x1a8
[   57.107949]  __kasan_check_write+0x20/0x30
[   57.107980]  kasan_atomics_helper+0xf20/0x4858
[   57.108012]  kasan_atomics+0x198/0x2e0
[   57.108040]  kunit_try_run_case+0x170/0x3f0
[   57.108074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.108112]  kthread+0x328/0x630
[   57.108143]  ret_from_fork+0x10/0x20
[   57.108174] 
[   57.179121] Allocated by task 310:
[   57.182508]  kasan_save_stack+0x3c/0x68
[   57.186326]  kasan_save_track+0x20/0x40
[   57.190145]  kasan_save_alloc_info+0x40/0x58
[   57.194399]  __kasan_kmalloc+0xd4/0xd8
[   57.198131]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.202645]  kasan_atomics+0xb8/0x2e0
[   57.206291]  kunit_try_run_case+0x170/0x3f0
[   57.210457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.215926]  kthread+0x328/0x630
[   57.219137]  ret_from_fork+0x10/0x20
[   57.222697] 
[   57.224172] The buggy address belongs to the object at ffff00080243ed00
[   57.224172]  which belongs to the cache kmalloc-64 of size 64
[   57.236500] The buggy address is located 0 bytes to the right of
[   57.236500]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   57.249346] 
[   57.250823] The buggy address belongs to the physical page:
[   57.256379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   57.264365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.270873] page_type: f5(slab)
[   57.274007] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.281730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.289449] page dumped because: kasan: bad access detected
[   57.295004] 
[   57.296480] Memory state around the buggy address:
[   57.301260]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.308463]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.315667] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.322869]                                      ^
[   57.327647]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.334853]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.342053] ==================================================================
[   53.660267] ==================================================================
[   53.667283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.674573] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   53.681951] 
[   53.683432] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   53.683482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.683500] Hardware name: WinLink E850-96 board (DT)
[   53.683519] Call trace:
[   53.683535]  show_stack+0x20/0x38 (C)
[   53.683568]  dump_stack_lvl+0x8c/0xd0
[   53.683599]  print_report+0x118/0x608
[   53.683632]  kasan_report+0xdc/0x128
[   53.683662]  kasan_check_range+0x100/0x1a8
[   53.683695]  __kasan_check_write+0x20/0x30
[   53.683730]  kasan_atomics_helper+0xb70/0x4858
[   53.683763]  kasan_atomics+0x198/0x2e0
[   53.683794]  kunit_try_run_case+0x170/0x3f0
[   53.683821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.683858]  kthread+0x328/0x630
[   53.683890]  ret_from_fork+0x10/0x20
[   53.683919] 
[   53.754866] Allocated by task 310:
[   53.758254]  kasan_save_stack+0x3c/0x68
[   53.762071]  kasan_save_track+0x20/0x40
[   53.765891]  kasan_save_alloc_info+0x40/0x58
[   53.770144]  __kasan_kmalloc+0xd4/0xd8
[   53.773877]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.778390]  kasan_atomics+0xb8/0x2e0
[   53.782037]  kunit_try_run_case+0x170/0x3f0
[   53.786203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.791672]  kthread+0x328/0x630
[   53.794883]  ret_from_fork+0x10/0x20
[   53.798443] 
[   53.799918] The buggy address belongs to the object at ffff00080243ed00
[   53.799918]  which belongs to the cache kmalloc-64 of size 64
[   53.812246] The buggy address is located 0 bytes to the right of
[   53.812246]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   53.825091] 
[   53.826567] The buggy address belongs to the physical page:
[   53.832125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   53.840109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.846619] page_type: f5(slab)
[   53.849752] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.857476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.865195] page dumped because: kasan: bad access detected
[   53.870750] 
[   53.872226] Memory state around the buggy address:
[   53.877006]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.884209]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.891414] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.898615]                                      ^
[   53.903393]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.910598]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.917798] ==================================================================
[   58.674540] ==================================================================
[   58.681617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   58.688994] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   58.696372] 
[   58.697855] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   58.697906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.697921] Hardware name: WinLink E850-96 board (DT)
[   58.697942] Call trace:
[   58.697954]  show_stack+0x20/0x38 (C)
[   58.697984]  dump_stack_lvl+0x8c/0xd0
[   58.698016]  print_report+0x118/0x608
[   58.698048]  kasan_report+0xdc/0x128
[   58.698077]  kasan_check_range+0x100/0x1a8
[   58.698111]  __kasan_check_write+0x20/0x30
[   58.698147]  kasan_atomics_helper+0x1190/0x4858
[   58.698178]  kasan_atomics+0x198/0x2e0
[   58.698208]  kunit_try_run_case+0x170/0x3f0
[   58.698239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.698276]  kthread+0x328/0x630
[   58.698308]  ret_from_fork+0x10/0x20
[   58.698339] 
[   58.769374] Allocated by task 310:
[   58.772762]  kasan_save_stack+0x3c/0x68
[   58.776580]  kasan_save_track+0x20/0x40
[   58.780399]  kasan_save_alloc_info+0x40/0x58
[   58.784652]  __kasan_kmalloc+0xd4/0xd8
[   58.788385]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.792899]  kasan_atomics+0xb8/0x2e0
[   58.796545]  kunit_try_run_case+0x170/0x3f0
[   58.800711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.806179]  kthread+0x328/0x630
[   58.809391]  ret_from_fork+0x10/0x20
[   58.812951] 
[   58.814426] The buggy address belongs to the object at ffff00080243ed00
[   58.814426]  which belongs to the cache kmalloc-64 of size 64
[   58.826754] The buggy address is located 0 bytes to the right of
[   58.826754]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   58.839599] 
[   58.841075] The buggy address belongs to the physical page:
[   58.846634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   58.854619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.861127] page_type: f5(slab)
[   58.864260] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.871984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.879703] page dumped because: kasan: bad access detected
[   58.885258] 
[   58.886734] Memory state around the buggy address:
[   58.891512]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.898717]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.905921] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.913123]                                      ^
[   58.917901]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.925107]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.932307] ==================================================================
[   61.057073] ==================================================================
[   61.064048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   61.071424] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   61.078802] 
[   61.080284] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   61.080333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.080350] Hardware name: WinLink E850-96 board (DT)
[   61.080370] Call trace:
[   61.080385]  show_stack+0x20/0x38 (C)
[   61.080418]  dump_stack_lvl+0x8c/0xd0
[   61.080448]  print_report+0x118/0x608
[   61.080482]  kasan_report+0xdc/0x128
[   61.080514]  kasan_check_range+0x100/0x1a8
[   61.080546]  __kasan_check_write+0x20/0x30
[   61.080582]  kasan_atomics_helper+0x154c/0x4858
[   61.080614]  kasan_atomics+0x198/0x2e0
[   61.080643]  kunit_try_run_case+0x170/0x3f0
[   61.080674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.080710]  kthread+0x328/0x630
[   61.080743]  ret_from_fork+0x10/0x20
[   61.080775] 
[   61.151804] Allocated by task 310:
[   61.155191]  kasan_save_stack+0x3c/0x68
[   61.159009]  kasan_save_track+0x20/0x40
[   61.162829]  kasan_save_alloc_info+0x40/0x58
[   61.167082]  __kasan_kmalloc+0xd4/0xd8
[   61.170814]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.175328]  kasan_atomics+0xb8/0x2e0
[   61.178974]  kunit_try_run_case+0x170/0x3f0
[   61.183141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.188609]  kthread+0x328/0x630
[   61.191821]  ret_from_fork+0x10/0x20
[   61.195380] 
[   61.196857] The buggy address belongs to the object at ffff00080243ed00
[   61.196857]  which belongs to the cache kmalloc-64 of size 64
[   61.209182] The buggy address is located 0 bytes to the right of
[   61.209182]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   61.222029] 
[   61.223505] The buggy address belongs to the physical page:
[   61.229063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   61.237048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.243558] page_type: f5(slab)
[   61.246689] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.254413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.262132] page dumped because: kasan: bad access detected
[   61.267688] 
[   61.269163] Memory state around the buggy address:
[   61.273943]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.281147]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.288351] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.295552]                                      ^
[   61.300330]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.307536]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.314736] ==================================================================
[   57.879293] ==================================================================
[   57.886317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   57.893694] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   57.901072] 
[   57.902553] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   57.902601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.902619] Hardware name: WinLink E850-96 board (DT)
[   57.902638] Call trace:
[   57.902653]  show_stack+0x20/0x38 (C)
[   57.902687]  dump_stack_lvl+0x8c/0xd0
[   57.902719]  print_report+0x118/0x608
[   57.902750]  kasan_report+0xdc/0x128
[   57.902781]  kasan_check_range+0x100/0x1a8
[   57.902814]  __kasan_check_write+0x20/0x30
[   57.902848]  kasan_atomics_helper+0x1058/0x4858
[   57.902880]  kasan_atomics+0x198/0x2e0
[   57.902908]  kunit_try_run_case+0x170/0x3f0
[   57.902937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.902973]  kthread+0x328/0x630
[   57.903003]  ret_from_fork+0x10/0x20
[   57.903034] 
[   57.974074] Allocated by task 310:
[   57.977461]  kasan_save_stack+0x3c/0x68
[   57.981279]  kasan_save_track+0x20/0x40
[   57.985098]  kasan_save_alloc_info+0x40/0x58
[   57.989352]  __kasan_kmalloc+0xd4/0xd8
[   57.993085]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.997598]  kasan_atomics+0xb8/0x2e0
[   58.001244]  kunit_try_run_case+0x170/0x3f0
[   58.005410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.010879]  kthread+0x328/0x630
[   58.014091]  ret_from_fork+0x10/0x20
[   58.017650] 
[   58.019125] The buggy address belongs to the object at ffff00080243ed00
[   58.019125]  which belongs to the cache kmalloc-64 of size 64
[   58.031452] The buggy address is located 0 bytes to the right of
[   58.031452]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   58.044299] 
[   58.045775] The buggy address belongs to the physical page:
[   58.051334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   58.059317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.065827] page_type: f5(slab)
[   58.068959] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.076683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.084402] page dumped because: kasan: bad access detected
[   58.089958] 
[   58.091433] Memory state around the buggy address:
[   58.096212]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.103417]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.110621] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.117822]                                      ^
[   58.122600]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.129806]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.137006] ==================================================================
[   49.957962] ==================================================================
[   49.964914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   49.972198] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   49.979576] 
[   49.981059] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   49.981111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.981129] Hardware name: WinLink E850-96 board (DT)
[   49.981150] Call trace:
[   49.981165]  show_stack+0x20/0x38 (C)
[   49.981199]  dump_stack_lvl+0x8c/0xd0
[   49.981230]  print_report+0x118/0x608
[   49.981262]  kasan_report+0xdc/0x128
[   49.981295]  kasan_check_range+0x100/0x1a8
[   49.981328]  __kasan_check_write+0x20/0x30
[   49.981364]  kasan_atomics_helper+0x5b4/0x4858
[   49.981395]  kasan_atomics+0x198/0x2e0
[   49.981425]  kunit_try_run_case+0x170/0x3f0
[   49.981454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.981489]  kthread+0x328/0x630
[   49.981521]  ret_from_fork+0x10/0x20
[   49.981554] 
[   50.052492] Allocated by task 310:
[   50.055879]  kasan_save_stack+0x3c/0x68
[   50.059696]  kasan_save_track+0x20/0x40
[   50.063516]  kasan_save_alloc_info+0x40/0x58
[   50.067770]  __kasan_kmalloc+0xd4/0xd8
[   50.071502]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.076016]  kasan_atomics+0xb8/0x2e0
[   50.079662]  kunit_try_run_case+0x170/0x3f0
[   50.083828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.089296]  kthread+0x328/0x630
[   50.092509]  ret_from_fork+0x10/0x20
[   50.096068] 
[   50.097544] The buggy address belongs to the object at ffff00080243ed00
[   50.097544]  which belongs to the cache kmalloc-64 of size 64
[   50.109871] The buggy address is located 0 bytes to the right of
[   50.109871]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   50.122717] 
[   50.124192] The buggy address belongs to the physical page:
[   50.129752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   50.137736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.144245] page_type: f5(slab)
[   50.147377] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.155101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.162820] page dumped because: kasan: bad access detected
[   50.168375] 
[   50.169851] Memory state around the buggy address:
[   50.174633]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.181834]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.189039] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.196240]                                      ^
[   50.201018]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.208224]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.215423] ==================================================================
[   54.713339] ==================================================================
[   54.720392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   54.727682] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   54.735061] 
[   54.736543] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   54.736597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.736612] Hardware name: WinLink E850-96 board (DT)
[   54.736634] Call trace:
[   54.736647]  show_stack+0x20/0x38 (C)
[   54.736676]  dump_stack_lvl+0x8c/0xd0
[   54.736709]  print_report+0x118/0x608
[   54.736739]  kasan_report+0xdc/0x128
[   54.736770]  kasan_check_range+0x100/0x1a8
[   54.736803]  __kasan_check_write+0x20/0x30
[   54.736836]  kasan_atomics_helper+0xca0/0x4858
[   54.736869]  kasan_atomics+0x198/0x2e0
[   54.736898]  kunit_try_run_case+0x170/0x3f0
[   54.736928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.736962]  kthread+0x328/0x630
[   54.736993]  ret_from_fork+0x10/0x20
[   54.737025] 
[   54.807975] Allocated by task 310:
[   54.811363]  kasan_save_stack+0x3c/0x68
[   54.815181]  kasan_save_track+0x20/0x40
[   54.819000]  kasan_save_alloc_info+0x40/0x58
[   54.823253]  __kasan_kmalloc+0xd4/0xd8
[   54.826986]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.831500]  kasan_atomics+0xb8/0x2e0
[   54.835145]  kunit_try_run_case+0x170/0x3f0
[   54.839312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.844781]  kthread+0x328/0x630
[   54.847993]  ret_from_fork+0x10/0x20
[   54.851552] 
[   54.853029] The buggy address belongs to the object at ffff00080243ed00
[   54.853029]  which belongs to the cache kmalloc-64 of size 64
[   54.865355] The buggy address is located 0 bytes to the right of
[   54.865355]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   54.878201] 
[   54.879676] The buggy address belongs to the physical page:
[   54.885235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   54.893218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.899730] page_type: f5(slab)
[   54.902861] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.910585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.918304] page dumped because: kasan: bad access detected
[   54.923860] 
[   54.925335] Memory state around the buggy address:
[   54.930113]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.937318]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.944522] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.951724]                                      ^
[   54.956501]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.963708]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.970908] ==================================================================
[   48.898219] ==================================================================
[   48.905202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   48.912492] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   48.919870] 
[   48.921351] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   48.921398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.921415] Hardware name: WinLink E850-96 board (DT)
[   48.921433] Call trace:
[   48.921447]  show_stack+0x20/0x38 (C)
[   48.921482]  dump_stack_lvl+0x8c/0xd0
[   48.921513]  print_report+0x118/0x608
[   48.921545]  kasan_report+0xdc/0x128
[   48.921575]  kasan_check_range+0x100/0x1a8
[   48.921609]  __kasan_check_write+0x20/0x30
[   48.921643]  kasan_atomics_helper+0x414/0x4858
[   48.921673]  kasan_atomics+0x198/0x2e0
[   48.921702]  kunit_try_run_case+0x170/0x3f0
[   48.921732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.921765]  kthread+0x328/0x630
[   48.921798]  ret_from_fork+0x10/0x20
[   48.921829] 
[   48.992785] Allocated by task 310:
[   48.996173]  kasan_save_stack+0x3c/0x68
[   48.999990]  kasan_save_track+0x20/0x40
[   49.003810]  kasan_save_alloc_info+0x40/0x58
[   49.008063]  __kasan_kmalloc+0xd4/0xd8
[   49.011796]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.016309]  kasan_atomics+0xb8/0x2e0
[   49.019955]  kunit_try_run_case+0x170/0x3f0
[   49.024122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.029590]  kthread+0x328/0x630
[   49.032802]  ret_from_fork+0x10/0x20
[   49.036361] 
[   49.037838] The buggy address belongs to the object at ffff00080243ed00
[   49.037838]  which belongs to the cache kmalloc-64 of size 64
[   49.050165] The buggy address is located 0 bytes to the right of
[   49.050165]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   49.063010] 
[   49.064486] The buggy address belongs to the physical page:
[   49.070044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   49.078029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.084537] page_type: f5(slab)
[   49.087670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.095395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.103114] page dumped because: kasan: bad access detected
[   49.108669] 
[   49.110144] Memory state around the buggy address:
[   49.114923]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.122127]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.129332] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.136533]                                      ^
[   49.141311]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.148517]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.155717] ==================================================================
[   50.487739] ==================================================================
[   50.494761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   50.502051] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   50.509430] 
[   50.510911] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   50.510959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.510976] Hardware name: WinLink E850-96 board (DT)
[   50.510995] Call trace:
[   50.511006]  show_stack+0x20/0x38 (C)
[   50.511038]  dump_stack_lvl+0x8c/0xd0
[   50.511069]  print_report+0x118/0x608
[   50.511101]  kasan_report+0xdc/0x128
[   50.511131]  kasan_check_range+0x100/0x1a8
[   50.511164]  __kasan_check_write+0x20/0x30
[   50.511198]  kasan_atomics_helper+0x684/0x4858
[   50.511228]  kasan_atomics+0x198/0x2e0
[   50.511256]  kunit_try_run_case+0x170/0x3f0
[   50.511286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.511321]  kthread+0x328/0x630
[   50.511353]  ret_from_fork+0x10/0x20
[   50.511382] 
[   50.582345] Allocated by task 310:
[   50.585732]  kasan_save_stack+0x3c/0x68
[   50.589550]  kasan_save_track+0x20/0x40
[   50.593369]  kasan_save_alloc_info+0x40/0x58
[   50.597622]  __kasan_kmalloc+0xd4/0xd8
[   50.601355]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.605869]  kasan_atomics+0xb8/0x2e0
[   50.609515]  kunit_try_run_case+0x170/0x3f0
[   50.613681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.619150]  kthread+0x328/0x630
[   50.622362]  ret_from_fork+0x10/0x20
[   50.625921] 
[   50.627398] The buggy address belongs to the object at ffff00080243ed00
[   50.627398]  which belongs to the cache kmalloc-64 of size 64
[   50.639723] The buggy address is located 0 bytes to the right of
[   50.639723]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   50.652569] 
[   50.654045] The buggy address belongs to the physical page:
[   50.659604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   50.667588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.674098] page_type: f5(slab)
[   50.677230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.684954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.692673] page dumped because: kasan: bad access detected
[   50.698228] 
[   50.699704] Memory state around the buggy address:
[   50.704482]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.711687]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.718892] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.726092]                                      ^
[   50.730871]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.738077]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.745276] ==================================================================
[   55.766428] ==================================================================
[   55.773501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   55.780792] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   55.788083] 
[   55.789566] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   55.789615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.789631] Hardware name: WinLink E850-96 board (DT)
[   55.789650] Call trace:
[   55.789661]  show_stack+0x20/0x38 (C)
[   55.789694]  dump_stack_lvl+0x8c/0xd0
[   55.789724]  print_report+0x118/0x608
[   55.789755]  kasan_report+0xdc/0x128
[   55.789787]  kasan_check_range+0x100/0x1a8
[   55.789820]  __kasan_check_read+0x20/0x30
[   55.789855]  kasan_atomics_helper+0xdd4/0x4858
[   55.789886]  kasan_atomics+0x198/0x2e0
[   55.789916]  kunit_try_run_case+0x170/0x3f0
[   55.789946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.789981]  kthread+0x328/0x630
[   55.790015]  ret_from_fork+0x10/0x20
[   55.790048] 
[   55.860913] Allocated by task 310:
[   55.864299]  kasan_save_stack+0x3c/0x68
[   55.868116]  kasan_save_track+0x20/0x40
[   55.871936]  kasan_save_alloc_info+0x40/0x58
[   55.876189]  __kasan_kmalloc+0xd4/0xd8
[   55.879922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.884435]  kasan_atomics+0xb8/0x2e0
[   55.888081]  kunit_try_run_case+0x170/0x3f0
[   55.892248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.897716]  kthread+0x328/0x630
[   55.900928]  ret_from_fork+0x10/0x20
[   55.904487] 
[   55.905964] The buggy address belongs to the object at ffff00080243ed00
[   55.905964]  which belongs to the cache kmalloc-64 of size 64
[   55.918293] The buggy address is located 0 bytes to the right of
[   55.918293]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   55.931136] 
[   55.932612] The buggy address belongs to the physical page:
[   55.938171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   55.946155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.952665] page_type: f5(slab)
[   55.955797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.963521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.971240] page dumped because: kasan: bad access detected
[   55.976795] 
[   55.978271] Memory state around the buggy address:
[   55.983050]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.990253]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.997458] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.004659]                                      ^
[   56.009437]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.016644]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.023843] ==================================================================
[   57.614338] ==================================================================
[   57.621391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   57.628681] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   57.636059] 
[   57.637540] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   57.637588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.637606] Hardware name: WinLink E850-96 board (DT)
[   57.637625] Call trace:
[   57.637642]  show_stack+0x20/0x38 (C)
[   57.637675]  dump_stack_lvl+0x8c/0xd0
[   57.637707]  print_report+0x118/0x608
[   57.637737]  kasan_report+0xdc/0x128
[   57.637769]  kasan_check_range+0x100/0x1a8
[   57.637803]  __kasan_check_write+0x20/0x30
[   57.637838]  kasan_atomics_helper+0xff0/0x4858
[   57.637870]  kasan_atomics+0x198/0x2e0
[   57.637898]  kunit_try_run_case+0x170/0x3f0
[   57.637930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.637967]  kthread+0x328/0x630
[   57.637998]  ret_from_fork+0x10/0x20
[   57.638030] 
[   57.708974] Allocated by task 310:
[   57.712361]  kasan_save_stack+0x3c/0x68
[   57.716179]  kasan_save_track+0x20/0x40
[   57.719998]  kasan_save_alloc_info+0x40/0x58
[   57.724251]  __kasan_kmalloc+0xd4/0xd8
[   57.727984]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.732498]  kasan_atomics+0xb8/0x2e0
[   57.736144]  kunit_try_run_case+0x170/0x3f0
[   57.740310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.745779]  kthread+0x328/0x630
[   57.748991]  ret_from_fork+0x10/0x20
[   57.752549] 
[   57.754027] The buggy address belongs to the object at ffff00080243ed00
[   57.754027]  which belongs to the cache kmalloc-64 of size 64
[   57.766352] The buggy address is located 0 bytes to the right of
[   57.766352]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   57.779199] 
[   57.780674] The buggy address belongs to the physical page:
[   57.786232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   57.794216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.800726] page_type: f5(slab)
[   57.803859] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.811584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.819302] page dumped because: kasan: bad access detected
[   57.824858] 
[   57.826333] Memory state around the buggy address:
[   57.831111]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.838316]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.845521] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.852722]                                      ^
[   57.857500]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.864706]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.871906] ==================================================================
[   47.050390] ==================================================================
[   47.057489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   47.064776] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   47.072068] 
[   47.073549] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   47.073606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.073622] Hardware name: WinLink E850-96 board (DT)
[   47.073641] Call trace:
[   47.073654]  show_stack+0x20/0x38 (C)
[   47.073689]  dump_stack_lvl+0x8c/0xd0
[   47.073724]  print_report+0x118/0x608
[   47.073755]  kasan_report+0xdc/0x128
[   47.073785]  kasan_check_range+0x100/0x1a8
[   47.073820]  __kasan_check_read+0x20/0x30
[   47.073854]  kasan_atomics_helper+0x1ec/0x4858
[   47.073886]  kasan_atomics+0x198/0x2e0
[   47.073917]  kunit_try_run_case+0x170/0x3f0
[   47.073950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.073985]  kthread+0x328/0x630
[   47.074018]  ret_from_fork+0x10/0x20
[   47.074051] 
[   47.144896] Allocated by task 310:
[   47.148284]  kasan_save_stack+0x3c/0x68
[   47.152101]  kasan_save_track+0x20/0x40
[   47.155921]  kasan_save_alloc_info+0x40/0x58
[   47.160174]  __kasan_kmalloc+0xd4/0xd8
[   47.163907]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.168421]  kasan_atomics+0xb8/0x2e0
[   47.172066]  kunit_try_run_case+0x170/0x3f0
[   47.176233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.181703]  kthread+0x328/0x630
[   47.184913]  ret_from_fork+0x10/0x20
[   47.188472] 
[   47.189951] The buggy address belongs to the object at ffff00080243ed00
[   47.189951]  which belongs to the cache kmalloc-64 of size 64
[   47.202276] The buggy address is located 0 bytes to the right of
[   47.202276]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   47.215121] 
[   47.216597] The buggy address belongs to the physical page:
[   47.222156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   47.230141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.236650] page_type: f5(slab)
[   47.239781] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.247506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.255225] page dumped because: kasan: bad access detected
[   47.260780] 
[   47.262256] Memory state around the buggy address:
[   47.267034]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.274239]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.281444] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.288644]                                      ^
[   47.293423]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.300629]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.307828] ==================================================================
[   56.819584] ==================================================================
[   56.826612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   56.833900] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   56.841278] 
[   56.842761] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   56.842812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.842828] Hardware name: WinLink E850-96 board (DT)
[   56.842848] Call trace:
[   56.842863]  show_stack+0x20/0x38 (C)
[   56.842894]  dump_stack_lvl+0x8c/0xd0
[   56.842925]  print_report+0x118/0x608
[   56.842957]  kasan_report+0xdc/0x128
[   56.842987]  kasan_check_range+0x100/0x1a8
[   56.843021]  __kasan_check_write+0x20/0x30
[   56.843056]  kasan_atomics_helper+0xeb8/0x4858
[   56.843089]  kasan_atomics+0x198/0x2e0
[   56.843118]  kunit_try_run_case+0x170/0x3f0
[   56.843150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.843184]  kthread+0x328/0x630
[   56.843216]  ret_from_fork+0x10/0x20
[   56.843250] 
[   56.914194] Allocated by task 310:
[   56.917582]  kasan_save_stack+0x3c/0x68
[   56.921400]  kasan_save_track+0x20/0x40
[   56.925218]  kasan_save_alloc_info+0x40/0x58
[   56.929472]  __kasan_kmalloc+0xd4/0xd8
[   56.933205]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.937718]  kasan_atomics+0xb8/0x2e0
[   56.941364]  kunit_try_run_case+0x170/0x3f0
[   56.945531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.950999]  kthread+0x328/0x630
[   56.954211]  ret_from_fork+0x10/0x20
[   56.957770] 
[   56.959247] The buggy address belongs to the object at ffff00080243ed00
[   56.959247]  which belongs to the cache kmalloc-64 of size 64
[   56.971575] The buggy address is located 0 bytes to the right of
[   56.971575]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   56.984419] 
[   56.985895] The buggy address belongs to the physical page:
[   56.991454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   56.999437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.005946] page_type: f5(slab)
[   57.009081] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.016803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.024523] page dumped because: kasan: bad access detected
[   57.030078] 
[   57.031553] Memory state around the buggy address:
[   57.036331]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.043536]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.050741] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.057942]                                      ^
[   57.062720]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.069926]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.077126] ==================================================================
[   48.106552] ==================================================================
[   48.113547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   48.120837] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   48.128215] 
[   48.129697] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   48.129749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.129765] Hardware name: WinLink E850-96 board (DT)
[   48.129786] Call trace:
[   48.129799]  show_stack+0x20/0x38 (C)
[   48.129834]  dump_stack_lvl+0x8c/0xd0
[   48.129865]  print_report+0x118/0x608
[   48.129899]  kasan_report+0xdc/0x128
[   48.129929]  kasan_check_range+0x100/0x1a8
[   48.129960]  __kasan_check_write+0x20/0x30
[   48.129995]  kasan_atomics_helper+0x32c/0x4858
[   48.130026]  kasan_atomics+0x198/0x2e0
[   48.130056]  kunit_try_run_case+0x170/0x3f0
[   48.130086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.130121]  kthread+0x328/0x630
[   48.130153]  ret_from_fork+0x10/0x20
[   48.130187] 
[   48.201131] Allocated by task 310:
[   48.204520]  kasan_save_stack+0x3c/0x68
[   48.208336]  kasan_save_track+0x20/0x40
[   48.212155]  kasan_save_alloc_info+0x40/0x58
[   48.216408]  __kasan_kmalloc+0xd4/0xd8
[   48.220141]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.224655]  kasan_atomics+0xb8/0x2e0
[   48.228300]  kunit_try_run_case+0x170/0x3f0
[   48.232467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.237936]  kthread+0x328/0x630
[   48.241147]  ret_from_fork+0x10/0x20
[   48.244706] 
[   48.246184] The buggy address belongs to the object at ffff00080243ed00
[   48.246184]  which belongs to the cache kmalloc-64 of size 64
[   48.258509] The buggy address is located 0 bytes to the right of
[   48.258509]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   48.271355] 
[   48.272831] The buggy address belongs to the physical page:
[   48.278389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   48.286373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.292884] page_type: f5(slab)
[   48.296019] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.303740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.311459] page dumped because: kasan: bad access detected
[   48.317014] 
[   48.318490] Memory state around the buggy address:
[   48.323270]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.330473]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.337677] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.344878]                                      ^
[   48.349657]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.356863]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.364062] ==================================================================
[   51.812349] ==================================================================
[   51.819394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   51.826771] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   51.834062] 
[   51.835542] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.835591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.835606] Hardware name: WinLink E850-96 board (DT)
[   51.835626] Call trace:
[   51.835641]  show_stack+0x20/0x38 (C)
[   51.835674]  dump_stack_lvl+0x8c/0xd0
[   51.835707]  print_report+0x118/0x608
[   51.835738]  kasan_report+0xdc/0x128
[   51.835768]  __asan_report_load4_noabort+0x20/0x30
[   51.835806]  kasan_atomics_helper+0x42d8/0x4858
[   51.835838]  kasan_atomics+0x198/0x2e0
[   51.835869]  kunit_try_run_case+0x170/0x3f0
[   51.835900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.835937]  kthread+0x328/0x630
[   51.835969]  ret_from_fork+0x10/0x20
[   51.836002] 
[   51.903679] Allocated by task 310:
[   51.907067]  kasan_save_stack+0x3c/0x68
[   51.910884]  kasan_save_track+0x20/0x40
[   51.914704]  kasan_save_alloc_info+0x40/0x58
[   51.918957]  __kasan_kmalloc+0xd4/0xd8
[   51.922690]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.927203]  kasan_atomics+0xb8/0x2e0
[   51.930849]  kunit_try_run_case+0x170/0x3f0
[   51.935016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.940484]  kthread+0x328/0x630
[   51.943696]  ret_from_fork+0x10/0x20
[   51.947255] 
[   51.948730] The buggy address belongs to the object at ffff00080243ed00
[   51.948730]  which belongs to the cache kmalloc-64 of size 64
[   51.961057] The buggy address is located 0 bytes to the right of
[   51.961057]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   51.973904] 
[   51.975380] The buggy address belongs to the physical page:
[   51.980939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   51.988923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.995431] page_type: f5(slab)
[   51.998564] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.006289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.014007] page dumped because: kasan: bad access detected
[   52.019563] 
[   52.021038] Memory state around the buggy address:
[   52.025816]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.033021]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.040226] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.047427]                                      ^
[   52.052205]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.059411]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.066611] ==================================================================
[   61.587194] ==================================================================
[   61.594248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   61.601624] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   61.608915] 
[   61.610397] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   61.610446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.610464] Hardware name: WinLink E850-96 board (DT)
[   61.610486] Call trace:
[   61.610499]  show_stack+0x20/0x38 (C)
[   61.610533]  dump_stack_lvl+0x8c/0xd0
[   61.610565]  print_report+0x118/0x608
[   61.610598]  kasan_report+0xdc/0x128
[   61.610629]  __asan_report_load8_noabort+0x20/0x30
[   61.610666]  kasan_atomics_helper+0x3db0/0x4858
[   61.610698]  kasan_atomics+0x198/0x2e0
[   61.610727]  kunit_try_run_case+0x170/0x3f0
[   61.610756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.610792]  kthread+0x328/0x630
[   61.610823]  ret_from_fork+0x10/0x20
[   61.610857] 
[   61.678532] Allocated by task 310:
[   61.681921]  kasan_save_stack+0x3c/0x68
[   61.685737]  kasan_save_track+0x20/0x40
[   61.689557]  kasan_save_alloc_info+0x40/0x58
[   61.693810]  __kasan_kmalloc+0xd4/0xd8
[   61.697543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.702057]  kasan_atomics+0xb8/0x2e0
[   61.705702]  kunit_try_run_case+0x170/0x3f0
[   61.709869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.715337]  kthread+0x328/0x630
[   61.718549]  ret_from_fork+0x10/0x20
[   61.722108] 
[   61.723583] The buggy address belongs to the object at ffff00080243ed00
[   61.723583]  which belongs to the cache kmalloc-64 of size 64
[   61.735912] The buggy address is located 0 bytes to the right of
[   61.735912]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   61.748757] 
[   61.750233] The buggy address belongs to the physical page:
[   61.755792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   61.763775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.770286] page_type: f5(slab)
[   61.773417] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.781142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.788861] page dumped because: kasan: bad access detected
[   61.794416] 
[   61.795892] Memory state around the buggy address:
[   61.800671]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.807874]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.815079] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.822280]                                      ^
[   61.827058]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.834264]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.841464] ==================================================================
[   63.429010] ==================================================================
[   63.436063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   63.443437] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   63.450815] 
[   63.452296] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   63.452343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.452361] Hardware name: WinLink E850-96 board (DT)
[   63.452382] Call trace:
[   63.452393]  show_stack+0x20/0x38 (C)
[   63.452426]  dump_stack_lvl+0x8c/0xd0
[   63.452457]  print_report+0x118/0x608
[   63.452488]  kasan_report+0xdc/0x128
[   63.452519]  kasan_check_range+0x100/0x1a8
[   63.452554]  __kasan_check_write+0x20/0x30
[   63.452589]  kasan_atomics_helper+0x17ec/0x4858
[   63.452622]  kasan_atomics+0x198/0x2e0
[   63.452651]  kunit_try_run_case+0x170/0x3f0
[   63.452681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.452718]  kthread+0x328/0x630
[   63.452750]  ret_from_fork+0x10/0x20
[   63.452782] 
[   63.523817] Allocated by task 310:
[   63.527204]  kasan_save_stack+0x3c/0x68
[   63.531022]  kasan_save_track+0x20/0x40
[   63.534842]  kasan_save_alloc_info+0x40/0x58
[   63.539095]  __kasan_kmalloc+0xd4/0xd8
[   63.542827]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.547341]  kasan_atomics+0xb8/0x2e0
[   63.550987]  kunit_try_run_case+0x170/0x3f0
[   63.555154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.560622]  kthread+0x328/0x630
[   63.563834]  ret_from_fork+0x10/0x20
[   63.567393] 
[   63.568870] The buggy address belongs to the object at ffff00080243ed00
[   63.568870]  which belongs to the cache kmalloc-64 of size 64
[   63.581197] The buggy address is located 0 bytes to the right of
[   63.581197]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   63.594042] 
[   63.595518] The buggy address belongs to the physical page:
[   63.601077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   63.609061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.615571] page_type: f5(slab)
[   63.618702] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.626426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.634145] page dumped because: kasan: bad access detected
[   63.639700] 
[   63.641176] Memory state around the buggy address:
[   63.645956]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.653159]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.660364] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.667565]                                      ^
[   63.672343]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.679549]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.686749] ==================================================================
[   52.074086] ==================================================================
[   52.081024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   52.088313] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   52.095690] 
[   52.097173] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   52.097224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.097240] Hardware name: WinLink E850-96 board (DT)
[   52.097262] Call trace:
[   52.097274]  show_stack+0x20/0x38 (C)
[   52.097308]  dump_stack_lvl+0x8c/0xd0
[   52.097340]  print_report+0x118/0x608
[   52.097371]  kasan_report+0xdc/0x128
[   52.097401]  kasan_check_range+0x100/0x1a8
[   52.097433]  __kasan_check_write+0x20/0x30
[   52.097468]  kasan_atomics_helper+0x934/0x4858
[   52.097500]  kasan_atomics+0x198/0x2e0
[   52.097529]  kunit_try_run_case+0x170/0x3f0
[   52.097560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.097594]  kthread+0x328/0x630
[   52.097628]  ret_from_fork+0x10/0x20
[   52.097659] 
[   52.168605] Allocated by task 310:
[   52.171995]  kasan_save_stack+0x3c/0x68
[   52.175811]  kasan_save_track+0x20/0x40
[   52.179630]  kasan_save_alloc_info+0x40/0x58
[   52.183883]  __kasan_kmalloc+0xd4/0xd8
[   52.187616]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.192130]  kasan_atomics+0xb8/0x2e0
[   52.195776]  kunit_try_run_case+0x170/0x3f0
[   52.199942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.205411]  kthread+0x328/0x630
[   52.208623]  ret_from_fork+0x10/0x20
[   52.212182] 
[   52.213658] The buggy address belongs to the object at ffff00080243ed00
[   52.213658]  which belongs to the cache kmalloc-64 of size 64
[   52.225984] The buggy address is located 0 bytes to the right of
[   52.225984]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   52.238830] 
[   52.240308] The buggy address belongs to the physical page:
[   52.245865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   52.253850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.260358] page_type: f5(slab)
[   52.263491] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.271215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.278934] page dumped because: kasan: bad access detected
[   52.284489] 
[   52.285965] Memory state around the buggy address:
[   52.290745]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.297948]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.305153] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.312354]                                      ^
[   52.317131]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.324338]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.331538] ==================================================================
[   46.788771] ==================================================================
[   46.795688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   46.803061] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   46.810440] 
[   46.811925] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   46.811980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.811997] Hardware name: WinLink E850-96 board (DT)
[   46.812019] Call trace:
[   46.812034]  show_stack+0x20/0x38 (C)
[   46.812072]  dump_stack_lvl+0x8c/0xd0
[   46.812104]  print_report+0x118/0x608
[   46.812137]  kasan_report+0xdc/0x128
[   46.812167]  __asan_report_store4_noabort+0x20/0x30
[   46.812204]  kasan_atomics_helper+0x3f7c/0x4858
[   46.812240]  kasan_atomics+0x198/0x2e0
[   46.812269]  kunit_try_run_case+0x170/0x3f0
[   46.812303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.812343]  kthread+0x328/0x630
[   46.812381]  ret_from_fork+0x10/0x20
[   46.812418] 
[   46.880143] Allocated by task 310:
[   46.883532]  kasan_save_stack+0x3c/0x68
[   46.887348]  kasan_save_track+0x20/0x40
[   46.891168]  kasan_save_alloc_info+0x40/0x58
[   46.895421]  __kasan_kmalloc+0xd4/0xd8
[   46.899154]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.903667]  kasan_atomics+0xb8/0x2e0
[   46.907313]  kunit_try_run_case+0x170/0x3f0
[   46.911480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.916948]  kthread+0x328/0x630
[   46.920160]  ret_from_fork+0x10/0x20
[   46.923719] 
[   46.925198] The buggy address belongs to the object at ffff00080243ed00
[   46.925198]  which belongs to the cache kmalloc-64 of size 64
[   46.937525] The buggy address is located 0 bytes to the right of
[   46.937525]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   46.950368] 
[   46.951846] The buggy address belongs to the physical page:
[   46.957403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   46.965387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.971897] page_type: f5(slab)
[   46.975032] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.982753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.990472] page dumped because: kasan: bad access detected
[   46.996027] 
[   46.997503] Memory state around the buggy address:
[   47.002281]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.009486]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.016692] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.023891]                                      ^
[   47.028669]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.035875]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.043077] ==================================================================
[   52.603827] ==================================================================
[   52.610877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.618166] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   52.625543] 
[   52.627024] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   52.627071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.627088] Hardware name: WinLink E850-96 board (DT)
[   52.627110] Call trace:
[   52.627123]  show_stack+0x20/0x38 (C)
[   52.627155]  dump_stack_lvl+0x8c/0xd0
[   52.627185]  print_report+0x118/0x608
[   52.627216]  kasan_report+0xdc/0x128
[   52.627246]  kasan_check_range+0x100/0x1a8
[   52.627278]  __kasan_check_write+0x20/0x30
[   52.627313]  kasan_atomics_helper+0xa04/0x4858
[   52.627347]  kasan_atomics+0x198/0x2e0
[   52.627375]  kunit_try_run_case+0x170/0x3f0
[   52.627406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.627440]  kthread+0x328/0x630
[   52.627470]  ret_from_fork+0x10/0x20
[   52.627502] 
[   52.698459] Allocated by task 310:
[   52.701846]  kasan_save_stack+0x3c/0x68
[   52.705664]  kasan_save_track+0x20/0x40
[   52.709483]  kasan_save_alloc_info+0x40/0x58
[   52.713737]  __kasan_kmalloc+0xd4/0xd8
[   52.717469]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.721983]  kasan_atomics+0xb8/0x2e0
[   52.725629]  kunit_try_run_case+0x170/0x3f0
[   52.729795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.735264]  kthread+0x328/0x630
[   52.738476]  ret_from_fork+0x10/0x20
[   52.742035] 
[   52.743512] The buggy address belongs to the object at ffff00080243ed00
[   52.743512]  which belongs to the cache kmalloc-64 of size 64
[   52.755838] The buggy address is located 0 bytes to the right of
[   52.755838]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   52.768684] 
[   52.770159] The buggy address belongs to the physical page:
[   52.775718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   52.783702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.790211] page_type: f5(slab)
[   52.793344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.801068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.808787] page dumped because: kasan: bad access detected
[   52.814342] 
[   52.815818] Memory state around the buggy address:
[   52.820596]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.827801]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.835007] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.842207]                                      ^
[   52.846984]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.854191]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.861391] ==================================================================
[   53.398612] ==================================================================
[   53.405655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.413032] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   53.420323] 
[   53.421804] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   53.421854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.421871] Hardware name: WinLink E850-96 board (DT)
[   53.421890] Call trace:
[   53.421905]  show_stack+0x20/0x38 (C)
[   53.421939]  dump_stack_lvl+0x8c/0xd0
[   53.421971]  print_report+0x118/0x608
[   53.422004]  kasan_report+0xdc/0x128
[   53.422034]  __asan_report_load4_noabort+0x20/0x30
[   53.422071]  kasan_atomics_helper+0x3dcc/0x4858
[   53.422102]  kasan_atomics+0x198/0x2e0
[   53.422131]  kunit_try_run_case+0x170/0x3f0
[   53.422161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.422199]  kthread+0x328/0x630
[   53.422231]  ret_from_fork+0x10/0x20
[   53.422261] 
[   53.489940] Allocated by task 310:
[   53.493328]  kasan_save_stack+0x3c/0x68
[   53.497145]  kasan_save_track+0x20/0x40
[   53.500965]  kasan_save_alloc_info+0x40/0x58
[   53.505218]  __kasan_kmalloc+0xd4/0xd8
[   53.508950]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.513464]  kasan_atomics+0xb8/0x2e0
[   53.517110]  kunit_try_run_case+0x170/0x3f0
[   53.521277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.526745]  kthread+0x328/0x630
[   53.529957]  ret_from_fork+0x10/0x20
[   53.533516] 
[   53.534991] The buggy address belongs to the object at ffff00080243ed00
[   53.534991]  which belongs to the cache kmalloc-64 of size 64
[   53.547320] The buggy address is located 0 bytes to the right of
[   53.547320]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   53.560165] 
[   53.561641] The buggy address belongs to the physical page:
[   53.567199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   53.575182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.581692] page_type: f5(slab)
[   53.584825] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.592550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.600268] page dumped because: kasan: bad access detected
[   53.605824] 
[   53.607299] Memory state around the buggy address:
[   53.612078]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.619282]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.626487] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.633688]                                      ^
[   53.638466]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.645672]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.652872] ==================================================================
[   47.844821] ==================================================================
[   47.851919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   47.859295] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   47.866587] 
[   47.868067] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   47.868119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.868135] Hardware name: WinLink E850-96 board (DT)
[   47.868155] Call trace:
[   47.868167]  show_stack+0x20/0x38 (C)
[   47.868204]  dump_stack_lvl+0x8c/0xd0
[   47.868236]  print_report+0x118/0x608
[   47.868268]  kasan_report+0xdc/0x128
[   47.868299]  __asan_report_load4_noabort+0x20/0x30
[   47.868335]  kasan_atomics_helper+0x40fc/0x4858
[   47.868366]  kasan_atomics+0x198/0x2e0
[   47.868395]  kunit_try_run_case+0x170/0x3f0
[   47.868425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.868461]  kthread+0x328/0x630
[   47.868492]  ret_from_fork+0x10/0x20
[   47.868525] 
[   47.936205] Allocated by task 310:
[   47.939593]  kasan_save_stack+0x3c/0x68
[   47.943409]  kasan_save_track+0x20/0x40
[   47.947228]  kasan_save_alloc_info+0x40/0x58
[   47.951482]  __kasan_kmalloc+0xd4/0xd8
[   47.955214]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.959728]  kasan_atomics+0xb8/0x2e0
[   47.963374]  kunit_try_run_case+0x170/0x3f0
[   47.967541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.973011]  kthread+0x328/0x630
[   47.976221]  ret_from_fork+0x10/0x20
[   47.979780] 
[   47.981257] The buggy address belongs to the object at ffff00080243ed00
[   47.981257]  which belongs to the cache kmalloc-64 of size 64
[   47.993582] The buggy address is located 0 bytes to the right of
[   47.993582]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   48.006429] 
[   48.007904] The buggy address belongs to the physical page:
[   48.013462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   48.021447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.027958] page_type: f5(slab)
[   48.031089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.038813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.046532] page dumped because: kasan: bad access detected
[   48.052087] 
[   48.053563] Memory state around the buggy address:
[   48.058343]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.065546]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.072751] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.079952]                                      ^
[   48.084730]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.091936]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.099136] ==================================================================
[   49.163060] ==================================================================
[   49.170131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   49.177418] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   49.184796] 
[   49.186280] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   49.186328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.186343] Hardware name: WinLink E850-96 board (DT)
[   49.186365] Call trace:
[   49.186378]  show_stack+0x20/0x38 (C)
[   49.186411]  dump_stack_lvl+0x8c/0xd0
[   49.186441]  print_report+0x118/0x608
[   49.186470]  kasan_report+0xdc/0x128
[   49.186501]  kasan_check_range+0x100/0x1a8
[   49.186535]  __kasan_check_write+0x20/0x30
[   49.186568]  kasan_atomics_helper+0x47c/0x4858
[   49.186602]  kasan_atomics+0x198/0x2e0
[   49.186632]  kunit_try_run_case+0x170/0x3f0
[   49.186663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.186696]  kthread+0x328/0x630
[   49.186727]  ret_from_fork+0x10/0x20
[   49.186760] 
[   49.257712] Allocated by task 310:
[   49.261100]  kasan_save_stack+0x3c/0x68
[   49.264917]  kasan_save_track+0x20/0x40
[   49.268736]  kasan_save_alloc_info+0x40/0x58
[   49.272990]  __kasan_kmalloc+0xd4/0xd8
[   49.276722]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.281236]  kasan_atomics+0xb8/0x2e0
[   49.284882]  kunit_try_run_case+0x170/0x3f0
[   49.289048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.294517]  kthread+0x328/0x630
[   49.297729]  ret_from_fork+0x10/0x20
[   49.301288] 
[   49.302763] The buggy address belongs to the object at ffff00080243ed00
[   49.302763]  which belongs to the cache kmalloc-64 of size 64
[   49.315091] The buggy address is located 0 bytes to the right of
[   49.315091]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   49.327937] 
[   49.329412] The buggy address belongs to the physical page:
[   49.334972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   49.342956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.349464] page_type: f5(slab)
[   49.352597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.360321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.368040] page dumped because: kasan: bad access detected
[   49.373596] 
[   49.375071] Memory state around the buggy address:
[   49.379850]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.387054]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.394259] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.401460]                                      ^
[   49.406238]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.413444]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.420644] ==================================================================
[   54.451743] ==================================================================
[   54.458765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   54.466141] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   54.473432] 
[   54.474915] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   54.474967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.474982] Hardware name: WinLink E850-96 board (DT)
[   54.475004] Call trace:
[   54.475018]  show_stack+0x20/0x38 (C)
[   54.475049]  dump_stack_lvl+0x8c/0xd0
[   54.475081]  print_report+0x118/0x608
[   54.475110]  kasan_report+0xdc/0x128
[   54.475139]  __asan_report_load4_noabort+0x20/0x30
[   54.475176]  kasan_atomics_helper+0x3de4/0x4858
[   54.475208]  kasan_atomics+0x198/0x2e0
[   54.475237]  kunit_try_run_case+0x170/0x3f0
[   54.475268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.475303]  kthread+0x328/0x630
[   54.475335]  ret_from_fork+0x10/0x20
[   54.475366] 
[   54.543049] Allocated by task 310:
[   54.546437]  kasan_save_stack+0x3c/0x68
[   54.550254]  kasan_save_track+0x20/0x40
[   54.554074]  kasan_save_alloc_info+0x40/0x58
[   54.558327]  __kasan_kmalloc+0xd4/0xd8
[   54.562060]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.566573]  kasan_atomics+0xb8/0x2e0
[   54.570219]  kunit_try_run_case+0x170/0x3f0
[   54.574386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.579854]  kthread+0x328/0x630
[   54.583066]  ret_from_fork+0x10/0x20
[   54.586625] 
[   54.588101] The buggy address belongs to the object at ffff00080243ed00
[   54.588101]  which belongs to the cache kmalloc-64 of size 64
[   54.600429] The buggy address is located 0 bytes to the right of
[   54.600429]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   54.613274] 
[   54.614750] The buggy address belongs to the physical page:
[   54.620309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   54.628293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.634803] page_type: f5(slab)
[   54.637936] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.645659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.653377] page dumped because: kasan: bad access detected
[   54.658933] 
[   54.660408] Memory state around the buggy address:
[   54.665187]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.672391]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.679596] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.686797]                                      ^
[   54.691575]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.698781]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.705981] ==================================================================
[   62.640657] ==================================================================
[   62.647706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   62.655081] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   62.662372] 
[   62.663853] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   62.663902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.663918] Hardware name: WinLink E850-96 board (DT)
[   62.663939] Call trace:
[   62.663953]  show_stack+0x20/0x38 (C)
[   62.663986]  dump_stack_lvl+0x8c/0xd0
[   62.664017]  print_report+0x118/0x608
[   62.664048]  kasan_report+0xdc/0x128
[   62.664080]  __asan_report_load8_noabort+0x20/0x30
[   62.664116]  kasan_atomics_helper+0x3e10/0x4858
[   62.664148]  kasan_atomics+0x198/0x2e0
[   62.664177]  kunit_try_run_case+0x170/0x3f0
[   62.664211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.664245]  kthread+0x328/0x630
[   62.664276]  ret_from_fork+0x10/0x20
[   62.664307] 
[   62.731988] Allocated by task 310:
[   62.735376]  kasan_save_stack+0x3c/0x68
[   62.739194]  kasan_save_track+0x20/0x40
[   62.743013]  kasan_save_alloc_info+0x40/0x58
[   62.747267]  __kasan_kmalloc+0xd4/0xd8
[   62.750999]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.755513]  kasan_atomics+0xb8/0x2e0
[   62.759159]  kunit_try_run_case+0x170/0x3f0
[   62.763325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.768794]  kthread+0x328/0x630
[   62.772006]  ret_from_fork+0x10/0x20
[   62.775565] 
[   62.777042] The buggy address belongs to the object at ffff00080243ed00
[   62.777042]  which belongs to the cache kmalloc-64 of size 64
[   62.789368] The buggy address is located 0 bytes to the right of
[   62.789368]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   62.802213] 
[   62.803689] The buggy address belongs to the physical page:
[   62.809248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   62.817233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.823742] page_type: f5(slab)
[   62.826874] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.834598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.842317] page dumped because: kasan: bad access detected
[   62.847872] 
[   62.849348] Memory state around the buggy address:
[   62.854126]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.861331]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.868536] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.875737]                                      ^
[   62.880515]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.887721]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.894920] ==================================================================
[   63.167385] ==================================================================
[   63.174433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   63.181809] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   63.189100] 
[   63.190581] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   63.190630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.190647] Hardware name: WinLink E850-96 board (DT)
[   63.190663] Call trace:
[   63.190676]  show_stack+0x20/0x38 (C)
[   63.190710]  dump_stack_lvl+0x8c/0xd0
[   63.190742]  print_report+0x118/0x608
[   63.190774]  kasan_report+0xdc/0x128
[   63.190804]  __asan_report_load8_noabort+0x20/0x30
[   63.190839]  kasan_atomics_helper+0x3e20/0x4858
[   63.190871]  kasan_atomics+0x198/0x2e0
[   63.190902]  kunit_try_run_case+0x170/0x3f0
[   63.190933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.190968]  kthread+0x328/0x630
[   63.191003]  ret_from_fork+0x10/0x20
[   63.191034] 
[   63.258717] Allocated by task 310:
[   63.262104]  kasan_save_stack+0x3c/0x68
[   63.265922]  kasan_save_track+0x20/0x40
[   63.269742]  kasan_save_alloc_info+0x40/0x58
[   63.273995]  __kasan_kmalloc+0xd4/0xd8
[   63.277727]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.282241]  kasan_atomics+0xb8/0x2e0
[   63.285887]  kunit_try_run_case+0x170/0x3f0
[   63.290054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.295522]  kthread+0x328/0x630
[   63.298734]  ret_from_fork+0x10/0x20
[   63.302293] 
[   63.303770] The buggy address belongs to the object at ffff00080243ed00
[   63.303770]  which belongs to the cache kmalloc-64 of size 64
[   63.316095] The buggy address is located 0 bytes to the right of
[   63.316095]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   63.328942] 
[   63.330418] The buggy address belongs to the physical page:
[   63.335975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   63.343961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.350471] page_type: f5(slab)
[   63.353602] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.361326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.369045] page dumped because: kasan: bad access detected
[   63.374601] 
[   63.376076] Memory state around the buggy address:
[   63.380856]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.388059]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.395264] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.402465]                                      ^
[   63.407243]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.414449]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.421649] ==================================================================
[   47.580079] ==================================================================
[   47.587165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   47.594458] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   47.601748] 
[   47.603229] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   47.603282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.603298] Hardware name: WinLink E850-96 board (DT)
[   47.603317] Call trace:
[   47.603332]  show_stack+0x20/0x38 (C)
[   47.603365]  dump_stack_lvl+0x8c/0xd0
[   47.603398]  print_report+0x118/0x608
[   47.603431]  kasan_report+0xdc/0x128
[   47.603461]  kasan_check_range+0x100/0x1a8
[   47.603495]  __kasan_check_read+0x20/0x30
[   47.603530]  kasan_atomics_helper+0x2b0/0x4858
[   47.603562]  kasan_atomics+0x198/0x2e0
[   47.603591]  kunit_try_run_case+0x170/0x3f0
[   47.603624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.603660]  kthread+0x328/0x630
[   47.603691]  ret_from_fork+0x10/0x20
[   47.603724] 
[   47.674576] Allocated by task 310:
[   47.677963]  kasan_save_stack+0x3c/0x68
[   47.681781]  kasan_save_track+0x20/0x40
[   47.685600]  kasan_save_alloc_info+0x40/0x58
[   47.689854]  __kasan_kmalloc+0xd4/0xd8
[   47.693587]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.698100]  kasan_atomics+0xb8/0x2e0
[   47.701746]  kunit_try_run_case+0x170/0x3f0
[   47.705912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.711382]  kthread+0x328/0x630
[   47.714592]  ret_from_fork+0x10/0x20
[   47.718152] 
[   47.719629] The buggy address belongs to the object at ffff00080243ed00
[   47.719629]  which belongs to the cache kmalloc-64 of size 64
[   47.731954] The buggy address is located 0 bytes to the right of
[   47.731954]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   47.744801] 
[   47.746276] The buggy address belongs to the physical page:
[   47.751834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   47.759820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.766329] page_type: f5(slab)
[   47.769461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.777185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.784904] page dumped because: kasan: bad access detected
[   47.790459] 
[   47.791935] Memory state around the buggy address:
[   47.796716]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.803918]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.811123] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.818324]                                      ^
[   47.823102]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.830308]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.837508] ==================================================================
[   59.204777] ==================================================================
[   59.211820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   59.219195] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   59.226573] 
[   59.228054] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   59.228106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.228121] Hardware name: WinLink E850-96 board (DT)
[   59.228139] Call trace:
[   59.228154]  show_stack+0x20/0x38 (C)
[   59.228188]  dump_stack_lvl+0x8c/0xd0
[   59.228219]  print_report+0x118/0x608
[   59.228250]  kasan_report+0xdc/0x128
[   59.228281]  kasan_check_range+0x100/0x1a8
[   59.228312]  __kasan_check_write+0x20/0x30
[   59.228347]  kasan_atomics_helper+0x126c/0x4858
[   59.228377]  kasan_atomics+0x198/0x2e0
[   59.228407]  kunit_try_run_case+0x170/0x3f0
[   59.228439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.228475]  kthread+0x328/0x630
[   59.228505]  ret_from_fork+0x10/0x20
[   59.228538] 
[   59.299575] Allocated by task 310:
[   59.302962]  kasan_save_stack+0x3c/0x68
[   59.306780]  kasan_save_track+0x20/0x40
[   59.310599]  kasan_save_alloc_info+0x40/0x58
[   59.314853]  __kasan_kmalloc+0xd4/0xd8
[   59.318586]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.323099]  kasan_atomics+0xb8/0x2e0
[   59.326745]  kunit_try_run_case+0x170/0x3f0
[   59.330911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.336380]  kthread+0x328/0x630
[   59.339592]  ret_from_fork+0x10/0x20
[   59.343151] 
[   59.344628] The buggy address belongs to the object at ffff00080243ed00
[   59.344628]  which belongs to the cache kmalloc-64 of size 64
[   59.356954] The buggy address is located 0 bytes to the right of
[   59.356954]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   59.369800] 
[   59.371276] The buggy address belongs to the physical page:
[   59.376835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   59.384818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.391327] page_type: f5(slab)
[   59.394460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.402184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.409903] page dumped because: kasan: bad access detected
[   59.415459] 
[   59.416934] Memory state around the buggy address:
[   59.421714]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.428917]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.436122] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.443323]                                      ^
[   59.448101]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.455307]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.462507] ==================================================================
[   59.734972] ==================================================================
[   59.742018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   59.749395] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   59.756773] 
[   59.758255] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   59.758308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.758322] Hardware name: WinLink E850-96 board (DT)
[   59.758341] Call trace:
[   59.758355]  show_stack+0x20/0x38 (C)
[   59.758390]  dump_stack_lvl+0x8c/0xd0
[   59.758423]  print_report+0x118/0x608
[   59.758455]  kasan_report+0xdc/0x128
[   59.758485]  kasan_check_range+0x100/0x1a8
[   59.758519]  __kasan_check_write+0x20/0x30
[   59.758554]  kasan_atomics_helper+0x1384/0x4858
[   59.758586]  kasan_atomics+0x198/0x2e0
[   59.758615]  kunit_try_run_case+0x170/0x3f0
[   59.758646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.758682]  kthread+0x328/0x630
[   59.758715]  ret_from_fork+0x10/0x20
[   59.758748] 
[   59.829775] Allocated by task 310:
[   59.833163]  kasan_save_stack+0x3c/0x68
[   59.836980]  kasan_save_track+0x20/0x40
[   59.840800]  kasan_save_alloc_info+0x40/0x58
[   59.845053]  __kasan_kmalloc+0xd4/0xd8
[   59.848786]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.853300]  kasan_atomics+0xb8/0x2e0
[   59.856945]  kunit_try_run_case+0x170/0x3f0
[   59.861112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.866580]  kthread+0x328/0x630
[   59.869792]  ret_from_fork+0x10/0x20
[   59.873352] 
[   59.874827] The buggy address belongs to the object at ffff00080243ed00
[   59.874827]  which belongs to the cache kmalloc-64 of size 64
[   59.887156] The buggy address is located 0 bytes to the right of
[   59.887156]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   59.900000] 
[   59.901476] The buggy address belongs to the physical page:
[   59.907033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   59.915019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.921529] page_type: f5(slab)
[   59.924660] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.932385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.940104] page dumped because: kasan: bad access detected
[   59.945659] 
[   59.947135] Memory state around the buggy address:
[   59.951913]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.959118]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.966323] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.973523]                                      ^
[   59.978301]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.985507]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.992707] ==================================================================
[   55.504829] ==================================================================
[   55.511876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   55.519250] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   55.526542] 
[   55.528024] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   55.528071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.528087] Hardware name: WinLink E850-96 board (DT)
[   55.528109] Call trace:
[   55.528122]  show_stack+0x20/0x38 (C)
[   55.528154]  dump_stack_lvl+0x8c/0xd0
[   55.528187]  print_report+0x118/0x608
[   55.528218]  kasan_report+0xdc/0x128
[   55.528250]  __asan_report_load4_noabort+0x20/0x30
[   55.528286]  kasan_atomics_helper+0x3e04/0x4858
[   55.528319]  kasan_atomics+0x198/0x2e0
[   55.528349]  kunit_try_run_case+0x170/0x3f0
[   55.528378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.528415]  kthread+0x328/0x630
[   55.528449]  ret_from_fork+0x10/0x20
[   55.528484] 
[   55.596158] Allocated by task 310:
[   55.599547]  kasan_save_stack+0x3c/0x68
[   55.603364]  kasan_save_track+0x20/0x40
[   55.607183]  kasan_save_alloc_info+0x40/0x58
[   55.611436]  __kasan_kmalloc+0xd4/0xd8
[   55.615169]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.619683]  kasan_atomics+0xb8/0x2e0
[   55.623328]  kunit_try_run_case+0x170/0x3f0
[   55.627495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.632964]  kthread+0x328/0x630
[   55.636175]  ret_from_fork+0x10/0x20
[   55.639734] 
[   55.641210] The buggy address belongs to the object at ffff00080243ed00
[   55.641210]  which belongs to the cache kmalloc-64 of size 64
[   55.653537] The buggy address is located 0 bytes to the right of
[   55.653537]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   55.666383] 
[   55.667859] The buggy address belongs to the physical page:
[   55.673416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   55.681402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.687912] page_type: f5(slab)
[   55.691045] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.698768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.706487] page dumped because: kasan: bad access detected
[   55.712042] 
[   55.713518] Memory state around the buggy address:
[   55.718297]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.725501]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.732707] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.739906]                                      ^
[   55.744684]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.751889]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.759090] ==================================================================
[   49.428008] ==================================================================
[   49.435055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   49.442345] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   49.449723] 
[   49.451204] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   49.451256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.451272] Hardware name: WinLink E850-96 board (DT)
[   49.451292] Call trace:
[   49.451306]  show_stack+0x20/0x38 (C)
[   49.451337]  dump_stack_lvl+0x8c/0xd0
[   49.451368]  print_report+0x118/0x608
[   49.451398]  kasan_report+0xdc/0x128
[   49.451428]  kasan_check_range+0x100/0x1a8
[   49.451461]  __kasan_check_write+0x20/0x30
[   49.451496]  kasan_atomics_helper+0x4e4/0x4858
[   49.451526]  kasan_atomics+0x198/0x2e0
[   49.451556]  kunit_try_run_case+0x170/0x3f0
[   49.451586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.451620]  kthread+0x328/0x630
[   49.451655]  ret_from_fork+0x10/0x20
[   49.451686] 
[   49.522639] Allocated by task 310:
[   49.526026]  kasan_save_stack+0x3c/0x68
[   49.529844]  kasan_save_track+0x20/0x40
[   49.533663]  kasan_save_alloc_info+0x40/0x58
[   49.537916]  __kasan_kmalloc+0xd4/0xd8
[   49.541649]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.546163]  kasan_atomics+0xb8/0x2e0
[   49.549808]  kunit_try_run_case+0x170/0x3f0
[   49.553975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.559443]  kthread+0x328/0x630
[   49.562655]  ret_from_fork+0x10/0x20
[   49.566215] 
[   49.567691] The buggy address belongs to the object at ffff00080243ed00
[   49.567691]  which belongs to the cache kmalloc-64 of size 64
[   49.580016] The buggy address is located 0 bytes to the right of
[   49.580016]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   49.592863] 
[   49.594339] The buggy address belongs to the physical page:
[   49.599898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   49.607884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.614391] page_type: f5(slab)
[   49.617524] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.625248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.632967] page dumped because: kasan: bad access detected
[   49.638522] 
[   49.639998] Memory state around the buggy address:
[   49.644777]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.651981]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.659186] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.666387]                                      ^
[   49.671164]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.678369]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.685570] ==================================================================
[   56.292834] ==================================================================
[   56.299883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   56.307172] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   56.314550] 
[   56.316033] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   56.316085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.316099] Hardware name: WinLink E850-96 board (DT)
[   56.316118] Call trace:
[   56.316131]  show_stack+0x20/0x38 (C)
[   56.316165]  dump_stack_lvl+0x8c/0xd0
[   56.316198]  print_report+0x118/0x608
[   56.316229]  kasan_report+0xdc/0x128
[   56.316261]  kasan_check_range+0x100/0x1a8
[   56.316293]  __kasan_check_write+0x20/0x30
[   56.316330]  kasan_atomics_helper+0xe44/0x4858
[   56.316363]  kasan_atomics+0x198/0x2e0
[   56.316392]  kunit_try_run_case+0x170/0x3f0
[   56.316422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.316459]  kthread+0x328/0x630
[   56.316490]  ret_from_fork+0x10/0x20
[   56.316521] 
[   56.387466] Allocated by task 310:
[   56.390854]  kasan_save_stack+0x3c/0x68
[   56.394671]  kasan_save_track+0x20/0x40
[   56.398490]  kasan_save_alloc_info+0x40/0x58
[   56.402744]  __kasan_kmalloc+0xd4/0xd8
[   56.406476]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.410990]  kasan_atomics+0xb8/0x2e0
[   56.414636]  kunit_try_run_case+0x170/0x3f0
[   56.418802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.424271]  kthread+0x328/0x630
[   56.427483]  ret_from_fork+0x10/0x20
[   56.431042] 
[   56.432519] The buggy address belongs to the object at ffff00080243ed00
[   56.432519]  which belongs to the cache kmalloc-64 of size 64
[   56.444847] The buggy address is located 0 bytes to the right of
[   56.444847]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   56.457691] 
[   56.459166] The buggy address belongs to the physical page:
[   56.464725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   56.472709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.479219] page_type: f5(slab)
[   56.482351] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.490075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.497794] page dumped because: kasan: bad access detected
[   56.503350] 
[   56.504825] Memory state around the buggy address:
[   56.509604]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.516808]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.524013] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.531214]                                      ^
[   56.535992]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.543198]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.550398] ==================================================================
[   54.186763] ==================================================================
[   54.193838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   54.201127] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   54.208506] 
[   54.209988] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   54.210035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.210053] Hardware name: WinLink E850-96 board (DT)
[   54.210072] Call trace:
[   54.210086]  show_stack+0x20/0x38 (C)
[   54.210120]  dump_stack_lvl+0x8c/0xd0
[   54.210152]  print_report+0x118/0x608
[   54.210185]  kasan_report+0xdc/0x128
[   54.210215]  kasan_check_range+0x100/0x1a8
[   54.210249]  __kasan_check_write+0x20/0x30
[   54.210284]  kasan_atomics_helper+0xc08/0x4858
[   54.210315]  kasan_atomics+0x198/0x2e0
[   54.210346]  kunit_try_run_case+0x170/0x3f0
[   54.210378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.210412]  kthread+0x328/0x630
[   54.210444]  ret_from_fork+0x10/0x20
[   54.210473] 
[   54.281421] Allocated by task 310:
[   54.284810]  kasan_save_stack+0x3c/0x68
[   54.288626]  kasan_save_track+0x20/0x40
[   54.292446]  kasan_save_alloc_info+0x40/0x58
[   54.296699]  __kasan_kmalloc+0xd4/0xd8
[   54.300431]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.304945]  kasan_atomics+0xb8/0x2e0
[   54.308591]  kunit_try_run_case+0x170/0x3f0
[   54.312758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.318226]  kthread+0x328/0x630
[   54.321438]  ret_from_fork+0x10/0x20
[   54.324997] 
[   54.326474] The buggy address belongs to the object at ffff00080243ed00
[   54.326474]  which belongs to the cache kmalloc-64 of size 64
[   54.338801] The buggy address is located 0 bytes to the right of
[   54.338801]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   54.351646] 
[   54.353122] The buggy address belongs to the physical page:
[   54.358681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   54.366665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.373175] page_type: f5(slab)
[   54.376306] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.384031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.391750] page dumped because: kasan: bad access detected
[   54.397305] 
[   54.398780] Memory state around the buggy address:
[   54.403559]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.410763]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.417968] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.425169]                                      ^
[   54.429947]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.437153]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.444353] ==================================================================
[   60.000245] ==================================================================
[   60.007119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   60.014495] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   60.021786] 
[   60.023270] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   60.023322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.023338] Hardware name: WinLink E850-96 board (DT)
[   60.023358] Call trace:
[   60.023373]  show_stack+0x20/0x38 (C)
[   60.023406]  dump_stack_lvl+0x8c/0xd0
[   60.023439]  print_report+0x118/0x608
[   60.023472]  kasan_report+0xdc/0x128
[   60.023503]  __asan_report_load8_noabort+0x20/0x30
[   60.023542]  kasan_atomics_helper+0x3f04/0x4858
[   60.023573]  kasan_atomics+0x198/0x2e0
[   60.023603]  kunit_try_run_case+0x170/0x3f0
[   60.023637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.023675]  kthread+0x328/0x630
[   60.023706]  ret_from_fork+0x10/0x20
[   60.023741] 
[   60.091403] Allocated by task 310:
[   60.094791]  kasan_save_stack+0x3c/0x68
[   60.098609]  kasan_save_track+0x20/0x40
[   60.102428]  kasan_save_alloc_info+0x40/0x58
[   60.106681]  __kasan_kmalloc+0xd4/0xd8
[   60.110414]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.114927]  kasan_atomics+0xb8/0x2e0
[   60.118573]  kunit_try_run_case+0x170/0x3f0
[   60.122740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.128208]  kthread+0x328/0x630
[   60.131420]  ret_from_fork+0x10/0x20
[   60.134979] 
[   60.136456] The buggy address belongs to the object at ffff00080243ed00
[   60.136456]  which belongs to the cache kmalloc-64 of size 64
[   60.148784] The buggy address is located 0 bytes to the right of
[   60.148784]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   60.161628] 
[   60.163106] The buggy address belongs to the physical page:
[   60.168662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   60.176647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.183157] page_type: f5(slab)
[   60.186291] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.194013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.201732] page dumped because: kasan: bad access detected
[   60.207287] 
[   60.208762] Memory state around the buggy address:
[   60.213543]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.220746]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.227950] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.235152]                                      ^
[   60.239929]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.247135]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.254335] ==================================================================
[   53.133710] ==================================================================
[   53.140730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   53.148018] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   53.155397] 
[   53.156878] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   53.156928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.156948] Hardware name: WinLink E850-96 board (DT)
[   53.156969] Call trace:
[   53.156981]  show_stack+0x20/0x38 (C)
[   53.157014]  dump_stack_lvl+0x8c/0xd0
[   53.157047]  print_report+0x118/0x608
[   53.157078]  kasan_report+0xdc/0x128
[   53.157109]  kasan_check_range+0x100/0x1a8
[   53.157141]  __kasan_check_write+0x20/0x30
[   53.157176]  kasan_atomics_helper+0xad4/0x4858
[   53.157207]  kasan_atomics+0x198/0x2e0
[   53.157238]  kunit_try_run_case+0x170/0x3f0
[   53.157266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.157301]  kthread+0x328/0x630
[   53.157333]  ret_from_fork+0x10/0x20
[   53.157365] 
[   53.228312] Allocated by task 310:
[   53.231701]  kasan_save_stack+0x3c/0x68
[   53.235517]  kasan_save_track+0x20/0x40
[   53.239336]  kasan_save_alloc_info+0x40/0x58
[   53.243590]  __kasan_kmalloc+0xd4/0xd8
[   53.247322]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.251836]  kasan_atomics+0xb8/0x2e0
[   53.255482]  kunit_try_run_case+0x170/0x3f0
[   53.259649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.265117]  kthread+0x328/0x630
[   53.268329]  ret_from_fork+0x10/0x20
[   53.271888] 
[   53.273365] The buggy address belongs to the object at ffff00080243ed00
[   53.273365]  which belongs to the cache kmalloc-64 of size 64
[   53.285693] The buggy address is located 0 bytes to the right of
[   53.285693]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   53.298537] 
[   53.300012] The buggy address belongs to the physical page:
[   53.305572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   53.313554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.320064] page_type: f5(slab)
[   53.323199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.330922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.338640] page dumped because: kasan: bad access detected
[   53.344196] 
[   53.345671] Memory state around the buggy address:
[   53.350450]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.357654]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.364859] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.372060]                                      ^
[   53.376838]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.384044]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.391244] ==================================================================
[   61.848891] ==================================================================
[   61.855878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   61.863252] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   61.870631] 
[   61.872112] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   61.872162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.872175] Hardware name: WinLink E850-96 board (DT)
[   61.872196] Call trace:
[   61.872213]  show_stack+0x20/0x38 (C)
[   61.872246]  dump_stack_lvl+0x8c/0xd0
[   61.872275]  print_report+0x118/0x608
[   61.872307]  kasan_report+0xdc/0x128
[   61.872338]  kasan_check_range+0x100/0x1a8
[   61.872372]  __kasan_check_write+0x20/0x30
[   61.872407]  kasan_atomics_helper+0x1644/0x4858
[   61.872439]  kasan_atomics+0x198/0x2e0
[   61.872471]  kunit_try_run_case+0x170/0x3f0
[   61.872503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.872539]  kthread+0x328/0x630
[   61.872571]  ret_from_fork+0x10/0x20
[   61.872603] 
[   61.943632] Allocated by task 310:
[   61.947019]  kasan_save_stack+0x3c/0x68
[   61.950838]  kasan_save_track+0x20/0x40
[   61.954657]  kasan_save_alloc_info+0x40/0x58
[   61.958910]  __kasan_kmalloc+0xd4/0xd8
[   61.962643]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.967157]  kasan_atomics+0xb8/0x2e0
[   61.970802]  kunit_try_run_case+0x170/0x3f0
[   61.974969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.980438]  kthread+0x328/0x630
[   61.983649]  ret_from_fork+0x10/0x20
[   61.987208] 
[   61.988685] The buggy address belongs to the object at ffff00080243ed00
[   61.988685]  which belongs to the cache kmalloc-64 of size 64
[   62.001013] The buggy address is located 0 bytes to the right of
[   62.001013]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   62.013857] 
[   62.015334] The buggy address belongs to the physical page:
[   62.020892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   62.028875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.035386] page_type: f5(slab)
[   62.038517] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.046242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.053961] page dumped because: kasan: bad access detected
[   62.059516] 
[   62.060992] Memory state around the buggy address:
[   62.065772]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.072975]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.080180] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.087380]                                      ^
[   62.092158]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.099365]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.106564] ==================================================================
[   55.239904] ==================================================================
[   55.246948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   55.254236] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   55.261615] 
[   55.263098] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   55.263147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.263165] Hardware name: WinLink E850-96 board (DT)
[   55.263182] Call trace:
[   55.263197]  show_stack+0x20/0x38 (C)
[   55.263230]  dump_stack_lvl+0x8c/0xd0
[   55.263263]  print_report+0x118/0x608
[   55.263297]  kasan_report+0xdc/0x128
[   55.263327]  kasan_check_range+0x100/0x1a8
[   55.263361]  __kasan_check_write+0x20/0x30
[   55.263395]  kasan_atomics_helper+0xd3c/0x4858
[   55.263428]  kasan_atomics+0x198/0x2e0
[   55.263457]  kunit_try_run_case+0x170/0x3f0
[   55.263487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.263521]  kthread+0x328/0x630
[   55.263553]  ret_from_fork+0x10/0x20
[   55.263584] 
[   55.334531] Allocated by task 310:
[   55.337919]  kasan_save_stack+0x3c/0x68
[   55.341735]  kasan_save_track+0x20/0x40
[   55.345555]  kasan_save_alloc_info+0x40/0x58
[   55.349808]  __kasan_kmalloc+0xd4/0xd8
[   55.353540]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.358055]  kasan_atomics+0xb8/0x2e0
[   55.361700]  kunit_try_run_case+0x170/0x3f0
[   55.365867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.371335]  kthread+0x328/0x630
[   55.374547]  ret_from_fork+0x10/0x20
[   55.378106] 
[   55.379583] The buggy address belongs to the object at ffff00080243ed00
[   55.379583]  which belongs to the cache kmalloc-64 of size 64
[   55.391908] The buggy address is located 0 bytes to the right of
[   55.391908]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   55.404755] 
[   55.406231] The buggy address belongs to the physical page:
[   55.411790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   55.419774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.426284] page_type: f5(slab)
[   55.429415] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.437140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.444859] page dumped because: kasan: bad access detected
[   55.450414] 
[   55.451890] Memory state around the buggy address:
[   55.456670]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.463873]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.471077] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.478278]                                      ^
[   55.483056]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.490262]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.497462] ==================================================================
[   46.519832] ==================================================================
[   46.534061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   46.541435] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   46.548726] 
[   46.550212] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   46.550273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.550292] Hardware name: WinLink E850-96 board (DT)
[   46.550315] Call trace:
[   46.550330]  show_stack+0x20/0x38 (C)
[   46.550367]  dump_stack_lvl+0x8c/0xd0
[   46.550401]  print_report+0x118/0x608
[   46.550439]  kasan_report+0xdc/0x128
[   46.550469]  __asan_report_load4_noabort+0x20/0x30
[   46.550508]  kasan_atomics_helper+0x40a8/0x4858
[   46.550544]  kasan_atomics+0x198/0x2e0
[   46.550572]  kunit_try_run_case+0x170/0x3f0
[   46.550606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.550647]  kthread+0x328/0x630
[   46.550684]  ret_from_fork+0x10/0x20
[   46.550720] 
[   46.618343] Allocated by task 310:
[   46.621731]  kasan_save_stack+0x3c/0x68
[   46.625546]  kasan_save_track+0x20/0x40
[   46.629366]  kasan_save_alloc_info+0x40/0x58
[   46.633620]  __kasan_kmalloc+0xd4/0xd8
[   46.637352]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.641866]  kasan_atomics+0xb8/0x2e0
[   46.645512]  kunit_try_run_case+0x170/0x3f0
[   46.649678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.655147]  kthread+0x328/0x630
[   46.658358]  ret_from_fork+0x10/0x20
[   46.661918] 
[   46.663396] The buggy address belongs to the object at ffff00080243ed00
[   46.663396]  which belongs to the cache kmalloc-64 of size 64
[   46.675724] The buggy address is located 0 bytes to the right of
[   46.675724]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   46.688567] 
[   46.690046] The buggy address belongs to the physical page:
[   46.695601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   46.703586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.710096] page_type: f5(slab)
[   46.713234] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.720951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.728670] page dumped because: kasan: bad access detected
[   46.734225] 
[   46.735701] Memory state around the buggy address:
[   46.740482]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.747684]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.754890] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.762090]                                      ^
[   46.766868]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.774074]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.781275] ==================================================================
[   53.925211] ==================================================================
[   53.932211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.939586] Read of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   53.946878] 
[   53.948360] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   53.948407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.948423] Hardware name: WinLink E850-96 board (DT)
[   53.948445] Call trace:
[   53.948458]  show_stack+0x20/0x38 (C)
[   53.948490]  dump_stack_lvl+0x8c/0xd0
[   53.948521]  print_report+0x118/0x608
[   53.948554]  kasan_report+0xdc/0x128
[   53.948588]  __asan_report_load4_noabort+0x20/0x30
[   53.948623]  kasan_atomics_helper+0x3dbc/0x4858
[   53.948654]  kasan_atomics+0x198/0x2e0
[   53.948683]  kunit_try_run_case+0x170/0x3f0
[   53.948714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.948749]  kthread+0x328/0x630
[   53.948785]  ret_from_fork+0x10/0x20
[   53.948815] 
[   54.016495] Allocated by task 310:
[   54.019884]  kasan_save_stack+0x3c/0x68
[   54.023699]  kasan_save_track+0x20/0x40
[   54.027519]  kasan_save_alloc_info+0x40/0x58
[   54.031773]  __kasan_kmalloc+0xd4/0xd8
[   54.035505]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.040019]  kasan_atomics+0xb8/0x2e0
[   54.043665]  kunit_try_run_case+0x170/0x3f0
[   54.047831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.053300]  kthread+0x328/0x630
[   54.056512]  ret_from_fork+0x10/0x20
[   54.060071] 
[   54.061546] The buggy address belongs to the object at ffff00080243ed00
[   54.061546]  which belongs to the cache kmalloc-64 of size 64
[   54.073874] The buggy address is located 0 bytes to the right of
[   54.073874]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   54.086719] 
[   54.088197] The buggy address belongs to the physical page:
[   54.093754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   54.101739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.108248] page_type: f5(slab)
[   54.111380] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.119104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.126823] page dumped because: kasan: bad access detected
[   54.132378] 
[   54.133854] Memory state around the buggy address:
[   54.138634]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.145837]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.153041] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.160243]                                      ^
[   54.165021]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.172227]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.179426] ==================================================================
[   50.752607] ==================================================================
[   50.759689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   50.766978] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   50.774356] 
[   50.775839] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   50.775892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.775909] Hardware name: WinLink E850-96 board (DT)
[   50.775929] Call trace:
[   50.775941]  show_stack+0x20/0x38 (C)
[   50.775974]  dump_stack_lvl+0x8c/0xd0
[   50.776004]  print_report+0x118/0x608
[   50.776033]  kasan_report+0xdc/0x128
[   50.776064]  kasan_check_range+0x100/0x1a8
[   50.776097]  __kasan_check_write+0x20/0x30
[   50.776132]  kasan_atomics_helper+0x6ec/0x4858
[   50.776164]  kasan_atomics+0x198/0x2e0
[   50.776193]  kunit_try_run_case+0x170/0x3f0
[   50.776223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.776257]  kthread+0x328/0x630
[   50.776288]  ret_from_fork+0x10/0x20
[   50.776318] 
[   50.847271] Allocated by task 310:
[   50.850659]  kasan_save_stack+0x3c/0x68
[   50.854476]  kasan_save_track+0x20/0x40
[   50.858296]  kasan_save_alloc_info+0x40/0x58
[   50.862549]  __kasan_kmalloc+0xd4/0xd8
[   50.866282]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.870795]  kasan_atomics+0xb8/0x2e0
[   50.874441]  kunit_try_run_case+0x170/0x3f0
[   50.878608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.884076]  kthread+0x328/0x630
[   50.887288]  ret_from_fork+0x10/0x20
[   50.890847] 
[   50.892324] The buggy address belongs to the object at ffff00080243ed00
[   50.892324]  which belongs to the cache kmalloc-64 of size 64
[   50.904650] The buggy address is located 0 bytes to the right of
[   50.904650]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   50.917496] 
[   50.918972] The buggy address belongs to the physical page:
[   50.924531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   50.932515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.939025] page_type: f5(slab)
[   50.942156] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.949881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.957600] page dumped because: kasan: bad access detected
[   50.963155] 
[   50.964631] Memory state around the buggy address:
[   50.969411]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.976614]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.983818] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.991019]                                      ^
[   50.995797]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.003003]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.010203] ==================================================================
[   52.338872] ==================================================================
[   52.345950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.353239] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   52.360617] 
[   52.362098] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   52.362149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.362165] Hardware name: WinLink E850-96 board (DT)
[   52.362186] Call trace:
[   52.362200]  show_stack+0x20/0x38 (C)
[   52.362235]  dump_stack_lvl+0x8c/0xd0
[   52.362267]  print_report+0x118/0x608
[   52.362299]  kasan_report+0xdc/0x128
[   52.362327]  kasan_check_range+0x100/0x1a8
[   52.362358]  __kasan_check_write+0x20/0x30
[   52.362393]  kasan_atomics_helper+0x99c/0x4858
[   52.362424]  kasan_atomics+0x198/0x2e0
[   52.362454]  kunit_try_run_case+0x170/0x3f0
[   52.362484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.362520]  kthread+0x328/0x630
[   52.362550]  ret_from_fork+0x10/0x20
[   52.362582] 
[   52.433532] Allocated by task 310:
[   52.436919]  kasan_save_stack+0x3c/0x68
[   52.440737]  kasan_save_track+0x20/0x40
[   52.444557]  kasan_save_alloc_info+0x40/0x58
[   52.448810]  __kasan_kmalloc+0xd4/0xd8
[   52.452542]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.457056]  kasan_atomics+0xb8/0x2e0
[   52.460702]  kunit_try_run_case+0x170/0x3f0
[   52.464869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.470337]  kthread+0x328/0x630
[   52.473549]  ret_from_fork+0x10/0x20
[   52.477108] 
[   52.478584] The buggy address belongs to the object at ffff00080243ed00
[   52.478584]  which belongs to the cache kmalloc-64 of size 64
[   52.490911] The buggy address is located 0 bytes to the right of
[   52.490911]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   52.503757] 
[   52.505233] The buggy address belongs to the physical page:
[   52.510792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   52.518775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.525284] page_type: f5(slab)
[   52.528417] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.536142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.543861] page dumped because: kasan: bad access detected
[   52.549416] 
[   52.550891] Memory state around the buggy address:
[   52.555670]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.562874]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.570079] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.577280]                                      ^
[   52.582058]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.589264]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.596464] ==================================================================
[   52.868841] ==================================================================
[   52.875802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.883092] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   52.890470] 
[   52.891953] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   52.892003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.892021] Hardware name: WinLink E850-96 board (DT)
[   52.892040] Call trace:
[   52.892055]  show_stack+0x20/0x38 (C)
[   52.892088]  dump_stack_lvl+0x8c/0xd0
[   52.892120]  print_report+0x118/0x608
[   52.892151]  kasan_report+0xdc/0x128
[   52.892180]  kasan_check_range+0x100/0x1a8
[   52.892212]  __kasan_check_write+0x20/0x30
[   52.892247]  kasan_atomics_helper+0xa6c/0x4858
[   52.892278]  kasan_atomics+0x198/0x2e0
[   52.892308]  kunit_try_run_case+0x170/0x3f0
[   52.892337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.892374]  kthread+0x328/0x630
[   52.892407]  ret_from_fork+0x10/0x20
[   52.892439] 
[   52.963385] Allocated by task 310:
[   52.966773]  kasan_save_stack+0x3c/0x68
[   52.970591]  kasan_save_track+0x20/0x40
[   52.974410]  kasan_save_alloc_info+0x40/0x58
[   52.978663]  __kasan_kmalloc+0xd4/0xd8
[   52.982395]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.986910]  kasan_atomics+0xb8/0x2e0
[   52.990555]  kunit_try_run_case+0x170/0x3f0
[   52.994722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.000190]  kthread+0x328/0x630
[   53.003402]  ret_from_fork+0x10/0x20
[   53.006961] 
[   53.008438] The buggy address belongs to the object at ffff00080243ed00
[   53.008438]  which belongs to the cache kmalloc-64 of size 64
[   53.020765] The buggy address is located 0 bytes to the right of
[   53.020765]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   53.033610] 
[   53.035087] The buggy address belongs to the physical page:
[   53.040645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   53.048628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.055138] page_type: f5(slab)
[   53.058272] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.065995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.073714] page dumped because: kasan: bad access detected
[   53.079269] 
[   53.080745] Memory state around the buggy address:
[   53.085524]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.092728]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.099932] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.107133]                                      ^
[   53.111911]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.119117]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.126317] ==================================================================
[   57.349409] ==================================================================
[   57.356464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   57.363754] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   57.371132] 
[   57.372614] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   57.372664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.372679] Hardware name: WinLink E850-96 board (DT)
[   57.372697] Call trace:
[   57.372712]  show_stack+0x20/0x38 (C)
[   57.372747]  dump_stack_lvl+0x8c/0xd0
[   57.372778]  print_report+0x118/0x608
[   57.372810]  kasan_report+0xdc/0x128
[   57.372840]  kasan_check_range+0x100/0x1a8
[   57.372873]  __kasan_check_write+0x20/0x30
[   57.372907]  kasan_atomics_helper+0xf88/0x4858
[   57.372937]  kasan_atomics+0x198/0x2e0
[   57.372966]  kunit_try_run_case+0x170/0x3f0
[   57.372999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.373033]  kthread+0x328/0x630
[   57.373066]  ret_from_fork+0x10/0x20
[   57.373097] 
[   57.444047] Allocated by task 310:
[   57.447435]  kasan_save_stack+0x3c/0x68
[   57.451252]  kasan_save_track+0x20/0x40
[   57.455072]  kasan_save_alloc_info+0x40/0x58
[   57.459325]  __kasan_kmalloc+0xd4/0xd8
[   57.463058]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.467571]  kasan_atomics+0xb8/0x2e0
[   57.471217]  kunit_try_run_case+0x170/0x3f0
[   57.475384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.480852]  kthread+0x328/0x630
[   57.484064]  ret_from_fork+0x10/0x20
[   57.487623] 
[   57.489098] The buggy address belongs to the object at ffff00080243ed00
[   57.489098]  which belongs to the cache kmalloc-64 of size 64
[   57.501428] The buggy address is located 0 bytes to the right of
[   57.501428]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   57.514272] 
[   57.515748] The buggy address belongs to the physical page:
[   57.521305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   57.529290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.535800] page_type: f5(slab)
[   57.538933] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.546657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.554376] page dumped because: kasan: bad access detected
[   57.559931] 
[   57.561406] Memory state around the buggy address:
[   57.566186]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.573390]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.580594] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.587795]                                      ^
[   57.592573]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.599779]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.606979] ==================================================================
[   62.375582] ==================================================================
[   62.382604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   62.389981] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   62.397359] 
[   62.398841] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   62.398892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.398906] Hardware name: WinLink E850-96 board (DT)
[   62.398927] Call trace:
[   62.398942]  show_stack+0x20/0x38 (C)
[   62.398974]  dump_stack_lvl+0x8c/0xd0
[   62.399006]  print_report+0x118/0x608
[   62.399035]  kasan_report+0xdc/0x128
[   62.399065]  kasan_check_range+0x100/0x1a8
[   62.399098]  __kasan_check_write+0x20/0x30
[   62.399131]  kasan_atomics_helper+0x16d0/0x4858
[   62.399162]  kasan_atomics+0x198/0x2e0
[   62.399191]  kunit_try_run_case+0x170/0x3f0
[   62.399222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.399258]  kthread+0x328/0x630
[   62.399290]  ret_from_fork+0x10/0x20
[   62.399323] 
[   62.470361] Allocated by task 310:
[   62.473748]  kasan_save_stack+0x3c/0x68
[   62.477566]  kasan_save_track+0x20/0x40
[   62.481385]  kasan_save_alloc_info+0x40/0x58
[   62.485638]  __kasan_kmalloc+0xd4/0xd8
[   62.489371]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.493885]  kasan_atomics+0xb8/0x2e0
[   62.497530]  kunit_try_run_case+0x170/0x3f0
[   62.501697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.507166]  kthread+0x328/0x630
[   62.510378]  ret_from_fork+0x10/0x20
[   62.513936] 
[   62.515414] The buggy address belongs to the object at ffff00080243ed00
[   62.515414]  which belongs to the cache kmalloc-64 of size 64
[   62.527740] The buggy address is located 0 bytes to the right of
[   62.527740]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   62.540586] 
[   62.542061] The buggy address belongs to the physical page:
[   62.547619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   62.555604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.562114] page_type: f5(slab)
[   62.565246] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.572970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.580689] page dumped because: kasan: bad access detected
[   62.586244] 
[   62.587720] Memory state around the buggy address:
[   62.592498]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.599703]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.606908] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.614109]                                      ^
[   62.618887]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.626093]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.633292] ==================================================================
[   60.791930] ==================================================================
[   60.798948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   60.806324] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   60.813702] 
[   60.815184] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   60.815232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.815248] Hardware name: WinLink E850-96 board (DT)
[   60.815267] Call trace:
[   60.815283]  show_stack+0x20/0x38 (C)
[   60.815317]  dump_stack_lvl+0x8c/0xd0
[   60.815352]  print_report+0x118/0x608
[   60.815385]  kasan_report+0xdc/0x128
[   60.815414]  kasan_check_range+0x100/0x1a8
[   60.815447]  __kasan_check_write+0x20/0x30
[   60.815480]  kasan_atomics_helper+0x14e4/0x4858
[   60.815513]  kasan_atomics+0x198/0x2e0
[   60.815541]  kunit_try_run_case+0x170/0x3f0
[   60.815571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.815605]  kthread+0x328/0x630
[   60.815637]  ret_from_fork+0x10/0x20
[   60.815668] 
[   60.886704] Allocated by task 310:
[   60.890091]  kasan_save_stack+0x3c/0x68
[   60.893909]  kasan_save_track+0x20/0x40
[   60.897729]  kasan_save_alloc_info+0x40/0x58
[   60.901982]  __kasan_kmalloc+0xd4/0xd8
[   60.905714]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.910228]  kasan_atomics+0xb8/0x2e0
[   60.913874]  kunit_try_run_case+0x170/0x3f0
[   60.918040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.923509]  kthread+0x328/0x630
[   60.926721]  ret_from_fork+0x10/0x20
[   60.930280] 
[   60.931757] The buggy address belongs to the object at ffff00080243ed00
[   60.931757]  which belongs to the cache kmalloc-64 of size 64
[   60.944082] The buggy address is located 0 bytes to the right of
[   60.944082]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   60.956929] 
[   60.958406] The buggy address belongs to the physical page:
[   60.963963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   60.971948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.978458] page_type: f5(slab)
[   60.981589] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.989314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.997032] page dumped because: kasan: bad access detected
[   61.002588] 
[   61.004063] Memory state around the buggy address:
[   61.008841]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.016046]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.023251] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.030452]                                      ^
[   61.035230]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.042436]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.049636] ==================================================================
[   62.902388] ==================================================================
[   62.909335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   62.916709] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   62.924087] 
[   62.925569] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   62.925618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.925635] Hardware name: WinLink E850-96 board (DT)
[   62.925654] Call trace:
[   62.925665]  show_stack+0x20/0x38 (C)
[   62.925699]  dump_stack_lvl+0x8c/0xd0
[   62.925732]  print_report+0x118/0x608
[   62.925764]  kasan_report+0xdc/0x128
[   62.925794]  kasan_check_range+0x100/0x1a8
[   62.925828]  __kasan_check_write+0x20/0x30
[   62.925864]  kasan_atomics_helper+0x175c/0x4858
[   62.925896]  kasan_atomics+0x198/0x2e0
[   62.925924]  kunit_try_run_case+0x170/0x3f0
[   62.925958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.925993]  kthread+0x328/0x630
[   62.926025]  ret_from_fork+0x10/0x20
[   62.926056] 
[   62.997089] Allocated by task 310:
[   63.000476]  kasan_save_stack+0x3c/0x68
[   63.004294]  kasan_save_track+0x20/0x40
[   63.008113]  kasan_save_alloc_info+0x40/0x58
[   63.012367]  __kasan_kmalloc+0xd4/0xd8
[   63.016099]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.020613]  kasan_atomics+0xb8/0x2e0
[   63.024259]  kunit_try_run_case+0x170/0x3f0
[   63.028425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.033894]  kthread+0x328/0x630
[   63.037106]  ret_from_fork+0x10/0x20
[   63.040665] 
[   63.042140] The buggy address belongs to the object at ffff00080243ed00
[   63.042140]  which belongs to the cache kmalloc-64 of size 64
[   63.054469] The buggy address is located 0 bytes to the right of
[   63.054469]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   63.067314] 
[   63.068790] The buggy address belongs to the physical page:
[   63.074349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   63.082334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.088843] page_type: f5(slab)
[   63.091976] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.099698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.107417] page dumped because: kasan: bad access detected
[   63.112973] 
[   63.114448] Memory state around the buggy address:
[   63.119229]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.126431]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.133636] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.140837]                                      ^
[   63.145615]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.152821]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.160021] ==================================================================
[   60.526766] ==================================================================
[   60.533848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   60.541224] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   60.548602] 
[   60.550083] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   60.550130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.550150] Hardware name: WinLink E850-96 board (DT)
[   60.550170] Call trace:
[   60.550185]  show_stack+0x20/0x38 (C)
[   60.550216]  dump_stack_lvl+0x8c/0xd0
[   60.550248]  print_report+0x118/0x608
[   60.550280]  kasan_report+0xdc/0x128
[   60.550311]  kasan_check_range+0x100/0x1a8
[   60.550343]  __kasan_check_write+0x20/0x30
[   60.550378]  kasan_atomics_helper+0x147c/0x4858
[   60.550411]  kasan_atomics+0x198/0x2e0
[   60.550440]  kunit_try_run_case+0x170/0x3f0
[   60.550473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.550509]  kthread+0x328/0x630
[   60.550541]  ret_from_fork+0x10/0x20
[   60.550572] 
[   60.621603] Allocated by task 310:
[   60.624991]  kasan_save_stack+0x3c/0x68
[   60.628809]  kasan_save_track+0x20/0x40
[   60.632628]  kasan_save_alloc_info+0x40/0x58
[   60.636881]  __kasan_kmalloc+0xd4/0xd8
[   60.640614]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.645128]  kasan_atomics+0xb8/0x2e0
[   60.648773]  kunit_try_run_case+0x170/0x3f0
[   60.652940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.658409]  kthread+0x328/0x630
[   60.661621]  ret_from_fork+0x10/0x20
[   60.665180] 
[   60.666657] The buggy address belongs to the object at ffff00080243ed00
[   60.666657]  which belongs to the cache kmalloc-64 of size 64
[   60.678985] The buggy address is located 0 bytes to the right of
[   60.678985]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   60.691829] 
[   60.693304] The buggy address belongs to the physical page:
[   60.698862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   60.706847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.713357] page_type: f5(slab)
[   60.716489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.724214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.731932] page dumped because: kasan: bad access detected
[   60.737487] 
[   60.738963] Memory state around the buggy address:
[   60.743741]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.750946]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.758151] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.765352]                                      ^
[   60.770130]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.777336]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.784536] ==================================================================
[   51.547447] ==================================================================
[   51.554469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   51.561758] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   51.569136] 
[   51.570616] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   51.570665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.570682] Hardware name: WinLink E850-96 board (DT)
[   51.570702] Call trace:
[   51.570716]  show_stack+0x20/0x38 (C)
[   51.570751]  dump_stack_lvl+0x8c/0xd0
[   51.570782]  print_report+0x118/0x608
[   51.570814]  kasan_report+0xdc/0x128
[   51.570843]  kasan_check_range+0x100/0x1a8
[   51.570878]  __kasan_check_write+0x20/0x30
[   51.570911]  kasan_atomics_helper+0x894/0x4858
[   51.570942]  kasan_atomics+0x198/0x2e0
[   51.570970]  kunit_try_run_case+0x170/0x3f0
[   51.571001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.571036]  kthread+0x328/0x630
[   51.571070]  ret_from_fork+0x10/0x20
[   51.571103] 
[   51.642051] Allocated by task 310:
[   51.645438]  kasan_save_stack+0x3c/0x68
[   51.649256]  kasan_save_track+0x20/0x40
[   51.653076]  kasan_save_alloc_info+0x40/0x58
[   51.657329]  __kasan_kmalloc+0xd4/0xd8
[   51.661061]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.665575]  kasan_atomics+0xb8/0x2e0
[   51.669221]  kunit_try_run_case+0x170/0x3f0
[   51.673387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.678856]  kthread+0x328/0x630
[   51.682068]  ret_from_fork+0x10/0x20
[   51.685627] 
[   51.687104] The buggy address belongs to the object at ffff00080243ed00
[   51.687104]  which belongs to the cache kmalloc-64 of size 64
[   51.699429] The buggy address is located 0 bytes to the right of
[   51.699429]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   51.712276] 
[   51.713752] The buggy address belongs to the physical page:
[   51.719311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   51.727295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.733803] page_type: f5(slab)
[   51.736936] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.744661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.752379] page dumped because: kasan: bad access detected
[   51.757935] 
[   51.759410] Memory state around the buggy address:
[   51.764189]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.771393]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.778598] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.785799]                                      ^
[   51.790577]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.797783]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.804983] ==================================================================
[   58.939740] ==================================================================
[   58.946719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   58.954095] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   58.961473] 
[   58.962954] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   58.963008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.963023] Hardware name: WinLink E850-96 board (DT)
[   58.963042] Call trace:
[   58.963057]  show_stack+0x20/0x38 (C)
[   58.963094]  dump_stack_lvl+0x8c/0xd0
[   58.963128]  print_report+0x118/0x608
[   58.963160]  kasan_report+0xdc/0x128
[   58.963190]  kasan_check_range+0x100/0x1a8
[   58.963224]  __kasan_check_write+0x20/0x30
[   58.963257]  kasan_atomics_helper+0x11f8/0x4858
[   58.963288]  kasan_atomics+0x198/0x2e0
[   58.963317]  kunit_try_run_case+0x170/0x3f0
[   58.963348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.963386]  kthread+0x328/0x630
[   58.963417]  ret_from_fork+0x10/0x20
[   58.963449] 
[   59.034475] Allocated by task 310:
[   59.037862]  kasan_save_stack+0x3c/0x68
[   59.041680]  kasan_save_track+0x20/0x40
[   59.045499]  kasan_save_alloc_info+0x40/0x58
[   59.049753]  __kasan_kmalloc+0xd4/0xd8
[   59.053485]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.057999]  kasan_atomics+0xb8/0x2e0
[   59.061645]  kunit_try_run_case+0x170/0x3f0
[   59.065811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.071280]  kthread+0x328/0x630
[   59.074492]  ret_from_fork+0x10/0x20
[   59.078051] 
[   59.079526] The buggy address belongs to the object at ffff00080243ed00
[   59.079526]  which belongs to the cache kmalloc-64 of size 64
[   59.091854] The buggy address is located 0 bytes to the right of
[   59.091854]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   59.104699] 
[   59.106175] The buggy address belongs to the physical page:
[   59.111735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   59.119718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.126227] page_type: f5(slab)
[   59.129362] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.137084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.144803] page dumped because: kasan: bad access detected
[   59.150358] 
[   59.151834] Memory state around the buggy address:
[   59.156615]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.163817]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.171021] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.178223]                                      ^
[   59.183001]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.190207]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.197408] ==================================================================
[   48.633261] ==================================================================
[   48.640275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   48.647565] Write of size 4 at addr ffff00080243ed30 by task kunit_try_catch/310
[   48.654943] 
[   48.656423] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   48.656472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.656490] Hardware name: WinLink E850-96 board (DT)
[   48.656511] Call trace:
[   48.656525]  show_stack+0x20/0x38 (C)
[   48.656559]  dump_stack_lvl+0x8c/0xd0
[   48.656591]  print_report+0x118/0x608
[   48.656621]  kasan_report+0xdc/0x128
[   48.656653]  kasan_check_range+0x100/0x1a8
[   48.656685]  __kasan_check_write+0x20/0x30
[   48.656720]  kasan_atomics_helper+0x3ac/0x4858
[   48.656753]  kasan_atomics+0x198/0x2e0
[   48.656781]  kunit_try_run_case+0x170/0x3f0
[   48.656812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.656849]  kthread+0x328/0x630
[   48.656880]  ret_from_fork+0x10/0x20
[   48.656911] 
[   48.727859] Allocated by task 310:
[   48.731248]  kasan_save_stack+0x3c/0x68
[   48.735064]  kasan_save_track+0x20/0x40
[   48.738883]  kasan_save_alloc_info+0x40/0x58
[   48.743136]  __kasan_kmalloc+0xd4/0xd8
[   48.746869]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.751383]  kasan_atomics+0xb8/0x2e0
[   48.755029]  kunit_try_run_case+0x170/0x3f0
[   48.759195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.764664]  kthread+0x328/0x630
[   48.767875]  ret_from_fork+0x10/0x20
[   48.771435] 
[   48.772910] The buggy address belongs to the object at ffff00080243ed00
[   48.772910]  which belongs to the cache kmalloc-64 of size 64
[   48.785237] The buggy address is located 0 bytes to the right of
[   48.785237]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   48.798083] 
[   48.799559] The buggy address belongs to the physical page:
[   48.805117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   48.813101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.819612] page_type: f5(slab)
[   48.822744] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.830468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.838187] page dumped because: kasan: bad access detected
[   48.843742] 
[   48.845218] Memory state around the buggy address:
[   48.849996]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.857201]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.864406] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.871607]                                      ^
[   48.876385]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.883591]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.890791] ==================================================================
[   61.322126] ==================================================================
[   61.329147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   61.336524] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   61.343902] 
[   61.345383] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   61.345433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.345450] Hardware name: WinLink E850-96 board (DT)
[   61.345471] Call trace:
[   61.345485]  show_stack+0x20/0x38 (C)
[   61.345518]  dump_stack_lvl+0x8c/0xd0
[   61.345550]  print_report+0x118/0x608
[   61.345580]  kasan_report+0xdc/0x128
[   61.345611]  kasan_check_range+0x100/0x1a8
[   61.345645]  __kasan_check_write+0x20/0x30
[   61.345679]  kasan_atomics_helper+0x15b4/0x4858
[   61.345712]  kasan_atomics+0x198/0x2e0
[   61.345742]  kunit_try_run_case+0x170/0x3f0
[   61.345773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.345809]  kthread+0x328/0x630
[   61.345843]  ret_from_fork+0x10/0x20
[   61.345875] 
[   61.416904] Allocated by task 310:
[   61.420292]  kasan_save_stack+0x3c/0x68
[   61.424109]  kasan_save_track+0x20/0x40
[   61.427929]  kasan_save_alloc_info+0x40/0x58
[   61.432182]  __kasan_kmalloc+0xd4/0xd8
[   61.435915]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.440428]  kasan_atomics+0xb8/0x2e0
[   61.444074]  kunit_try_run_case+0x170/0x3f0
[   61.448241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.453709]  kthread+0x328/0x630
[   61.456921]  ret_from_fork+0x10/0x20
[   61.460480] 
[   61.461957] The buggy address belongs to the object at ffff00080243ed00
[   61.461957]  which belongs to the cache kmalloc-64 of size 64
[   61.474285] The buggy address is located 0 bytes to the right of
[   61.474285]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   61.487129] 
[   61.488605] The buggy address belongs to the physical page:
[   61.494164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   61.502148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.508658] page_type: f5(slab)
[   61.511789] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.519514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.527233] page dumped because: kasan: bad access detected
[   61.532788] 
[   61.534263] Memory state around the buggy address:
[   61.539043]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.546247]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.553451] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.560652]                                      ^
[   61.565430]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.572636]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.579836] ==================================================================
[   58.409492] ==================================================================
[   58.416517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   58.423894] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   58.431272] 
[   58.432755] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   58.432806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.432823] Hardware name: WinLink E850-96 board (DT)
[   58.432841] Call trace:
[   58.432853]  show_stack+0x20/0x38 (C)
[   58.432887]  dump_stack_lvl+0x8c/0xd0
[   58.432919]  print_report+0x118/0x608
[   58.432951]  kasan_report+0xdc/0x128
[   58.432981]  kasan_check_range+0x100/0x1a8
[   58.433018]  __kasan_check_write+0x20/0x30
[   58.433051]  kasan_atomics_helper+0x1128/0x4858
[   58.433084]  kasan_atomics+0x198/0x2e0
[   58.433112]  kunit_try_run_case+0x170/0x3f0
[   58.433143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.433178]  kthread+0x328/0x630
[   58.433210]  ret_from_fork+0x10/0x20
[   58.433241] 
[   58.504274] Allocated by task 310:
[   58.507662]  kasan_save_stack+0x3c/0x68
[   58.511480]  kasan_save_track+0x20/0x40
[   58.515299]  kasan_save_alloc_info+0x40/0x58
[   58.519552]  __kasan_kmalloc+0xd4/0xd8
[   58.523285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.527798]  kasan_atomics+0xb8/0x2e0
[   58.531444]  kunit_try_run_case+0x170/0x3f0
[   58.535611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.541080]  kthread+0x328/0x630
[   58.544291]  ret_from_fork+0x10/0x20
[   58.547850] 
[   58.549326] The buggy address belongs to the object at ffff00080243ed00
[   58.549326]  which belongs to the cache kmalloc-64 of size 64
[   58.561654] The buggy address is located 0 bytes to the right of
[   58.561654]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   58.574499] 
[   58.575975] The buggy address belongs to the physical page:
[   58.581534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   58.589518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.596027] page_type: f5(slab)
[   58.599159] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.606884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.614603] page dumped because: kasan: bad access detected
[   58.620158] 
[   58.621634] Memory state around the buggy address:
[   58.626413]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.633617]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.640823] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.648023]                                      ^
[   58.652800]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.660007]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.667206] ==================================================================
[   58.144366] ==================================================================
[   58.151417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   58.158794] Write of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   58.166172] 
[   58.167653] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   58.167703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.167718] Hardware name: WinLink E850-96 board (DT)
[   58.167739] Call trace:
[   58.167754]  show_stack+0x20/0x38 (C)
[   58.167786]  dump_stack_lvl+0x8c/0xd0
[   58.167817]  print_report+0x118/0x608
[   58.167849]  kasan_report+0xdc/0x128
[   58.167879]  kasan_check_range+0x100/0x1a8
[   58.167911]  __kasan_check_write+0x20/0x30
[   58.167943]  kasan_atomics_helper+0x10c0/0x4858
[   58.167975]  kasan_atomics+0x198/0x2e0
[   58.168004]  kunit_try_run_case+0x170/0x3f0
[   58.168035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.168071]  kthread+0x328/0x630
[   58.168102]  ret_from_fork+0x10/0x20
[   58.168133] 
[   58.239174] Allocated by task 310:
[   58.242562]  kasan_save_stack+0x3c/0x68
[   58.246379]  kasan_save_track+0x20/0x40
[   58.250199]  kasan_save_alloc_info+0x40/0x58
[   58.254452]  __kasan_kmalloc+0xd4/0xd8
[   58.258185]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.262698]  kasan_atomics+0xb8/0x2e0
[   58.266344]  kunit_try_run_case+0x170/0x3f0
[   58.270511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.275979]  kthread+0x328/0x630
[   58.279191]  ret_from_fork+0x10/0x20
[   58.282750] 
[   58.284225] The buggy address belongs to the object at ffff00080243ed00
[   58.284225]  which belongs to the cache kmalloc-64 of size 64
[   58.296553] The buggy address is located 0 bytes to the right of
[   58.296553]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   58.309399] 
[   58.310875] The buggy address belongs to the physical page:
[   58.316434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   58.324417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.330927] page_type: f5(slab)
[   58.334060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.341784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.349503] page dumped because: kasan: bad access detected
[   58.355058] 
[   58.356533] Memory state around the buggy address:
[   58.361312]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.368516]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.375721] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.382922]                                      ^
[   58.387700]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.394907]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.402106] ==================================================================
[   62.113899] ==================================================================
[   62.120977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   62.128352] Read of size 8 at addr ffff00080243ed30 by task kunit_try_catch/310
[   62.135644] 
[   62.137126] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   62.137177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.137191] Hardware name: WinLink E850-96 board (DT)
[   62.137209] Call trace:
[   62.137225]  show_stack+0x20/0x38 (C)
[   62.137256]  dump_stack_lvl+0x8c/0xd0
[   62.137287]  print_report+0x118/0x608
[   62.137319]  kasan_report+0xdc/0x128
[   62.137348]  __asan_report_load8_noabort+0x20/0x30
[   62.137383]  kasan_atomics_helper+0x3df4/0x4858
[   62.137417]  kasan_atomics+0x198/0x2e0
[   62.137447]  kunit_try_run_case+0x170/0x3f0
[   62.137478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.137512]  kthread+0x328/0x630
[   62.137543]  ret_from_fork+0x10/0x20
[   62.137574] 
[   62.205261] Allocated by task 310:
[   62.208647]  kasan_save_stack+0x3c/0x68
[   62.212466]  kasan_save_track+0x20/0x40
[   62.216285]  kasan_save_alloc_info+0x40/0x58
[   62.220538]  __kasan_kmalloc+0xd4/0xd8
[   62.224271]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.228785]  kasan_atomics+0xb8/0x2e0
[   62.232430]  kunit_try_run_case+0x170/0x3f0
[   62.236597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.242066]  kthread+0x328/0x630
[   62.245277]  ret_from_fork+0x10/0x20
[   62.248837] 
[   62.250313] The buggy address belongs to the object at ffff00080243ed00
[   62.250313]  which belongs to the cache kmalloc-64 of size 64
[   62.262640] The buggy address is located 0 bytes to the right of
[   62.262640]  allocated 48-byte region [ffff00080243ed00, ffff00080243ed30)
[   62.275485] 
[   62.276961] The buggy address belongs to the physical page:
[   62.282520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88243e
[   62.290504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.297014] page_type: f5(slab)
[   62.300146] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.307870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.315589] page dumped because: kasan: bad access detected
[   62.321144] 
[   62.322620] Memory state around the buggy address:
[   62.327399]  ffff00080243ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.334603]  ffff00080243ec80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.341808] >ffff00080243ed00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.349009]                                      ^
[   62.353786]  ffff00080243ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.360993]  ffff00080243ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.368193] ==================================================================